<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=WurmWoode</id>
		<title>explain xkcd - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=WurmWoode"/>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php/Special:Contributions/WurmWoode"/>
		<updated>2026-04-29T08:53:33Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:235:_Kite&amp;diff=216605</id>
		<title>Talk:235: Kite</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:235:_Kite&amp;diff=216605"/>
				<updated>2021-08-16T06:58:34Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: Connecting the dots&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I believe you are backwards on your interpretation of the title text.  If it is hard to regret; you do not regret.  Therefore you can regret awkward communication, but can't regret communications that never occurred.  In this, Randall seems to be at odds with the tone of other pages, such as the choices arc.[[Special:Contributions/138.163.106.71|138.163.106.71]] 01:50, 11 October 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
Agree on this and I have changed the explanation - I do however, believe that it is not the point that Randall tries to make - and have thus added that you can regret the missed conversation even more than a possible awkward one... [[User:Kynde|Kynde]] ([[User talk:Kynde|talk]]) 18:15, 9 January 2014 (UTC)&lt;br /&gt;
&lt;br /&gt;
==Pi day==&lt;br /&gt;
How has everyone missed this.&lt;br /&gt;
&lt;br /&gt;
Not one notices that the day relates to {{w|Transcendentalism}}, and that relates to ''{{w|Walden|Life in the Woods}}'', which relates to {{w|Henry David Thoreau|Thoreau}}, who put it quintesentially: &lt;br /&gt;
&lt;br /&gt;
::&amp;quot;I went to the woods because I wished to live deliberately, to front only the essential facts of life, and see if I could not learn what it had to teach, and not, when I came to die, discover that I had not lived.&amp;quot;&lt;br /&gt;
[[User:WurmWoode|WurmWoode]] ([[User talk:WurmWoode|talk]]) 06:58, 16 August 2021 (UTC)&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=267:_Choices:_Part_4&amp;diff=216604</id>
		<title>267: Choices: Part 4</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=267:_Choices:_Part_4&amp;diff=216604"/>
				<updated>2021-08-16T06:05:36Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Explanation */ grammar&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 267&lt;br /&gt;
| date      = May 24, 2007&lt;br /&gt;
| title     = Choices: Part 4&lt;br /&gt;
| image     = choices_part_4.jpg&lt;br /&gt;
| titletext = Making out with yourself: now an official xkcd theme? Troubling.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
This is the {{w|existentialistic}} {{w|climax (narrative)|climax}} of the Choices series. It takes up the recurring [[xkcd]]-theme how people tend to be blind towards the staggering amount of possibilities that each day holds, with routine and boredom as a result. (See e.g. [[137: Dreams]] and [[706: Freedom]].)&lt;br /&gt;
&lt;br /&gt;
The [[Megan]]-clone implies that Megan has been taken to some kind of {{w|afterlife}} or parallel universe outside reality. It's not a dream, but she will not remember this place when she goes back. But the clone hopes that these hints will stay with her. Realizing that she would not remember being here, Megan suddenly realizes that she might already have been here before. And the clone admits that she has taken her to this place once before. Although not for another hint; actually it was to make out with herself. And then she quickly says ''bye''.&lt;br /&gt;
&lt;br /&gt;
The title text makes it clear that the Megan-clone did actually bring her previously into this place just to make out, and then refers to this being the second time this has been a theme, [[105: Parallel Universe]] being the first. [[Randall]] appears to find this a little troubling (or it may be that he suspects his readers will).&lt;br /&gt;
&lt;br /&gt;
The series was released on 5 consecutive days (Monday-Friday). All parts of &amp;quot;[[:Category:Choices|Choices]]&amp;quot;:&lt;br /&gt;
*[[264: Choices: Part 1]]&lt;br /&gt;
*[[265: Choices: Part 2]]&lt;br /&gt;
*[[266: Choices: Part 3]]&lt;br /&gt;
*[[267: Choices: Part 4]]&lt;br /&gt;
*[[268: Choices: Part 5]]&lt;br /&gt;
&lt;br /&gt;
As this was the fourth in the series, it was released on a Thursday.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Megan in a bubble is floating in outer space (on a dark blue background) next to her clone outside the bubble. Megan is simulating sitting down in the middle of the bubble. The clone reaches one arm out toward the bubble. There is no line from the first part of the clone's text to the rest of the text. It is given from the context who speaks. There are always more stars in the panels to the left than those to the left.]&lt;br /&gt;
