Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I asked a colleague about this recently and he explained it away with a wave of the hand saying, "different streams of tokens and their context are on different ranks of the matrices". And I kinda believed him, based on the diagrams I see on Welch Labs YouTube channel.

On the other hand, I've learned that when I ask questions about security to experts in a field (who are not experts in security) I almost always get convincing hand waves, and they are almost always proven to be completely wrong.

Sigh.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: