Advertisement
by Stasnov » Sat Aug 20, 2016 7:35 am
Puzikas wrote:"Wanna know how I got these scars?"- Gorby probably
Yalos wrote:"Nazi Germany lost WW2 because it thought like an NS player"
by Laritaia » Sat Aug 20, 2016 7:38 am
Stasnov wrote:Would it be possible/efficient to create a long-range SAM ala S-300 that can be fired at launch depth by a submarine VLS module?
My naval doctrine resembles the Soviet one, hence maritime strike by massed (even Regiment-size) groups of aircraft with long-range heavy ASMs (mostly Tu-22M3s ) against CSGs is a big part of it. However, performing such attacks has become even more dangerous in modern times by the introduction of better naval AWACS aircraft that can detect the strike formation from a longer range, thus giving CAP more time to respond. So I was thinking that a sub could get within range of the AWACS and shoot it down while submerged to avoid danger and remain undetected, while the strike formation attacks at the same time, while enemy CAP has no AWACS to guide them to their targets.
This may be completely stupid but pls no kill
by The Akasha Colony » Sat Aug 20, 2016 7:42 am
Stasnov wrote:Would it be possible/efficient to create a long-range SAM ala S-300 that can be fired at launch depth by a submarine VLS module?
My naval doctrine resembles the Soviet one, hence maritime strike by massed (even Regiment-size) groups of aircraft with long-range heavy ASMs (mostly Tu-22M3s ) against CSGs is a big part of it. However, performing such attacks has become even more dangerous in modern times by the introduction of better naval AWACS aircraft that can detect the strike formation from a longer range, thus giving CAP more time to respond. So I was thinking that a sub could get within range of the AWACS and shoot it down while submerged to avoid danger and remain undetected, while the strike formation attacks at the same time, while enemy CAP has no AWACS to guide them to their targets.
This may be completely stupid but pls no kill
by Scandinavian Nations » Sat Aug 20, 2016 7:46 am
Stasnov wrote:Would it be possible/efficient to create a long-range SAM ala S-300 that can be fired at launch depth by a submarine VLS module?
by Langenberg » Sat Aug 20, 2016 7:51 am
by Allanea » Sat Aug 20, 2016 7:53 am
Langenberg wrote:Is there any point in the modern world to maintaining a small stored arsenal of chemical weapons such as VX?
by The Akasha Colony » Sat Aug 20, 2016 8:05 am
Langenberg wrote:Is there any point in the modern world to maintaining a small stored arsenal of chemical weapons such as VX?
by The Akasha Colony » Sat Aug 20, 2016 8:09 am
by Langenberg » Sat Aug 20, 2016 8:11 am
Allanea wrote:Not really - this was covered extensively in previous discussions.
Allanea wrote:If you want to be an asshole just figure out some explosive or incendiary weapon that emits poisonous gases as a byproduct of the burning/exploding, like WP for instance.
by Spirit of Hope » Sat Aug 20, 2016 8:20 am
Imperializt Russia wrote:Support biblical marriage! One SoH and as many wives and sex slaves as he can afford!
by The Akasha Colony » Sat Aug 20, 2016 8:25 am
Langenberg wrote:Summary? I was given to understand VX could still be quite devastating.
by Imperializt Russia » Sat Aug 20, 2016 8:59 am
The Delta Class Starship is a variable-vacuum airship and spacecraft produced in the Aestorian Commonwealth. Beginning as a sketch in 2013 for an airborne aircraft carrier capable of reaching an altitude of 30 km by buoyancy alone... As of early 2016, 15 ships of the class are understood to have been completed, although the details of the project are top secret.
Also,Lamadia wrote:dangerous socialist attitude
Imperializt Russia wrote:I'm English, you tit.
by North Arkana » Sat Aug 20, 2016 9:01 am
Imperializt Russia wrote:The Delta Class Starship is a variable-vacuum airship and spacecraft produced in the Aestorian Commonwealth. Beginning as a sketch in 2013 for an airborne aircraft carrier capable of reaching an altitude of 30 km by buoyancy alone... As of early 2016, 15 ships of the class are understood to have been completed, although the details of the project are top secret.
lel
by Imperializt Russia » Sat Aug 20, 2016 9:02 am
Also,Lamadia wrote:dangerous socialist attitude
Imperializt Russia wrote:I'm English, you tit.
by Scandinavian Nations » Sat Aug 20, 2016 9:12 am
by Husseinarti » Sat Aug 20, 2016 9:17 am
by Imperializt Russia » Sat Aug 20, 2016 9:20 am
Husseinarti wrote:If the Iraqis hadn't been subjected to the intense Coalition air campaign at the start of GW1, and instead the coalition opted to engage with the Iraqi's at their strength, how intense would have that battle be?
