site banner

Friday Fun Thread for March 21, 2025

Be advised: this thread is not for serious in-depth discussion of weighty topics (we have a link for that), this thread is not for anything Culture War related. This thread is for Fun. You got jokes? Share 'em. You got silly questions? Ask 'em.

3
Jump in the discussion.

No email address required.

Sublight drive is a Star wars fan fiction. I started reading this based on a recommendation from either here or /r/rational. If it was here, thank you to whomever recommended it. Very enjoyable.

A person from earth is reincarnated in the star wars universe, and they are a ship captain with the separatists during the clone wars. The mc has some basic knowledge of star wars.

There is no boring lead up. It jumps right into the space opera action.

The characters are smart and facing very tough problems. But they are also not all perfectly intelligent. For example Jedi generals are often skilled in the force and have advantages that they use well, but they can often be outsmarted by other characters in fleet battles.

Related: I was complaining to a friend last week about the hollow worldbuilding in Star Wars, specifically about how automation should have eliminated most of the need for manual labor in this universe (but hasn't) and he sent me this surprisingly detailed Reddit post explaining how this could be explained by the story being set in a universe where P = NP: https://old.reddit.com/r/MawInstallation/comments/oysben/does_p_np_a_contemplation_of_electronic_security/

Not sure I buy this. Lack of cryptography doesn't even need to make password based authentication impossible.

Firstly, to compromise a system, even one that's not encrypted, you must be able to execute arbitrary commands. A system that's locked down and limited to a few hardened interfaces with the rest of the world is naturally robust to this. You can try pulling out the memory and read/manipulate it directly, but there are low tech (put the components behind steel plate) and high tech mitigations that don't rely on cryptography. And if you're in a position to circumvent those, you can probably just replace the controller of whatever system you're trying to compromise with your own controller anyway.

Secondly, P=NP would make reversing hashes doable, but when you're trying to break into a system you (usually) don't have the password hash you're trying to guess. So you're stuck trying to guess it (unless you can read it from memory, see point 1), and that's going to take forever regardless of P vs NP.