PHM was much more ambitious in its scope than either.
I enjoyed Artemis-- can't find too much fault in any book whose main character writes an extended love letter to welding-- but I enjoyed PHM much more.
Just a counterpoint, I loved Project Hail Mary. I wanted my time back after reading Children of time, and it's exceptionally rare that I feel that way about anything scifi. Tastes differ. ::shrugs::
Yesterday I linked to an implementation (with complexity quadratic in the number of errors) I helped to create in another comment in this thread.
> constant factor using Chien's search algorithm
Chien's search is only really reasonable for small field sizes... which I think doesn't really make sense in this application, where the list is long and the missing elements are relatively few.
Fortunately in characteristic 2 it's quite straight forward and fast to just factor the polynomial using the berlekamp trace algorithm.
And let me guess, this rule isn't eliminated if your property is isolated by a reduced pressure zone device?
I assume that in your post "WA" means Western Australia -- as I can't imagine this kind of absurd protectionism law flying in Washington state, even though it's a little more paternalistic than average for the US.
And of course not! As mentioned - the rule has even recently been extended to 'protect' people like us who live semi off-grid, with rainwater capture for drinking and a septic system.
Australians really seem to loooooove rules.
And of course, for the most part, nobody's actually checking this stuff and people pay varying levels of attention to the rules. Seems like a waste of time all round.
Why does any additional encryption need to be broken? Signal dark patterns users into using insecure few digit 'pins' to protect their data, then waves some SGX hokum around that as an argument as to why very short pins have acceptable security. Of course, no one with physical access / state level resources is meaningfully impaired by SGX, so the security is just a trivial pin crackable by a speak and spell.
Concerns that were all dismissed when the insecure pin system was introduced because only contacts and settings were hosted, not content. ...
It's already known that users can't choose secure passwords even without UI that tries hard to encourage an insecure choice and that the rare ones that are secure are the ones that also get lost/forgotten. As a cryptosystem "user chooses and remembers a key" is known to be broken. So backup to the cloud really just means "hand to NSA with already known broken encryption".
I enjoyed Artemis-- can't find too much fault in any book whose main character writes an extended love letter to welding-- but I enjoyed PHM much more.
reply