:Clone: I shouldn't do this, but I pulled you out for a moment to give you a hint.&lt;br /&gt;
:Megan: A hint?&lt;br /&gt;
:Clone: Take wrong turns. Talk to strangers. Open unmarked doors. And if you see a group of people in a field, go find out what they're doing. Do things without always knowing how they'll turn out.&lt;br /&gt;
&lt;br /&gt;
:[Megan leans towards the clone, the clone &amp;quot;lies&amp;quot; on her tummy with arms forward and legs lifted up.]&lt;br /&gt;
:Megan: Why tell me this?&lt;br /&gt;
:Clone: You're curious and smart and bored, and all you see is the choice between working hard and slacking off. There are so many adventures that you miss because you're waiting to think of a plan. To find them, look for tiny interesting choices. And remember that you are &amp;lt;u&amp;gt;al&amp;lt;/u&amp;gt;ways making up the future as you go.&lt;br /&gt;
&lt;br /&gt;
:[Megan is &amp;quot;sitting&amp;quot; down with her hands on her knees. The clone stands and lifts an arm up.]&lt;br /&gt;
:Megan: So, wait, what ''is'' this place? Am I going to wake up thinking this was a dream?&lt;br /&gt;
:Clone: This is... Think of this as after the game, outside the theatre. To go in, I had to suspend disbelief, forget the outside.&lt;br /&gt;
&lt;br /&gt;
:[Megan again leans towards the clone; the clone spreads out her arms.]&lt;br /&gt;
:Megan: So you... Huh. Why give me hints I'm going to forget?&lt;br /&gt;
:Clone: You'll forget this trip but I think the hints should stay with you.&lt;br /&gt;
:Megan: ...If this is a game, are you— are ''we''— cheating?&lt;br /&gt;
:Clone: Yup.&lt;br /&gt;
&lt;br /&gt;
:[Megan still leans towards the clone. The clone leans a little back, her arms down.]&lt;br /&gt;
:Megan: Is that a good idea?&lt;br /&gt;
:Clone: Well it's an interesting one.  We'll see how it goes.&lt;br /&gt;
:Megan: Well, I guess I'll see you aroun—&lt;br /&gt;
&lt;br /&gt;
:[Megan leans towards the clone with a hand up, the clone leaning even more back, almost like she is falling backwards.]&lt;br /&gt;
:Megan: Wait a minute; have you brought me here before?&lt;br /&gt;
:Clone: I ... Maybe. Once.&lt;br /&gt;
:Megan: For another hint?&lt;br /&gt;
:Clone: Er. &lt;br /&gt;
:Clone: Actually we just made out.&lt;br /&gt;
:Megan: We wh—&lt;br /&gt;
:Clone: Bye!&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Choices]]&lt;br /&gt;
[[Category:Comics sharing name|Choices]]&lt;br /&gt;
[[Category:Comics featuring Megan]]&lt;br /&gt;
[[Category:Sex]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=266:_Choices:_Part_3&amp;diff=216603</id>
		<title>266: Choices: Part 3</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=266:_Choices:_Part_3&amp;diff=216603"/>
				<updated>2021-08-16T06:01:31Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Explanation */ grammar&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 266&lt;br /&gt;
| date      = May 23, 2007&lt;br /&gt;
| title     = Choices: Part 3&lt;br /&gt;
| image     = choices_part_3.jpg&lt;br /&gt;
| titletext = Wait, this is space -- how are you talking to me? And, as an afterthought, what's up with the hole in reality?&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
[[Megan]] is very unsure about what to think of her situation. Is it a dream? Is she in danger? She should be scared but isn't, and it does not feel like a dream, i.e. it feels real even though she suspects it is a dream. This would usually never be the case. If your dream feels realistic, you do not usually consider that you are dreaming.&lt;br /&gt;
&lt;br /&gt;
Suddenly someone talks off-panel and tells Megan that she has been found. When Megan asks the speaker who it is, reality becomes even more distorted, and suddenly she finds that she is looking at herself outside the sphere. And the two Megans say hi...&lt;br /&gt;
&lt;br /&gt;
In the title text, she realizes that if she were in real space, she wouldn't be able to hear any {{w|sound}}, like the voice talking to her, due to the lack of atmosphere. As an afterthought, she decides to ask about the hole in reality (which many people would consider to be more unusual than sound in space).&lt;br /&gt;
&lt;br /&gt;
The series was released on 5 consecutive days (Monday-Friday). All parts of &amp;quot;[[:Category:Choices|Choices]]&amp;quot;:&lt;br /&gt;
*[[264: Choices: Part 1]]&lt;br /&gt;
*[[265: Choices: Part 2]]&lt;br /&gt;
*[[266: Choices: Part 3]]&lt;br /&gt;
*[[267: Choices: Part 4]]&lt;br /&gt;
