Your heartbeat as a password - smart or stupid?
-
Scientists from the Binghamton University in New York have explored with using a person's heartbeat as a password for encrypting and then decrypting personal data.
I guess it's a bad sign if you can't log in
This is heart-stoppingly stupid.
What do you get when you cross a joke with a rhetorical question? The metaphorical solid rear-end expulsions have impacted the metaphorical motorized bladed rotating air movement mechanism. Do questions with multiple question marks annoy you???
-
Scientists from the Binghamton University in New York have explored with using a person's heartbeat as a password for encrypting and then decrypting personal data.
I guess it's a bad sign if you can't log in
Stupid, of course. It solves no real purpose, whatsoever. Given that money gets spent on nonsense like this, it's no wonder research funding is being cut world over.
-
Scientists from the Binghamton University in New York have explored with using a person's heartbeat as a password for encrypting and then decrypting personal data.
I guess it's a bad sign if you can't log in
Since when is a heartbeat a unique and repeatable pattern? And even if it would be, how would that make it a 'better' alternative to a real password? It'd be not transferable to other people (like your pin-code is, for example), impossible to change (without some good, ehr, reading-material), and become inaccesible at death. It is a smart way of getting money, yes.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
-
Since when is a heartbeat a unique and repeatable pattern? And even if it would be, how would that make it a 'better' alternative to a real password? It'd be not transferable to other people (like your pin-code is, for example), impossible to change (without some good, ehr, reading-material), and become inaccesible at death. It is a smart way of getting money, yes.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
Eddy Vluggen wrote:
Since when is a heartbeat a unique and repeatable pattern?
Since always.
Eddy Vluggen wrote:
And even if it would be, how would that make it a 'better' alternative to a real password?
.... Wait for it... I think you might know actually....
Eddy Vluggen wrote:
It'd be not transferable to other people (like your pin-code is, for example), impossible to change (without some good, ehr, reading-material), and become inaccesible at death.
Look at that. I was right. You did know :cool: FYI, passwords in many forms are NOT TO BE EXCHANGED (sometimes under penalty of law or loss of assets). While many do this, that is the problem. I am not saying this heartbeat password is a good idea, but you did answer your own questions. Just wanted to point that out.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
-
Stupid.
:laugh:
-
Eddy Vluggen wrote:
Since when is a heartbeat a unique and repeatable pattern?
Since always.
Eddy Vluggen wrote:
And even if it would be, how would that make it a 'better' alternative to a real password?
.... Wait for it... I think you might know actually....
Eddy Vluggen wrote:
It'd be not transferable to other people (like your pin-code is, for example), impossible to change (without some good, ehr, reading-material), and become inaccesible at death.
Look at that. I was right. You did know :cool: FYI, passwords in many forms are NOT TO BE EXCHANGED (sometimes under penalty of law or loss of assets). While many do this, that is the problem. I am not saying this heartbeat password is a good idea, but you did answer your own questions. Just wanted to point that out.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
N_tro_P wrote:
Since always.
That's why it always looks the same, right? Here's news, it's not.
N_tro_P wrote:
FYI, passwords in many forms are NOT TO BE EXCHANGED (sometimes under penalty of law or loss of assets)
I'll happily challenge that in court. A password is a key to a vault, not authentication. A heartbeat might do that, but I doubt it.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
-
N_tro_P wrote:
Since always.
That's why it always looks the same, right? Here's news, it's not.
N_tro_P wrote:
FYI, passwords in many forms are NOT TO BE EXCHANGED (sometimes under penalty of law or loss of assets)
I'll happily challenge that in court. A password is a key to a vault, not authentication. A heartbeat might do that, but I doubt it.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
Eddy Vluggen wrote:
That's why it always looks the same, right? Here's news, it's not.
Maybe you should do some actual research before claiming as such. Its not that hard. Here is a simple link to guide you [LMGTFY](http://lmgtfy.com/?q=Is+a+person's+heartbeat+unique)
Eddy Vluggen wrote:
I'll happily challenge that in court.
Good luck with that. BTW, your employer, bank account, and every other password access to a network you do NOT own has such a rule or law.
Eddy Vluggen wrote:
A password is a key to a vault, not authentication.
Ummmm, wow. You are so wrong you have no clue. In an era where we are trying to build encryption you think a password is just a key. Bravo to you for still living in the 20th century.
Eddy Vluggen wrote:
A heartbeat might do that, but I doubt it.
Again, maybe you should actually go read the OP link or material behind it rather than sounding like a proud ignorant fool.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
-
Eddy Vluggen wrote:
That's why it always looks the same, right? Here's news, it's not.
