投稿時間:2022-12-16 04:24:06 RSSフィード2022-12-16 04:00 分まとめ(26件)

カテゴリー等 サイト名等 記事タイトル・トレンドワード等 リンクURL 頻出ワード・要約等/検索ボリューム 登録日
AWS AWS Partner Network (APN) Blog Building a Serverless Trigger-Based Data Movement Pipeline Using Apache NiFi, DataFlow Functions, and AWS Lambda https://aws.amazon.com/blogs/apn/building-a-serverless-trigger-based-data-movement-pipeline-using-apache-nifi-dataflow-functions-and-aws-lambda/ Building a Serverless Trigger Based Data Movement Pipeline Using Apache NiFi DataFlow Functions and AWS LambdaOrganizations have a wide range of data processing use cases collecting data from variety of sources transforming it and loading it to different destinations to fulfill diverse business needs Learn how DataFlow Functions combined with the serverless compute services provided by AWS Lambda enables developers to implement a wide spectrum of use cases using the low code NiFi flow designer user interface and deploy the flows as short lived serverless functions 2022-12-15 18:41:32
Git Gitタグが付けられた新着投稿 - Qiita Git rebase 〜コミット履歴を綺麗にする技術〜 https://qiita.com/ucan-lab/items/0a128bb14528e4e52fd2 adventcalendar 2022-12-16 03:08:01
海外TECH Ars Technica Vampire Survivors‘ first DLC offers some enjoyable (but diminishing) returns https://arstechnica.com/?p=1904795 unlockables 2022-12-15 18:24:25
海外TECH Ars Technica FuboTV goes kaput during World Cup semifinals, blames “criminal cyber attack” https://arstechnica.com/?p=1904812 streaming 2022-12-15 18:13:29
海外TECH Ars Technica ArtStation artists stage mass protest against AI-generated artwork https://arstechnica.com/?p=1904570 artists 2022-12-15 18:08:01
海外TECH MakeUseOf FuboTV States World Cup Outage Was Caused by Cyberattack https://www.makeuseof.com/fubotv-states-world-cup-outage-caused-by-cyberattack/ world 2022-12-15 18:54:23
海外TECH DEV Community How to exchange a secret key over an insecure network (EC-Diffie-Hellman algorithm) https://dev.to/exemak/how-to-exchange-a-secret-key-over-an-insecure-network-ec-diffie-hellman-algorithm-1gj2 How to exchange a secret key over an insecure network EC Diffie Hellman algorithm Let s say you want to send an encrypted message to your friend in order to avoid it being intercepted and read by a third party You just generate a random secret key and encrypt the message with it Let s say you are using AES But how do you let your friend know the key to decrypt it You could give the key to your friend offline Just write it on paper and give it to him her But what if it s not an option  What if you can only use an insecure data communication channel with a middleman intercepting the messages Source of the image There is a way to securely exchange secret keys even in the presence of a third party You just exchange some information with your friend and both of you come up with the same key The middleman also sees the messages you ve exchanged But he will never be able to guess the secret key Does it sound exciting Let s see how it s possible Diffie Hellman AlgorithmThe algorithm is based on an extremely simple algebraic feature that we are all familiar with The commutative property of multiplication In other words A B C B A C C A B  …I know it doesn t seem relevant to anything yet A very rough and incomplete exampleLet s imagine the division operation doesn t exist You and your friend both know some number let s say You generate some random Private key let s say Your friend generates a random Private key too let s say You multiply your Private key by Public key Your friend multiplies his her Private key by Public key at this point we just imagine the division operation doesn t exist  You and your friend send the results of multiplication the Public keys to each other and Your friend multiplies your Public key by his Private key You multiply your friend s Public key by your Private key and this is the shared keyProfit You came up with the same value But…the only problem is that the division operation actually exists so it s extremely easy to extract the Private key from a Public key A middleman could just divide Public keys by and extract the Private keys and then just multiply the private keys by the shared number That was the general idea of the Diffie Hellman and now let s focus on an actual form Let s combine the Diffie Hellman idea with Elliptic Curve Cryptography as it s the most used implementation nowadays To fully understand the topic I highly recommend checking my article on Elliptic Curve Cryptography It requires no more than middle school math Very short Essentials of Elliptic Curves cryptographyI don t think it s possible to explain how the Elliptic curves are used in cryptography briefly But here are the most important properties We can multiply any point lying on a curve by a scalar valueThere is no feasible way to extract the scalar value back to divide a point by a scalar value or