*[[268: Choices: Part 5]]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A white Megan floats in a bubble against a dark blue space backdrop. She is at the top of the bubble. Her thoughts (not connected to her by a speak line) are shown above her in white.]&lt;br /&gt;
:Megan (thinking): I should feel scared.&lt;br /&gt;
&lt;br /&gt;
:[She falls from the top of the bubble, the bubble rises, or both.]&lt;br /&gt;
:Megan (thinking): But I don't.&lt;br /&gt;
&lt;br /&gt;
:[She hits the bottom of the bubble, and the bubble begins to fall down.]&lt;br /&gt;
:Megan (thinking): Maybe this is a dream.&lt;br /&gt;
&lt;br /&gt;
:[She floats over the top of the now still bubble.]&lt;br /&gt;
:Megan (thinking): But it doesn't feel like one.&lt;br /&gt;
&lt;br /&gt;
:[She now floats in the middle of the still bubble, in a larger panel. The sky behind her now has many stars and light effect. A voice speaks from off-panel above.]&lt;br /&gt;
:Voice (off panel): Okay, found you.&lt;br /&gt;
:Megan: Who are you?&lt;br /&gt;
:Voice (off panel): Er, hang on. &lt;br /&gt;
:Voice (off panel): This next part might be a little weird.&lt;br /&gt;
&lt;br /&gt;
:[Beat panel, where Megan just floats in her bubble on the same background, but in a smaller panel.]&lt;br /&gt;
&lt;br /&gt;
:[A large panel where many distorted copies of Megan whirl around the original Megan in her bubble; she also bends backwards. The stars and light display in the background is more clear around her bubble, that now creates a lens effect, that even distorts the distorted Megans even more. Around her bubbles edge and the lens edge, there are three places where brown lines appear on both these edges.]&lt;br /&gt;
&lt;br /&gt;
:[All the copies have disappeared except for one who is hanging suspended outside Megan in her bubble. The new one is almost a mirror image, but not quite. The background is more dark blue, with fewer features.]&lt;br /&gt;
&lt;br /&gt;
:[The Megan copy raises her hand and speaks. There are again more stars in the background.]&lt;br /&gt;
:Megan copy: Sorry — hi, me.&lt;br /&gt;
:Megan: ...Hi.&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Choices]]&lt;br /&gt;
[[Category:Comics sharing name|Choices]]&lt;br /&gt;
[[Category:Comics featuring Megan]]&lt;br /&gt;
[[Category:Space]]&lt;br /&gt;
[[Category:Physics]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1505:_Ontological_Argument&amp;diff=215905</id>
		<title>1505: Ontological Argument</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1505:_Ontological_Argument&amp;diff=215905"/>
				<updated>2021-08-02T17:46:59Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Explanation */ fix &amp;quot;is was&amp;quot; &amp;quot;it was&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1505&lt;br /&gt;
| date      = March 30, 2015&lt;br /&gt;
| title     = Ontological Argument&lt;br /&gt;
| image     = ontological argument.png&lt;br /&gt;
| titletext = A God who holds the world record for eating the most skateboards is greater than a God who does not hold that record.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
{{w|Ontology}} is the study of {{w|being}}, {{w|reality}}, and {{w|existence}}. “The {{w|ontological argument}}” is an attempt at proving the existence of {{w|God}} through reasoning about the {{w|nature}} of “being”.&lt;br /&gt;
&lt;br /&gt;
[[Megan]]'s statement in the comic is likely a reference to what is considered the first ontological argument, that of 11th Century philosopher {{w|Anselm of Canterbury}}. His argument starts by defining God as “that than which nothing greater can be {{w|conceive}}d”. Another step in the argument is that you can conceive of such a being even if you don't believe it exists. Yet another step is the statement that a being, of which one can conceive, and which exists, is certainly greater than a being of which one can conceive and which does not exist. Implicit in the argument are two essential premises, both of which are controversial.  These are a) that the existence of such a being is possible, and b) that existence is a great-making quality.&lt;br /&gt;
&lt;br /&gt;
The comic makes fun of Anselm's ontological argument by extending to absurdity the claim that a being who exists is greater than one who does not exist, and that therefore God must exist. A God who can disprove the ontological argument must be greater than one who cannot disprove the ontological argument, therefore the ontological argument proves the existence of a God that disproves it. This argument, though a joke, carries some weight. If the Anselm's argument is sound, then disproving it is impossible, and God cannot do it.  But if doing things is a great-making quality (a common assumption), then surely doing impossible things would be an even stronger great-making quality. Therefore the argument is able to be disproven, albeit only by God, which contradicts the initial premise that the argument is sound. Therefore, either doing things is not great-making, or the entire ontological argument is invalid reasoning.&lt;br /&gt;