Maybe you should do some actual research before claiming as such. Its not that hard. Here is a simple link to guide you [LMGTFY](http://lmgtfy.com/?q=Is+a+person's+heartbeat+unique)
Eddy Vluggen wrote:
I'll happily challenge that in court.
Good luck with that. BTW, your employer, bank account, and every other password access to a network you do NOT own has such a rule or law.
Eddy Vluggen wrote:
A password is a key to a vault, not authentication.
Ummmm, wow. You are so wrong you have no clue. In an era where we are trying to build encryption you think a password is just a key. Bravo to you for still living in the 20th century.
Eddy Vluggen wrote:
A heartbeat might do that, but I doubt it.
Again, maybe you should actually go read the OP link or material behind it rather than sounding like a proud ignorant fool.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
N_tro_P wrote:
Maybe you should do some actual research before claiming as such. Its not that hard. Here is a simple link to guide you
The only thing that varies in the beat is its speed. That may vary in a person from time to time, and I have not yet seen any mathematical evidence that the amount of possible speed-variations is unique, or that it can be used to identify someone using a previously recorded heartbeat.
N_tro_P wrote:
BTW, your employer, bank account, and every other password access to a network you do NOT own has such a rule or law.
My bank does not use a password, or I would change banks. My employer is a gray area, and yes, been there.
N_tro_P wrote:
In an era where we are trying to build encryption you think a password is just a key.
We already have encryption and authentication. If you're trying to sell an alternative, you better be good at explaining why the alternative be better.
N_tro_P wrote:
Again, maybe you should actually go read the OP link or material behind it rather than sounding like a proud ignorant fool.
I did. What I read is another rediculous claim that is bound to get funding, but which will have zero practical application.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
-
N_tro_P wrote:
Maybe you should do some actual research before claiming as such. Its not that hard. Here is a simple link to guide you
The only thing that varies in the beat is its speed. That may vary in a person from time to time, and I have not yet seen any mathematical evidence that the amount of possible speed-variations is unique, or that it can be used to identify someone using a previously recorded heartbeat.
N_tro_P wrote:
BTW, your employer, bank account, and every other password access to a network you do NOT own has such a rule or law.
My bank does not use a password, or I would change banks. My employer is a gray area, and yes, been there.
N_tro_P wrote:
In an era where we are trying to build encryption you think a password is just a key.
We already have encryption and authentication. If you're trying to sell an alternative, you better be good at explaining why the alternative be better.
N_tro_P wrote:
Again, maybe you should actually go read the OP link or material behind it rather than sounding like a proud ignorant fool.
I did. What I read is another rediculous claim that is bound to get funding, but which will have zero practical application.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
Eddy Vluggen wrote:
The only thing that varies in the beat is its speed.
Wrong. Maybe you should actually read the posted link before claiming it is not possible.
Eddy Vluggen wrote:
My bank does not use a password, or I would change banks.
LMAO!!!! Dude, your bank DOES use a password or you could not use online banking. I am pretty sure you are thinking of PIN which it states right in the agreement that you will NOT share that pin with anyone and doing so is a breach of using their services. Yet another person that refuses to read the EULA and then claims they know how the services work. :rolleyes:
Eddy Vluggen wrote:
We already have encryption and authentication.
First of all, you do realize what AUTHENTICATION is right???? Jesus man, seriously just stop. My gut is now hurting from laughing so hard.
Eddy Vluggen wrote:
A password is a key to a vault, not authentication.
:laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh:
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
-
Eddy Vluggen wrote:
The only thing that varies in the beat is its speed.
Wrong. Maybe you should actually read the posted link before claiming it is not possible.
Eddy Vluggen wrote:
My bank does not use a password, or I would change banks.
LMAO!!!! Dude, your bank DOES use a password or you could not use online banking. I am pretty sure you are thinking of PIN which it states right in the agreement that you will NOT share that pin with anyone and doing so is a breach of using their services. Yet another person that refuses to read the EULA and then claims they know how the services work. :rolleyes:
Eddy Vluggen wrote:
We already have encryption and authentication.
First of all, you do realize what AUTHENTICATION is right???? Jesus man, seriously just stop. My gut is now hurting from laughing so hard.
Eddy Vluggen wrote:
A password is a key to a vault, not authentication.
:laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh: :laugh:
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
N_tro_P wrote:
Maybe you should actually read the posted link before claiming it is not possible.
I did. You can do the same with any kind of random noise, provided you can reproduce it accurately. Reproducing a heartbeat from a particular point in time would be somewhat harder. Not impossible, but at least impractical.
