The links provided are nice but I will leave a comment here in case it is useful.
If I measure the temporal (dt) and spatial (dx) distance between two events A and B, then I can calculate what another observer would measure (dt' and dx') using the so-called Lorentz transformation, provided that I know his velocity relatively to me (v). The Lorentz transformation is a linear operator, written down as a matrix.
Now, the spacetime interval (ds) between A and B, is computed with the formula ds^2 = dx^2 - c^2 dt^2. The interesting property here is that the Lorentz transformation leaves ds^2 unchanged, i.e. dx^2 - c^2 dt^2 = dx'^2 - c^2 dt'^2. So, it also does not change the sign of ds^2, which determines whether light is fast enough to travel a distance dx within time dt.
The animation in the Wikipedia link by alephu5 shows the Lorentz transformation in action for a smoothly varying value of relative velocity. The events A B C are all separated by positive ('spacelike', light not fast enough) intervals, which graphically means that the line connecting them has a slope of less than 45 degrees in that graph, and the Lorentz transformation can tilt that line both ways and change the ordering of the events in the t axis. If two of these events on that graph were separated by a negative ('timelike') interval, the line connecting them would have a slope larger than 45 degrees and the Lorentz transformation could not alter their relative ordering in the t axis, meaning that all observers would agree on the ordering.
maybe this one? https://en.wikipedia.org/wiki/Ladder_paradox
depending on where you stand, the ladder can fit in the garage, or it can't. If I remember right, it's from the original special relativity paper, which is super accessible. General was always beyond me, but special is just high school math.
They will get involved as much as they have with every other breach — i.e. not at all. Even Equifax only got an extremely minor dog and pony show for the complete disaster they created.
> Hwang and his private investment firm, Archegos Capital Management, are now at the center of one of the biggest margin calls of all time -- a multibillion-dollar fiasco involving secretive market bets that were dangerously leveraged and unwound in a blink.
> One part of Hwang’s portfolio, which has been traded in blocks since Friday by Goldman Sachs Group Inc., Morgan Stanley and Wells Fargo & Co., was worth almost $40 billion last week. Bankers reckon that Archegos’s net capital -- essentially Hwang’s wealth -- had reached north of $10 billion. And as disposals keep emerging, estimates of his firm’s total positions keep climbing: tens of billions, $50 billion, even more than $100 billion.
> It evaporated in mere days.
This is the primary gist of the article. The future will tell
I use them the other way around - I do almost all my dev work in VSC these days, but I bought ST3 years ago (ST2 originally I think) and I still prefer it for opening huge log files, XML, etc. which bog down VSC.
I'm surprised by the number of comments here purporting to call this information fake, or attempting to redirect the blame toward the US. This has been well documented by multiple sources for nearly two years. The world has many problems but genocide is decidedly one of the worst.
Compromising a third-party to inject code into your public & private repositories is going to be a future supply-chain compromise similar to Solarwinds
The article only has limited details, which are near the bottom of the article:
> The company said that its research found vulnerabilities that affect symmetric encryption ciphers, including the Advanced Encryption Standard, or AES, which is widely used to secure data transmitted over the internet and to encrypt files. Using a method known as quantum annealing, the company said its research found that even the strongest versions of AES encryption may be decipherable by quantum computers that could be available in a few years from now.
> Vinokur said in an interview that Terra Quantum’s team made the discovery after figuring out how to invert what’s called a “hash function,” a mathematical algorithm that converts a message or portion of data into a numerical value. The research will show that “what was once believed unbreakable doesn’t exist anymore,” Vinokur said, adding that the finding “means a thousand other ways can be found soon.”
Quantum annealing is significantly easier than the full quantum computers required to break public-key encryption, or run Grover's algorithm. Quantum annealers are commercially available right now with thousands of qubits, and seem to be advancing quickly. If they really could break AES or find hash collisions with annealers, that would be a pretty big deal.