04:5204:52, 11 June 2010diffhist+204
Google Chrome Frame
make privacy complete/accurate/not a section. say "chrome frame is based on the open-source chromium", analogous to how you talk about google chrome itself
21:5921:59, 21 May 2010diffhist+2
X86
→x64: avoid implication that x86-64 is the first *anything*, note itanium is no longer widely used, clarify what NX bit does.
21:5321:53, 21 May 2010diffhist+6
X86
→x64: as worded, implied Itanium was the *first* architecture w/64-bit addressing, when at least the Cray-1 and RISC came earlier (according to
64-bit)
12 May 2010
06:0606:06, 12 May 2010diffhist+16
Cryptanalysis
→Modern cryptanalysis: it's a tad unfair to blame WEP and RapidSSL hacks partly on protocol "flaws" -- the protocols would've worked with good primitives, though they could have been more robust
22:2822:28, 17 March 2010diffhist−210
Quantum computing
→Potential: this doesn't compute: this section's about the potential *if* large quantum computers existed, and if they did, longer RSA keys would only increase attacker's effort polynomially
04:5204:52, 11 June 2010diffhist+204
Google Chrome Frame
make privacy complete/accurate/not a section. say "chrome frame is based on the open-source chromium", analogous to how you talk about google chrome itself
21:5921:59, 21 May 2010diffhist+2
X86
→x64: avoid implication that x86-64 is the first *anything*, note itanium is no longer widely used, clarify what NX bit does.
21:5321:53, 21 May 2010diffhist+6
X86
→x64: as worded, implied Itanium was the *first* architecture w/64-bit addressing, when at least the Cray-1 and RISC came earlier (according to
64-bit)
12 May 2010
06:0606:06, 12 May 2010diffhist+16
Cryptanalysis
→Modern cryptanalysis: it's a tad unfair to blame WEP and RapidSSL hacks partly on protocol "flaws" -- the protocols would've worked with good primitives, though they could have been more robust
22:2822:28, 17 March 2010diffhist−210
Quantum computing
→Potential: this doesn't compute: this section's about the potential *if* large quantum computers existed, and if they did, longer RSA keys would only increase attacker's effort polynomially