Don Sanders Profile
Don Sanders

@Don_Sanders

Followers
161
Following
1K
Media
12
Statuses
795

Software developer and entrepreneur

Joined March 2011
Don't wanna be here? Send us removal request.
@Don_Sanders
Don Sanders
10 months
1. Is similar to Postel’s law (aka The Robustness Principle) ‘be conservative in what you do, be liberal in what you accept from others’. Maybe Marcus Aurelius inspired one of the fundamental principles of the internet?
@readswithravi
Reads with Ravi
10 months
17 powerful sentences by Marcus Aurelius that reflect his philosophy on resilience, virtue, and self-mastery:
0
0
0
@Don_Sanders
Don Sanders
3 years
In summary, sites that rely on lower case, upper case, number, special character passwords are NOT SECURE. They encourage users to select easy to guess passwords like “Password1!”. Instead password strength meters, which can give much better security should be used.
0
0
0
@Don_Sanders
Don Sanders
3 years
Another relevant paper, that introduces a better metric, the password strength meter is D. Wheeler, “zxcvbn: realistic password strength estimation,” Dropbox blog article (Apr. 10, 2012). https://t.co/6MQreBJPIO zxcvbn-realistic-password-strength-estimation/
1
0
0
@Don_Sanders
Don Sanders
3 years
the NIST SP800-63 document, does not provide a valid metric for measuring the security provided by password creation policies. This is not to cast dispersions at the rest of the SP800-63 document which is otherwise of the highest quality.”
1
0
0
@Don_Sanders
Don Sanders
3 years
“In this paper we attempt to determine the effectiveness of using entropy, as defined in NIST SP800-63, as a measurement of the security provided by various password creation policies …Our experiments categorically show that the notion of password entropy, as put forward in
1
0
0
@Don_Sanders
Don Sanders
3 years
The IEEE paper links to some of my favorite password papers including M. Weir, S. Aggarwal, M. Collins, and H. Stern, “Testing metrics for password creation policies by attacking large sets of revealed passwords,” in Proc. CCS, 2010. https://t.co/zBTLbo9PcR Quoting
1
0
0
@Don_Sanders
Don Sanders
3 years
To understand in detail start with NIST 800-63B https://t.co/MxHhvPk6cn which references the IEEE publication “Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms”
1
0
0
@Don_Sanders
Don Sanders
3 years
If a site doesn’t use a password strength meter, (like Twitter doesn’t), that’s a red flag from a cyber security perspective. Sites that rely on upper case, lower case, number plus special character passwords are insecure and not compliant with govt. regulations e.g NIST 800-63B
1
0
2
@Don_Sanders
Don Sanders
3 years
If you have access to ChatGPT4 then prompt engineering is well worth checking out. It’s the most impressive technical advance I’ve seen in a long time. Here’s a useful intro to get you started https://t.co/fhGPgPRYjO
@Don_Sanders
Don Sanders
3 years
@digitsu @HollytWolf 1/4 The proposal that minds require brains is not new, it’s been around at least as long as Searle’s Chinese room thought experiment. Furthermore we can already teach ChatGPT4 ‘simply by communicating and interacting with’ it. This process is known as prompt engineering.
0
0
0
@Don_Sanders
Don Sanders
3 years
Similarly lack of mature implementations and infrastructure appear to make other uses cases such as non-trivial smart contracts and mass long term data storage impractical at this current time.
0
0
0
@Don_Sanders
Don Sanders
3 years
My concern is that this is required to make simplified payment verification practical which is required for widespread adoption of micropayments, as outlined in the whitepaper.
1
0
0
@Don_Sanders
Don Sanders
3 years
Never met the guy, know little about him, but i’ve learnt a lot about Bitcoin from @digitsu. He doesn’t just speak truth, he highlights critical paint points in the development of digital currency that must be addressed to achieve widespread adoption. Thank you Jerry.
@digitsu
Jerry David Chan
3 years
@MineLikeAnApe @1SatOrdinals This is exciting yes, but honestly if a dev who wants to try this out still has to run a BSV mining node which requires 32GB of memory 32GB of swap and 10TB of disk space, it’s a non-starter. Can we make services work with pruned nodes already?
1
0
2
@Rainmaker1973
Massimo
3 years
I reached the hospital where VST therapies are administered, but unfortunately there's no chance for my case: according to the specialist, T-cells would target the renal tubules’ cells damaging more tissue than the virus itself. VST cell therapies are working better for BKV
121
64
953
@Rainmaker1973
Massimo
3 years
I came from hospital with a remodulated immunosuppressive therapy, but after a week the blood virus concentration skyrocketed reaching the double of the previous week value (765k copies/ml vs 359 copies/ml) and this is seriously bad, because it means my organism doesn't react to
409
906
6K