It’s basically impossible to talk about how to secure a computer system (or how to gain covert access to one) without talking about which account has which privilege, let along things like how to ensure an unbiased random number generator, or do an analysis of who has what without looking at an intersection of sets.

  • @[email protected]OP
    link
    fedilink
    154 days ago

    Little-known fact: US sanctions are similarly keyword based. So if you call your international terrorist group Exxon, you can cause real problems for the oil company

    • @Uruanna
      link
      2
      edit-2
      3 days ago

      Ah yes, the pain of all Ancient Egypt Youtube channels these last couple decades. And the TV show Archer.