N_tro_P wrote:
Dude, your bank DOES use a password or you could not use online banking.
It is not a password, but a combination of different algorithms.
N_tro_P wrote:
First of all, you do realize what AUTHENTICATION is right????
No, this is the first time I hear the word :|
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
-
N_tro_P wrote:
Maybe you should actually read the posted link before claiming it is not possible.
I did. You can do the same with any kind of random noise, provided you can reproduce it accurately. Reproducing a heartbeat from a particular point in time would be somewhat harder. Not impossible, but at least impractical.
N_tro_P wrote:
Dude, your bank DOES use a password or you could not use online banking.
It is not a password, but a combination of different algorithms.
N_tro_P wrote:
First of all, you do realize what AUTHENTICATION is right????
No, this is the first time I hear the word :|
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
Eddy Vluggen wrote:
Reproducing a heartbeat from a particular point in time would be somewhat harder. Not impossible, but at least impractical.
You clearly did not read how they are translating the data into an authentication token.
Eddy Vluggen wrote:
It is not a password, but a combination of different algorithms.
*snickers*
Eddy Vluggen wrote:
No, this is the first time I hear the word :|
Would actually explain a lot. You earlier claimed a password is not authentication and then went on to imply it is and we use it successfully. You seem to think authentication is not necessary and is not what passwords are for, and that is simply false. The password is a token that validates an identities authentication and without it all users would essentially be anonymous as anyone could claim they are anyone. BTW, if you actually read how the heart is used as a password you would have realized it is NOT just the heart beat (interval etc.). It is very obvious you did not read the material and are just spouting non sense. I will leave it to you to actually go and read the material to actually learn something rather than spouting your ignorance.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
-
Eddy Vluggen wrote:
Reproducing a heartbeat from a particular point in time would be somewhat harder. Not impossible, but at least impractical.
You clearly did not read how they are translating the data into an authentication token.
Eddy Vluggen wrote:
It is not a password, but a combination of different algorithms.
*snickers*
Eddy Vluggen wrote:
No, this is the first time I hear the word :|
Would actually explain a lot. You earlier claimed a password is not authentication and then went on to imply it is and we use it successfully. You seem to think authentication is not necessary and is not what passwords are for, and that is simply false. The password is a token that validates an identities authentication and without it all users would essentially be anonymous as anyone could claim they are anyone. BTW, if you actually read how the heart is used as a password you would have realized it is NOT just the heart beat (interval etc.). It is very obvious you did not read the material and are just spouting non sense. I will leave it to you to actually go and read the material to actually learn something rather than spouting your ignorance.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
N_tro_P wrote:
You clearly did not read how they are translating the data into an authentication token.
The word 'token' is not mentioned, and even if it is, means that the user is already authenticated. Gimme some data that is unique and can be reproduced, and we'll do the same.
N_tro_P wrote:
snickers
Even with my debit-card, and the token-generator, you'd still be unable to log in. You a bit stuck in the previous century or what? :rolleyes:
N_tro_P wrote:
You earlier claimed a password is not authentication and then went on to imply it is and we use it successfully
I did not claim, I showed how it is not.
N_tro_P wrote:
You seem to think authentication is not necessary and is not what passwords are for
No, just making a clear distinction between authorization, authentication and encryption.
N_tro_P wrote:
The password is a token that validates an identities authentication and without it all users would essentially be anonymous as anyone could claim they are anyone.
Validating an identity is usually somewhat complexer than that.
N_tro_P wrote:
BTW, if you actually read how the heart is used as a password you would have realized it is NOT just the heart beat (interval etc.).
I scanned the article, and am not interested in pseudo-intellectual drivel. Regardless which variables are extracted from the hearts beating; it is very easy to point out that they may note be as unique as claimed, and if they are, will be used as either salt or pass - both already have simpeler and proven methods. Let's digest the article, shall we? Here's the bulk of it;
Basically, scientists are proposing to replace random data (entropy) or static encryption keys with ECGs and use these unique parameters to secure a person's data.
Which means, yes, simply taking the noise the heart makes. You could do the same with farts :thumbsup: --edit You're welcome :)
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[
-
N_tro_P wrote:
You clearly did not read how they are translating the data into an authentication token.
The word 'token' is not mentioned, and even if it is, means that the user is already authenticated. Gimme some data that is unique and can be reproduced, and we'll do the same.
