Profile

Cover photo
Anthony Williams
Works at Just Software Solutions Ltd
Lives in St Just, Cornwall, UK
301 followers|22,769 views
AboutPostsPhotosYouTube

Stream

Anthony Williams

Shared publicly  - 
 
Made me laugh
 
So a while ago I was thinking about what kind of personalities do computer programmers have.While I am not a psychologist these are some of the ideas I came up with.Honestly I do not consider myself a good programmer,but I ve...
5 comments on original post
1
Add a comment...
 
 
RT Meeting C++: A header-only library designed to provide C++ developers access to the modern Windows API. http://buff.ly/1ExH12i by Kenny Kerr #cplusplus
Modern C++ for the Windows Runtime
View original post
1
Add a comment...

Anthony Williams

Shared publicly  - 
7
3
Andy Collyer's profile photoRussel Winder's profile photoIngo Elsen's profile photoMichael Caisse's profile photo
 
Hahahahaaaaaa!!
Add a comment...
 
Pen and paper encryption with a one time pad
 
Andrews & Arnold's answer to David Cameron's understanding of trying to ban crypto

It's good having a sane ISP...

https://www.youtube.com/watch?v=3G8dPAdmyss
32 comments on original post
2
2
Guillaume Chatelet's profile photoChris McClelland's profile photo
Add a comment...
 
I was afraid people would use the Paris attacks to justify increasing surveillance :-(
 
Nincompoop.
Britain’s Prime Minister, David Cameron, is calling for new surveillance powers in the wake of the recent shootings in Paris. Speaking at a public event in the UK this morning, Cameron outlined the...
1 comment on original post
8
1
Jim Hague's profile photoRussel Winder's profile photo
 
Heard this on the Radio 4 news last night, and marvelled at the sheer tech brain-deadedness of what Non Digital Dave was saying.

And this morning there's nowt about it on the BBC News website. I wonder if the grown-ups have intervened and are trying to back-pedal.
Add a comment...

Anthony Williams

Shared publicly  - 
 
Ho ho ho :-)
 
[[Someone is sitting at a computer. The computer's prompt is shown.]] robm@homebox~$ sudo su Password: robm is not in the sudoers file. This incident will be reported. robm@homebox~$ [[A second person approaches.]] Person: Hey -- who does sudo report these "incidents" to ?
2 comments on original post
2
1
Chris Thomasson's profile photoKjell Hedström's profile photoRussel Winder's profile photo
2 comments
 
:)
Add a comment...
Have him in circles
301 people
Jerry Coffin's profile photo
Emily Winch's profile photo
Wolf-Michael Bolle's profile photo
Виталий Александров's profile photo
Michal Mocny's profile photo
czasami kończy się wesołym oberkiem (ale nie zawsze)'s profile photo
Frances Buontempo's profile photo
Steven List's profile photo
Anton M's profile photo

Anthony Williams

Shared publicly  - 
 
 
RT from HN: #Lockless programming with atomics in C++ 11 vs. mutex and RW-locks - ArangoDB
ArangoDB is multithreaded and able to use several CPU-cores at once. Because of that access to common data structures to these threads have to be protected from concurrent access. ArangoDB currently uses mutexes, spinlocks and RW-locks for that. With the ongoing development of the MVCC the number of situations where protected access is needed grows significantly. If locking is done too often the scalability is effectively limited to one core. So ...
View original post
1
Add a comment...

Anthony Williams

Shared publicly  - 
 
 
"Werner Koch wrote the software, known as Gnu Privacy Guard, in 1997, and since then has been almost single-handedly keeping it alive with patches and updates from his home in Erkrath, Germany. Now 53, he is running out of money and patience with being underfunded."
Werner Koch's code powers the email encryption programs around the world. If only somebody would pay him for the work.
5 comments on original post
1
1
Sergei Nikulov's profile photo
Add a comment...

Anthony Williams

Shared publicly  - 
 
 
The Snoopers' Charter is back. 4 members of the House of Lords have tabled an 18 page amendment to the Counter-Terrorism and Security Bill that is almost identical to the Communications Data Bill that we stopped in 2013.

The Lords are debating the new Snoopers Charter on Monday. Tell them to turn up and speak against the amendment!

Find Lords on Twitter or email a Random Lord on Write to Them.

https://twitter.com/ukhouseoflords/lists/peers-on-twitter/members

https://www.writetothem.com/lords
1 comment on original post
1
Add a comment...
 
 
Cameron is trying to do the full Orwell. Congratulations, exactly what the terrorists want.
In wake of Paris attacks, David Cameron targets encrypted communication services.
2 comments on original post
2
Add a comment...