&lt;br /&gt;
The [[title text]] carries the absurdity a step further.&lt;br /&gt;
&lt;br /&gt;
The comic also may be drawing an analogy to the {{w|omnipotence paradox}}, as it also refers to the idea that God's power would be greater if He could do the logically impossible. If [[Randall]] believes that Anselm's ontological argument is logically sound and based on true premises, then he should think it is impossible to disprove. Therefore, he references the omnipotence paradox by requiring that God do such an impossible thing in order to have maximally great power.&lt;br /&gt;
&lt;br /&gt;
A popular parody of the ontological argument is that of {{w|Richard Dawkins}}, in his best-selling book “{{w|The God Delusion}}”. His parody is a version of the argument which attempts to prove that God does not exist. It is similar in approach to this comic and to the omnipotence paradox, in that it also requires a God that can do the logically impossible. In Dawkins' version—[http://en.wikipedia.org/w/index.php?title=Ontological_argument&amp;amp;oldid=691165762#Douglas_Gasking borrowed from the Australian philosopher Douglas Gasking]—God's greatness is demonstrated by his creation of the world. A being that somehow overcomes the great handicap of not existing and goes on to create the world would certainly be greater than a being that exists and creates the world. Therefore God, who by definition is “that than which nothing greater can be conceived”, must not exist.&lt;br /&gt;
&lt;br /&gt;
Another, rather more famous parody, but which is entirely unrelated to the comic in approach, is that of {{w|Gaunilo of Marmoutiers}}, in which he argues for the existence of a maximally great island. This parody, added to the comic, seems to tell us what happened to the legendary {{w|Atlantis}}. It is worth noting that Anselm himself rebutted Gaunilo's argument, claiming that it was based on a fundamental misunderstanding of Anselm's original argument.&lt;br /&gt;
&lt;br /&gt;
Not all ontological arguments for the existence of God rely on the notion that a God that exists is greater than one that does not exist. Examples include the modal ontological argument from {{w|Alvin Plantinga}}, and {{w|Gödel's ontological proof}}. {{w|Graham Oppy}}, an authority on ontological arguments, attempts to classify [http://plato.stanford.edu/entries/ontological-arguments/ here] what exactly makes arguments ontological; he concludes that it is that they are a priori in nature. He also classifies them into eight categories: {{w|definitional}}, {{w|conceptual}}, {{w|modal}}, {{w|Meinongian}}, {{w|experiential}}, {{w|mereological}}, {{w|higher order}}, and {{w|Hegelian}}.&lt;br /&gt;
&lt;br /&gt;
This comic, in particular in the way Megan and [[Cueball]] are walking and in its reference to theology, greatly resembles the earlier comic [[1315: Questions for God]].&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Megan and Cueball are walking side-by-side.]&lt;br /&gt;
:Megan: ...but wouldn't a God who could find a flaw in the ontological argument be even '''''greater?'''''&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics featuring Megan]]&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;br /&gt;
[[Category:Philosophy]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1991:_Research_Areas_by_Size_and_Countedness&amp;diff=203347</id>
		<title>1991: Research Areas by Size and Countedness</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1991:_Research_Areas_by_Size_and_Countedness&amp;diff=203347"/>
				<updated>2020-12-16T03:37:11Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Explanation */ fx typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1991&lt;br /&gt;
| date      = May 9, 2018&lt;br /&gt;
| title     = Research Areas by Size and Countedness&lt;br /&gt;
| image     = research_areas_by_size_and_countedness.png&lt;br /&gt;
| titletext = Mathematicians give a third answer on the vertical axis, &amp;quot;That question is poorly defined, but we have a sub-field devoted to every plausible version of it.&amp;quot;&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
This comic is a [[:Category:Scatter plots|scatter plot]] that ranks different research fields according to the precision of the knowledge of the number of the studied object (vertical axis) vs. how large (the size of) the studied object is on the horizontal axis. &lt;br /&gt;