N_tro_P wrote:
snickers
Even with my debit-card, and the token-generator, you'd still be unable to log in. You a bit stuck in the previous century or what? :rolleyes:
N_tro_P wrote:
You earlier claimed a password is not authentication and then went on to imply it is and we use it successfully
I did not claim, I showed how it is not.
N_tro_P wrote:
You seem to think authentication is not necessary and is not what passwords are for
No, just making a clear distinction between authorization, authentication and encryption.
N_tro_P wrote:
The password is a token that validates an identities authentication and without it all users would essentially be anonymous as anyone could claim they are anyone.
Validating an identity is usually somewhat complexer than that.
N_tro_P wrote:
BTW, if you actually read how the heart is used as a password you would have realized it is NOT just the heart beat (interval etc.).
I scanned the article, and am not interested in pseudo-intellectual drivel. Regardless which variables are extracted from the hearts beating; it is very easy to point out that they may note be as unique as claimed, and if they are, will be used as either salt or pass - both already have simpeler and proven methods. Let's digest the article, shall we? Here's the bulk of it;
Basically, scientists are proposing to replace random data (entropy) or static encryption keys with ECGs and use these unique parameters to secure a person's data.
Which means, yes, simply taking the noise the heart makes. You could do the same with farts :thumbsup: --edit You're welcome :)
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[
Eddy Vluggen wrote:
The word 'token' is not mentioned, and even if it is, means that the user is already authenticated. Gimme some data that is unique and can be reproduced, and we'll do the same.
You are funny and clearly have no idea how authentication works, nor what an ECG is or the data it collects.
Eddy Vluggen wrote:
Even with my debit-card, and the token-generator, you'd still be unable to log in.
It's like you completely ignored the concept of authentication and seem to think it is the same. Seriously dude, give up. You sound like a bumbling idiot now trying to claim that a chip on your debit card is the same as authentication.
Eddy Vluggen wrote:
I did not claim, I showed how it is not.
Actually you didn't. You did just claim it and now seem to take it as truth and are mixing up security with authentication. FYI the reason chips are used in debit and credit cards has NOTHING to do with authentication and is NOT in any way shape or form close to it. The reason for it is security in that if magnetic strips are used the information can be stolen and re-used. This has NOTHING to do with the authorization of it being used, which is in fact what passwords are used for; to be specific to authenticate a user.
Eddy Vluggen wrote:
No, just making a clear distinction between authorization, authentication and encryption.
Actually you are not. You are mixing them all up. You seem to think a chip is the same as authentication and authorization which its not.
Eddy Vluggen wrote:
Validating an identity is usually somewhat complexer than that.
That is sort of the point to the research here. Maybe you actually could learn a little if you stopped for a second and thought about it, but you seem to still be thinking your stupid chip on your card is the same as authentication. Hint: Its not.
Eddy Vluggen wrote:
I scanned the article, and am not interested in pseudo-intellectual drivel.
You do realize this isn't the only article or first proposition on it right? You do also realize the article has nothing about WHAT is actually used for authentication right?
Eddy Vluggen wrote:
-
Eddy Vluggen wrote:
The word 'token' is not mentioned, and even if it is, means that the user is already authenticated. Gimme some data that is unique and can be reproduced, and we'll do the same.
You are funny and clearly have no idea how authentication works, nor what an ECG is or the data it collects.
Eddy Vluggen wrote:
Even with my debit-card, and the token-generator, you'd still be unable to log in.
It's like you completely ignored the concept of authentication and seem to think it is the same. Seriously dude, give up. You sound like a bumbling idiot now trying to claim that a chip on your debit card is the same as authentication.
Eddy Vluggen wrote:
I did not claim, I showed how it is not.
Actually you didn't. You did just claim it and now seem to take it as truth and are mixing up security with authentication. FYI the reason chips are used in debit and credit cards has NOTHING to do with authentication and is NOT in any way shape or form close to it. The reason for it is security in that if magnetic strips are used the information can be stolen and re-used. This has NOTHING to do with the authorization of it being used, which is in fact what passwords are used for; to be specific to authenticate a user.
Eddy Vluggen wrote:
No, just making a clear distinction between authorization, authentication and encryption.
Actually you are not. You are mixing them all up. You seem to think a chip is the same as authentication and authorization which its not.
Eddy Vluggen wrote:
Validating an identity is usually somewhat complexer than that.
That is sort of the point to the research here. Maybe you actually could learn a little if you stopped for a second and thought about it, but you seem to still be thinking your stupid chip on your card is the same as authentication. Hint: Its not.
Eddy Vluggen wrote:
I scanned the article, and am not interested in pseudo-intellectual drivel.
