Rocket Surgeon

  • 7 Posts
  • 12 Comments
Joined 11 months ago
cake
Cake day: March 10th, 2025

help-circle





  • I’ve chewed on Gidney’s ‘Falling with Style’ paper.
    I recommend reading it if you would like to understand Shor’s Algorithm.

    I’m somewhat unclear if the following applies to Shor’s Algorithm in general, or just the modified version used for the experiment.
    But I’ve come to understand that the algorithm is a recursive series of steps, structured such that it will eventually factor anything.
    Like … it could take longer than the age of the universe for some numbers, but the algorithm will do the job if you got enough cycles to spare.

    What we are looking for here is quantum supremacy, and once Gidney has explained this much, its obvious from the graph above that we are not seeing it. Pure random noise outperformed the quantum computer.

    I guess the thing I’ve not absorbed yet is, why was the quantum computer expected to not work? I know it was much too complex a system, and internal noise would overwhelm any processing. Gidney described being amazed that the IBM quantum system even let him configure his experiment and run it. Why did it lose so completely to a random noise generator, as in how could you possibly get worse than random noise?






  • dbtng@eviltoast.orgOPtonetworking@sh.itjust.worksSecurity Onion
    link
    fedilink
    English
    arrow-up
    1
    ·
    16 days ago

    Yes, its a distro with a bunch of tools. The tools are deployed together into a web app suite.
    Security Onion is firstly an IDS. Intrusion Detection System.
    The base install needs 2 NICs, a management NIC and an operational NIC. It’s a probe.
    It also supports an army of Elastic Agents installed at sites or subnets.

    The package allows you to flag events via Suricata (I think that’s what’s behind Hunt), escalate Cases to track them, search the data in a surprising amount of ways, and drill right down to the packet level (that’s Wireshark). There’s a bunch of InfluxDB graphing. A thing called CyberChef that is a fukin badass on-the-fly decoding and decryption tool to open up the packets you gather.

    Honestly, I’m just getting started. But if you hired a security analyst to watch your network, you’d want them checking this every day, digging in shit, sending you reports, escalating cases to you.