&lt;br /&gt;
For instance, the facts pertaining to the number of United States presidents are well known (although the exact number is disputed in that Grover Cleveland is usually counted twice, because he served non-consecutive terms, so the official count exceeds the number of unique Presidents), so the study of their history is at the top of the Y-axis. This study is placed close to the Y-axis as the size of a president is about midway in size between the two extremes of the X-axis, elementary particles to the left (small) and the entire cosmos (cosmology) to the right (big). &lt;br /&gt;
&lt;br /&gt;
On the X-axis, Presidents are close to the middle. Both presidents and other larger life forms (as a research area) including extinct animals (paleontology) and exobiology are all close to the same central position just right of the Y-axis, with smaller animals like birds and insects just to the left of the Y-axis. But where the number of presidents is well known (aside from the dispute about Cleveland), then the number of exoplanet life forms (exobiology) is completely unknown (and would likely be affected by other disputes, such as whether something the size of Pluto counts as a planet) and thus it will be found at the very bottom of the Y-axis, since we have no idea if there are life elsewhere and if so how many places will it be and how varied.&lt;br /&gt;
&lt;br /&gt;
The 19 research areas are listed and explained in the [[#Tables of research areas|tables]] below.&lt;br /&gt;
&lt;br /&gt;
In the title text, mathematicians may give a third answer that the concept of counting the things being studied is not reasonable, because the things are abstract or otherwise not discrete.  There are many different types of math that blend into each other, and many have turned into separate sub-disciplines based on different interpretations of fundamental rules.  As a specific example in geometry, different interpretations of how many lines you may draw parallel to another line through a given point has lead to hyperbolic (infinite parallel lines) and spherical (0 parallel lines) geometric systems that are just as valid (and valuable, in some contexts) as the more commonly known Cartesian (1 parallel line) geometry.  As a specific example of the blending, number theory and set theory and topology all interrelate and it is difficult to concretely say whether many theorems belong to one branch of math or another.&lt;br /&gt;
&lt;br /&gt;
==Tables of research areas==&lt;br /&gt;
For a table with the coordinates given in percentage for each research field, see the table in the [[#Trivia|trivia]] section&lt;br /&gt;
&lt;br /&gt;
===Upper left quadrant===&lt;br /&gt;
This is the section with the small items with count known.&lt;br /&gt;
&lt;br /&gt;
{| class = &amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Research field&lt;br /&gt;
! Size of the thing&lt;br /&gt;
! Knowledge of #&lt;br /&gt;
! Explanation&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Elementary particle physics}}&lt;br /&gt;
| The smallest subjects that we have actually detected are the {{w|elementary particles}}. In the {{w|Standard Model}} of particle physics, they are considered point masses (i.e. to have zero width). They may be made of smaller {{w|String theory|strings}} but if so these have still not been detected.&lt;br /&gt;
| We think we have a fairly good estimate of how many elementary particles that are known. There could be some uncertainty though, so it is not at the very top.&lt;br /&gt;
|Elementary particle physics is concerned with the study of subatomic particles (the smallest things that we know of), of which there are 17, not including antimatter. Most notably, until recently it was uncertain whether the {{w|Higgs boson}} was one of the elementary particles, but scientists have a &amp;quot;pretty good estimate&amp;quot; because the mathematical models don't predict the existence of many other particles&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Dentistry}}&lt;br /&gt;
|Several mm to several centimeters&lt;br /&gt;
|Most teeth are visible to the naked eye, and dentists have x-ray technology to see what's not visible, so counting them is pretty straightforward.&lt;br /&gt;