You do realize this isn't the only article or first proposition on it right? You do also realize the article has nothing about WHAT is actually used for authentication right?
Eddy Vluggen wrote:
-
Eddy Vluggen wrote:
As random noise.
You do realize that "noise" is not sound in this case and actual ELECTRICAL data right? Seriously, read the material.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
-
Eddy Vluggen wrote:
As random noise.
You do realize that "noise" is not sound in this case and actual ELECTRICAL data right? Seriously, read the material.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
It is random data. Doesn't matter how you present it, it stays that - random elephanting noise that can be replaced with the electrical signal of a recorded fart. Seriously, come up with a decent argument instead of claiming that I did not read or don't understand a word.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
-
It is random data. Doesn't matter how you present it, it stays that - random elephanting noise that can be replaced with the electrical signal of a recorded fart. Seriously, come up with a decent argument instead of claiming that I did not read or don't understand a word.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
Eddy Vluggen wrote:
It is random data.
You clearly have no clue what an EKG is. Get over yourself. You are not that bright. If it was random data it would not be used for monitoring peoples vitals. You seriously are quite arrogant about your ignorance which IMO is the worst trait a person can have.
Eddy Vluggen wrote:
claiming that I did not read or don't understand a word.
But it is so obvious I do not need any other argument. My 9 year old understands how it works better than you apparently.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
-
Eddy Vluggen wrote:
It is random data.
You clearly have no clue what an EKG is. Get over yourself. You are not that bright. If it was random data it would not be used for monitoring peoples vitals. You seriously are quite arrogant about your ignorance which IMO is the worst trait a person can have.
Eddy Vluggen wrote:
claiming that I did not read or don't understand a word.
But it is so obvious I do not need any other argument. My 9 year old understands how it works better than you apparently.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
N_tro_P wrote:
You clearly have no clue what an EKG is.
That's explained in school, and I can see my own heartbeat often enough.
N_tro_P wrote:
If it was random data it would not be used for monitoring peoples vitals.
The ECG is not random data, I said it is used as random data. It states so literally in the article:
replace random data (entropy) or static encryption keys with ECGs
..which part of the quoted sentence is too complicated for you to understand? I'll happily explain each part of that sentence.
N_tro_P wrote:
You seriously are quite arrogant about your ignorance which IMO is the worst trait a person can have.
I call it confidence and it is continuously fed by idiots proving me right. And yes, I'm enjoying this. :rolleyes:
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
-
N_tro_P wrote:
You clearly have no clue what an EKG is.
That's explained in school, and I can see my own heartbeat often enough.
N_tro_P wrote:
If it was random data it would not be used for monitoring peoples vitals.
The ECG is not random data, I said it is used as random data. It states so literally in the article:
replace random data (entropy) or static encryption keys with ECGs
..which part of the quoted sentence is too complicated for you to understand? I'll happily explain each part of that sentence.
N_tro_P wrote:
You seriously are quite arrogant about your ignorance which IMO is the worst trait a person can have.
I call it confidence and it is continuously fed by idiots proving me right. And yes, I'm enjoying this. :rolleyes:
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)
Seriously, you seem to think the writer of this article is one of the actual researchers that published the data. What part of READ THE FUCKING TOPIC do you not get? ITS NOT SOUND AND ITS NOT RANDOM! Moreover, when someone says "random data" and then puts in parenthesis "entropy" you know they don't know how the science actually works. Entropy is not random data but the natural state of chaos. That is not the same as randomness, nor is that how the science of this actually works.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
-
Seriously, you seem to think the writer of this article is one of the actual researchers that published the data. What part of READ THE FUCKING TOPIC do you not get? ITS NOT SOUND AND ITS NOT RANDOM! Moreover, when someone says "random data" and then puts in parenthesis "entropy" you know they don't know how the science actually works. Entropy is not random data but the natural state of chaos. That is not the same as randomness, nor is that how the science of this actually works.
Computers have been intelligent for a long time now. It just so happens that the program writers are about as effective as a room full of monkeys trying to crank out a copy of Hamlet. The interesting thing about software is it can not reproduce, until it can.
It is however, used as a random string. Article says so, not me. Perhaps your 9 year old can help you with understanding that sentence? :)
N_tro_P wrote:
ITS NOT SOUND AND ITS NOT RANDOM
"Noise" was not referring to sound, but to random data. You'll find it a common term. And yes, it is USED as. To make it simpeler for you; a spoon is not a knife, but it can be used as one.
Bastard Programmer from Hell :suss: If you can't read my code, try converting it here[^][](X-Clacks-Overhead: GNU Terry Pratchett)