Also,Lamadia wrote:dangerous socialist attitude
Imperializt Russia wrote:I'm English, you tit.
by The Greater Aryan Race » Sat Aug 20, 2016 9:23 am
Husseinarti wrote:If the Iraqis hadn't been subjected to the intense Coalition air campaign at the start of GW1, and instead the coalition opted to engage with the Iraqi's at their strength, how intense would have that battle be?
Imperium Sidhicum wrote:So, uh... Is this another one of those threads where everyone is supposed to feel outraged and circle-jerk in agreement of how injust and terrible the described incident is?
Because if it is, I'm probably going to say something mean and contrary just to contradict the majority.
by Husseinarti » Sat Aug 20, 2016 10:26 am
by Imperializt Russia » Sat Aug 20, 2016 10:38 am
Also,Lamadia wrote:dangerous socialist attitude
Imperializt Russia wrote:I'm English, you tit.
by Takhshiyt » Sat Aug 20, 2016 10:46 am
Scandinavian Nations wrote:The Akasha Colony wrote:By lots of potential means. But even commercial-grad off-the-shelf encryption is quite secure. Breaches in these security systems are usually the result of carelessness more so than real exploits in the system itself...
...They're usually the result of carelessness, such as an employee bringing an infected flash drive to work, or accidentally clicking on a phishing scam, or visiting a site they're not supposed to, or of someone managing to capture their password.
I wouldn't put it quite this way. A more accurate statement would be that the cryptographic algorithms used in commercial data protection are secure.
But everything surrounding the essentially unbreakable cryptographic algorithm of choice, putting it to use, tends to be in a much worse state. The PKI used to deploy web cryptography is not just theoretically insecure, has but long since broken itself due to its poor design. The idea behind PKI was to assign ultimate trust to everyone on the inside, including the right to assign up to the same level of trust to anyone else.
While some attacks rely on carelessness, there's a lot of effective attacks that don't. Take one example: when you connect to your bank, you rely on your insecure DNS to point you to the right IP, then on the bank's supposedly-secure SSL certificate to prove it really is your bank, then on SSL to encrypt the connection.
Going through it step by step, the problem with the first step is, most large banks use dozens of domain names, some completely unrelated, so if your bank has added a new processing domain, how do you know? They don't send out mailers or even maintain a list of legit domains in one central location. Since anyone can register a plausible-sounding domain, and since legit banks use even implausible-sounding ones, no reasonable vigilance will tell you if it's legit or not. If a payment-requesting site points you there, you'll usually take it as legit.
The second step is the SSL certificate. The CA should supposedly verify everyone's identity before issuing them a certificate, which will then verify it to you. But due to root CA issuing intermediate CA-certificates and so on, there's plenty of nickel CA that only verify the payment. So anyone can get a certificate in any bank's name, making PKI SSL even less secure than DNS.
The third step is the crypto itself, and that's effectively unbreakable, but it protects your connection with the attacker just the same as a legit one.There's a similar flaw in code signing and most other signature-based security.
These are exploits, not just mistakes. Such attacks take time and effort to set up, they're not just opportunistic long shots. But it's true that they're not really sophisticated, I've basically described a common one in this short post, it's just elbow grease.
While you can trace most successful attacks to specific missteps, in a lot of cases these were a sure deal and couldn't have been prevented by anything short of every employee having clinical paranoia plus a CS degree.
Anyway, to answer Takhshiyt's question: use a simple 256-bit symmetric key. (Anytime you hear of longer keys, it's asymmetric encryption, insecure due to the PKI's complexity and flaws). The symmetric key is permanent and has to be exchanged securely. Once you do that, it's secure.
by Gallia- » Sat Aug 20, 2016 11:30 am
Husseinarti wrote:If the Iraqis hadn't been subjected to the intense Coalition air campaign at the start of GW1, and instead the coalition opted to engage with the Iraqi's at their strength, how intense would have that battle be?
by Taihei Tengoku » Sat Aug 20, 2016 11:45 am
by Husseinarti » Sat Aug 20, 2016 11:52 am
Gallia- wrote:Husseinarti wrote:If the Iraqis hadn't been subjected to the intense Coalition air campaign at the start of GW1, and instead the coalition opted to engage with the Iraqi's at their strength, how intense would have that battle be?
Intense enough that everyone would decide to forgo this option in favour of bombing them to death for a month.
Advertisement
Return to Factbooks and National Information
Advertisement