by another point A private key in elliptic curve cryptography is just a random value that s kept secretThe corresponding Public key is just a result of the multiplication of some certain point G by the Private key PublicKey PrivateKey G The G point is standardized and everyone uses it How to securely exchange the keys over a public network Let s suppose we have two parties Alice and Bob why again these names Here is a way too colorful explanation of the Diffie Hellman key exchange mechanism It may not look too pretty but the colors which occur as the results of multiplication are actually the mixes of original colors Squares indicate scalar values and the circles indicate points on an Elliptic curve Both Alice and Bob generate big random numbers and we call these numbers the Private Keys Then Alice multiplies her Private Key by the publicly known G point in order to get her Public Key And Bob multiplies his Private Key by the same point G to get his Public Key Now they both have their pairs of PrivateKey PublicKey The next step is to exchange the public keys Alice sends her Public Key to Bob And Bob sends his Public Key to Alice After that Alice and Bob have each other s Public keys but a middleman also potentially knows their Public keys If you remember Private Key can t be extracted back from the Public key So knowing the Public keys is o f no use to a middleman Then the magic happens Alice takes Bob s Public Key a point on an Elliptic curve and multiplies it into her Private Key Bob does the same He takes Alice s Public Key and multiplies it into his own Private Key They end up with the same Secret key without explicitly exchanging itActually it s a very simple math trick Let s take a look at how their Public keys are calculated Not let s look at how both parties calculate the shared keys Let s see if BobSecretKey AliceSecretKey by comparing their definitions Let s substitute AlicePublicKey and BobPublicKey with their definitions The expressions are the same If you don t yet understand why and how we are able to multiply points on Elliptic curves like numbers I recommend reading the article Both Alice and Bob now have ended up with the same SecretKey point on a curve which they didn t expose to a middleman And the middleman can do nothing with their Public Keys which he has potentially intercepted Let s implement it in PythonIn my article on Elliptic curves I have a code snippet for using the secpk elliptic curve written in Python For more details on how it works check the article s PART What s important is that we have the g point instance which has the multiply method for multiplying the point by any scalar value The return value of this method is also a point Let s pick random private keys for Alice and bob alice private key any random numberbob private key any random numberThen let s calculate the public keys for both of them alice public key g point multiply alice private key bob public key g point multiply bob private key Now let s imagine they have sent the private keys to each other Alice calculates the secret key on her side alice secret key alice public key multiply bob private key Bob calculates his secret key on his side bob secret key bob public key multiply alice private key Now let s print the secret keys print bob secret key x bob secret key y print alice secret key x alice secret key y The result It works Here is the complete Python code using zero dependencies for you to try it yourselfComplete code In case you might need it here is an online tool for running Python code right in your browserexemak gmail comt me exemakMikhail Karavaev 2022-12-15 18:25:44
Apple AppleInsider - Frontpage News Public betas for iOS 16.3, iPadOS 16.3, macOS Ventura 13.2 now available https://appleinsider.com/articles/22/12/15/public-betas-for-ios-163-ipados-163-macos-ventura-132-now-available?utm_medium=rss Public betas for iOS iPadOS macOS Ventura now availableThe first public betas for iOS iPadOS macOS Ventura and others have become available for testers signed up for Apple s public beta program A new round of public betas are availableJust a day after resuming the developer beta cycle for the next versions of its major operating systems Apple has now issued the first public betas AppleInsider does not recommend downloading beta software except for development purposes and then on dedicated hardware Read more 2022-12-15 18:28:46
Apple AppleInsider - Frontpage News Best Apple HomePod alternatives for winter 2022 https://appleinsider.com/inside/homepod/best/best-apple-homepod-alternatives?utm_medium=rss Best Apple HomePod alternatives for winter Apple s larger HomePod has been gone for over a year For folks that need more power than the HomePod mini here are our favorite AirPlay compatible smart speakers that will fill your space with as much sound as the original HomePod did Our favorite picks for AirPlay speakersThe original Apple Homepods were appreciated by a vocal contingent of fans for AirPlay compatibility full Apple ecosystem compatibility and high fidelity sounds It s since it s been discontinued and Apple has yet to hit that segment again ーalthough there are rumors that a new one is coming Read more 2022-12-15 18:20:17
