• Izzy@lemmy.ml
    link
    fedilink
    arrow-up
    31
    ·
    9 months ago

    If only hacking was as easy as guessing the most obvious of passwords like in War Games and in Hackers. 😅

    • philpo@feddit.de
      link
      fedilink
      arrow-up
      3
      ·
      9 months ago

      Well considering that the US nuclear launch codes were just zeros for a while, it just might be realistic.

        • philpo@feddit.de
          link
          fedilink
          arrow-up
          1
          ·
          9 months ago

          Unless someone sends the suit with the codes in it to the Chinese dry cleaners…again…and again.

          • tal@lemmy.today
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            9 months ago

            Launch codes aren’t to block China from authorizing a launch. They’re there to keep someone in the military from doing a launch without authorization. China is probably one of the parties who least wants said codes leaking.

            If you have a couple hundred people who can start a nuclear war, that war becomes a whole lot more likely than if only one can.

            From China’s standpoint, the next best number of people who can launch against them after 0 is 1.

            The British used bicycle keys on their nuclear bombs.

            http://news.bbc.co.uk/2/hi/7097101.stm

            As people learned around that time, a really great way to bypass bicycle locks is with a ballpoint pen.

            https://www.wired.com/2004/09/twist-a-pen-open-a-lock/

            That was aimed more at keeping honest people honest.

      • tal@lemmy.today
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        9 months ago

        Well considering that the US nuclear launch codes were just zeros for a while

        I’ve seen some statements that this was apocryphal.

        https://foreignpolicy.com/2014/01/21/air-force-swears-our-nuke-launch-code-was-never-00000000/

        Though you could argue – since there was a point in time prior to PALs where there was no authorization system at all – that a very functionally-similar state existed prior to the implementation of those codes.