Anthony Williams

Shared publicly  - 
 
My son loves ocelots
 
Baby Ocelot

Follow us for more cool posts :: +Amazing Things 
38 comments on original post
3
Add a comment...

Anthony Williams

Shared publicly  - 
 
 
The philosophy behind the 'secure' SSL connection or The Postman Always Rings Twice

Maybe you have asked yourself, how a 'secure, encrypted connection' to your bank could be built up, when no passwords or keys were exchanged before?

Imagine a travel suitcase with two locks. Now you have a postman, who transports this from you (point A) to somebody else (point B). And you don't want the postman have a look into your box. How can you do that without having to hand over the keys? Letting the postman transporting box and keys at the same time won't do!??

The solution:

You begin with locking your box with a single lock. The 'private key' to this lock you put into your pocket.
Now, you're handing over the box to the postman. He carries the locked box to point B.
The other person, the receiver, now locks the box with a second lock, also keeping his 'private key' in his pocket.
Now, the postman carries the box back to A, knocking on your door the second time. In his hands: The same box - double locked.

Now you remove your lock with your 'private key', putting lock and key into your pocket.

The postman now carries this box, just again 'single locked', but still locked, content invisible, inaccessible for the postman, back to B.

The postman knocking the second time on B's door, bringing the box, which indeed, still is locked - but no problem - B can open the box, since it's his own lock, he posesses the key for!

So lets summarize: The box was locked all the time, it was transported. The postman so had no chance to have a look into. Surprisingly, no key had to be transported.

You (A) and the receiver (B), often called "Alice" and "Bert" in cryptographic papers, never had to hand over the keys to the postman. You had them - all the time - in your own pocket.

Isn't that just amazing?? Just by transporting the double lock box two times back-and-forth, the need to reveal the key (handing over a key to the postman) simply becomes - void.

This is the core idea behind any 'public key' mechanism!

Imagine, US patent office would allow to patent such simple mechanisms, forcing the world to pay billions of $$$ license fees!!!

Now to the mechanism, how to emulate this suitcase with two locks.

From math you might know, that factoring a product of two primes, a 'decomposition' takes long. Testing a long random number for being prime, is easy, see Wikipedia. So you easily might generate long primes and multiply them, without another person to give a chance to split them up again. How can Alice and Bert now use this for emulating a suitcase with two locks?

Alice constructs a long prime (p) and a second long one (q). Alice now sends the product of these two primes to Bert:

A -> (p*q) -> B

Bert also constructs two long primes (v) and (w) and multiplying them (v*w). Bert, having received (p*q), so multiplies (p*q) with v and w, sends this back to Alice:

B -> (p*q*v*w) -> A

Alice now removes p (the first prime) by dividing the product (p*q*v*w) by p and sends it back to Bert:

A -> (q*v*w) -> B

Bert, of course knowing v and w, can divide (q*v*w) by v and w and now has - q!!!

q is the 'secret' prime now, with which Alice and Bert can encrypt their whole (SSL/SSH/...) traffic!!

Lets see, what 'the postman' saw:

The product of (p and q). No chance for him to reconstruct either p or q. The product (p,q,v,w) -> no chance to reconstruct v or w. The product (q,v,w) -> still no chance to reconstruct q.

The core idea behind is a simple regrouping of just 4 primes:

(p x q) x (v x w) becomes regrouped to p x (q x v) x w.

That's all you can know about SSL and 'asymetric key encryption':

Just two simple core ideas from 7th class math: A suitcase with two locks and a regrouping of four primes!

Happy christmas!
14 comments on original post
6
1
Nicholas Nezis's profile photo
Add a comment...
People
Have him in circles
301 people
Jerry Coffin's profile photo
Emily Winch's profile photo
Wolf-Michael Bolle's profile photo
Виталий Александров's profile photo
Michal Mocny's profile photo
czasami kończy się wesołym oberkiem (ale nie zawsze)'s profile photo
Frances Buontempo's profile photo
Steven List's profile photo
Anton M's profile photo
Work
Employment
  • Just Software Solutions Ltd
    present
Basic Information
Gender
Male
Story
Introduction
Anthony is the founder and Director of Just Software Solutions Ltd, and author of C++ Concurrency in Action.

When he's not writing bespoke software for clients, he's often to be found working on the next C++ Standard (C++0x), or writing about it. Anthony has been a member of the BSI C++ Standards Panel for a number of years, and is one of the key proponents of the multithreading support in the C++0x draft. His implementation of the C++0x thread library is available from http://www.stdthread.co.uk
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
St Just, Cornwall, UK