海外TECH Engadget ‘Marvel's Spider-Man 2’ arrives on PS5 next fall https://www.engadget.com/spider-man-2-ps5-release-date-2023-185123502.html?src=rss Marvel x s Spider Man arrives on PS next fallSony announced the release window today for Marvel s Spider Man the sequel to s Marvel s Spider Man and s Spider Man Miles Morales The PlayStation exclusive will launch in the fall of Insomniac Games sequel continues the stories of Peter Parker and Miles Morales as they take on Venom briefly teased in the first two games We still don t know much about the web slinging sequel but at least we now have a narrower release window Last year s reveal trailer sets up the action In the official PlayStation blog Sony reiterated its roadmap beyond the superhero sequel Square Enix s role playing game Forspoken is a frantic new IP arriving on January th Hogwarts Legacy the long delayed Harry Potter adventure finally hits the PS on February th and PS on April th Meanwhile Destiny Lightfall the game s seventh expansion launches for PS on February th while the Resident Evil remake is heading to PS on March th Final Fantasy XVI introducing more in depth combat for the series launches for PS in the second or third quarter PlayStation hardware is also coming next year starting with Sony s premium and customizable DualSense Edge Wireless Controller launching on January th for Finally PS VR the follow up to Sony s six year old virtual reality headset will cost when it arrives on February nd 2022-12-15 18:51:23
海外TECH CodeProject Latest Articles Creating a Resource-Only DLL https://www.codeproject.com/Tips/5349617/Creating-a-Resource-Only-DLL creating 2022-12-15 18:37:00
海外TECH CodeProject Latest Articles VB .NET/WinForms: Create Form's MainMenu by Load Menu from Resource-Only DLL https://www.codeproject.com/Tips/5349611/VB-NET-WinForms-Create-Forms-MainMenu-by-Load-Menu functions 2022-12-15 18:36:00
海外科学 NYT > Science How to Hand Out Billions in Climate Subsidies? Very Carefully. https://www.nytimes.com/2022/12/15/climate/podesta-climate-law-fraud.html How to Hand Out Billions in Climate Subsidies Very Carefully John Podesta the White House aide overseeing new tax credits said rules were expected to be in place within months Avoiding waste and fraud is a priority 2022-12-15 18:09:11
ニュース BBC News - Home Chief nurse calls for resolution after day of strikes https://www.bbc.co.uk/news/health-63986973?at_medium=RSS&at_campaign=KARANGA lines 2022-12-15 18:00:49
ニュース BBC News - Home Eight children among 39 rescued from migrant boat https://www.bbc.co.uk/news/uk-63982143?at_medium=RSS&at_campaign=KARANGA boata 2022-12-15 18:54:53
ニュース BBC News - Home Netflix analysis: This time Harry and Meghan got personal https://www.bbc.co.uk/news/uk-63989967?at_medium=RSS&at_campaign=KARANGA meghan 2022-12-15 18:40:10
ビジネス ダイヤモンド・オンライン - 新着記事 業界研究に使える!経済ニュースの読み解き方 - 親と子のための業界・企業研究2022 https://diamond.jp/articles/-/314178 企業研究 2022-12-16 03:50:00
ビジネス ダイヤモンド・オンライン - 新着記事 ブラジルの政権交代が経済の勢いを失わせ、通貨や株価の上値を抑える理由 - 西濵徹の新興国スコープ https://diamond.jp/articles/-/314684 政権交代 2022-12-16 03:45:00
ビジネス ダイヤモンド・オンライン - 新着記事 映画「スラムダンク」のネタバレ投稿は著作権侵害になる?弁護士の見解は - 弁護士ドットコム発 https://diamond.jp/articles/-/314626 2022-12-16 03:40:00
ビジネス ダイヤモンド・オンライン - 新着記事 クオンツ戦略の成績、2000年以降で最高に - WSJ PickUp https://diamond.jp/articles/-/314673 wsjpickup 2022-12-16 03:35:00
ビジネス ダイヤモンド・オンライン - 新着記事 米中関係の危険な負のスパイラル - WSJ PickUp https://diamond.jp/articles/-/314672 wsjpickup 2022-12-16 03:30:00
ビジネス ダイヤモンド・オンライン - 新着記事 「未婚のまま40代になると気が狂う?」SNSの議論沸騰に見る偏見・世相 - News&Analysis https://diamond.jp/articles/-/314676 newsampampanalysis 2022-12-16 03:25:00
ビジネス ダイヤモンド・オンライン - 新着記事 子育ての「お金の不安」を解決!教育費200万円を楽に貯められるコツとは - ニュース3面鏡 https://diamond.jp/articles/-/314675 子育ての「お金の不安」を解決教育費万円を楽に貯められるコツとはニュース面鏡子どもが生まれると思っているよりもお金が必要…。 2022-12-16 03:20:00
ビジネス ダイヤモンド・オンライン - 新着記事 「評価は上司次第」という古い制度をまずは廃止せよ!カゴメが実現した人事改革、その神髄とは? - 進化する組織 https://diamond.jp/articles/-/314132 前野隆司 2022-12-16 03:15:00
ビジネス ダイヤモンド・オンライン - 新着記事 アイデアが溢れる時代のイノベーションに求められる「センスメイキング」の力とは - デザイン経営の輪郭 https://diamond.jp/articles/-/314396 アイデアが溢れる時代のイノベーションに求められる「センスメイキング」の力とはデザイン経営の輪郭解決すべき課題が決まっているイノベーションに必要なのは手段です。 2022-12-16 03:10:00
ビジネス ダイヤモンド・オンライン - 新着記事 デジタル化は、変革のための手段のひとつに過ぎない - 『ビヨンド・デジタル』――企業変革の7つの必須要件 https://diamond.jp/articles/-/314114 迅速 2022-12-16 03:07:00

コメント

このブログの人気の投稿

投稿時間:2021-06-17 05:05:34 RSSフィード2021-06-17 05:00 分まとめ(1274件)

投稿時間:2021-06-20 02:06:12 RSSフィード2021-06-20 02:00 分まとめ(3871件)

投稿時間:2020-12-01 09:41:49 RSSフィード2020-12-01 09:00 分まとめ(69件)