|Dentistry is the study of teeth (pretty small, both in size as well as in quantity). Humans adults grow 32 teeth, which is a &amp;quot;pretty good estimate&amp;quot; since it is very rare for {{w|Hyperdontia|more than 32 teeth to grow}} and it is rather common for {{w|wisdom teeth}} to be surgically extracted or in some cases never to develop. Children may only have 20 teeth before they start falling out, but each tooth that falls out is because another tooth is growing underneath, so a child might have as many as 52 teeth, counting the child teeth that haven't fallen out yet plus the adult teeth that are starting to form.  So while a dentist will usually have a good idea how many teeth will be in a patient's mouth, they won't know for sure until they look or consult dental records.&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Shakespeare}} studies&lt;br /&gt;
|Most are the size of typical book.  In printed form, they would be in the range of tens of centimeters in height and width and ~1 centimeter in depth.  Although, if stored in digial form, they could be much smaller than a tooth, so it seems to refer to print or handwritten originals.&lt;br /&gt;
|Generally, 36 plays are attributed to him, but between 1 and 3 additional plays are considered &amp;quot;lost&amp;quot; (i.e. at some point between being first published or performed and scholars seriously studying Shakespeare, all known copies, references, and fragments were destroyed, making it impossible to determine whether Shakespeare actually wrote them or whether they actually existed as separate plays), and {{w|Shakespeare apocrypha|some 20 more}} are believed to have been written by him, but not signed. To make matters worse, some plays that ''were'' published or performed under Shakespeare's name are believed to have been written as collaborations (not fully by him) or mis-attributed (we don't know who wrote them but everyone says it was him).&lt;br /&gt;
|Shakespeare studies is concerned with the works of William Shakespeare. &lt;br /&gt;
|-&lt;br /&gt;
|{{w|Ornithology}}&lt;br /&gt;
|Birds tend to be small, with most species able to be held comfortably in hand; even the largest known flying bird, the {{w|Condor}}, stands smaller than the average human, with a handful of non-flying avians such as the {{w|ostrich}} being larger, but still weighing less than 2-3 humans.&lt;br /&gt;
|The number of known bird species is [https://en.wikipedia.org/wiki/Bird#Diversification_of_modern_birds estimated at about 10,000], though [https://www.amnh.org/about-the-museum/press-center/new-study-doubles-the-estimate-of-bird-species-in-the-world a 2016 research result] suggested a near-doubling of this figure. As for the number of individual birds, a paper aptly titled [https://link.springer.com/article/10.1023/A:1018341530497 &amp;quot;How many birds are there?&amp;quot;] examines a number of ways of counting them; the results are &amp;quot;surprisingly consistent&amp;quot;, with counts of approximately 200-400 billion individual birds.&lt;br /&gt;
|We do have a &amp;quot;pretty good estimate&amp;quot;, to within perhaps a factor of two.&lt;br /&gt;
|-&lt;br /&gt;
|Ancient {{w|literature}}&lt;br /&gt;
|As above, with Shakespeare plays, original or print reproductions would be the size of a book, typically.  Although ancient {{w|scrolls}} may have different dimensions with similar total volume.&lt;br /&gt;
|Because of the high number of {{w|lost works}}, it is hard to have a solid estimate of the number, although rough lists have been made (e.g. {{w|Ancient literature#List of ancient texts}}).&lt;br /&gt;
|While it is fairly straightforward to look up how many books [http://www.proquest.com/products-services/Books-in-Print.html are currently in print], or how many books [https://mashable.com/2010/08/05/number-of-books-in-the-world/ all currently printed information would fit into if bound into equal-length volumes], and then limiting those estimates to those that date before a specific year, counting how many books from the period of interest haven't survived to the present day (books that were &amp;quot;{{w|lost work|lost}}&amp;quot; either by deliberate discontinuation, or accidental destruction such as in the {{w|Destruction of the Library of Alexandria|Library of Alexandria}}) is a bit more difficult. However, because we know the work existed (it is mentioned by name in some other text), we have &amp;quot;pretty good estimate&amp;quot; that the number of lost works is &amp;quot;only&amp;quot; in the tens of thousands, as is the number of surviving works.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Upper right quadrant===&lt;br /&gt;
This is the section with the big items with count known.&lt;br /&gt;
&lt;br /&gt;
{| class = &amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Research field&lt;br /&gt;
! Size&lt;br /&gt;
! Knowledge of #&lt;br /&gt;
! Explanation&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Marine mammal|Marine}} {{w|Mammalogy|Mammology}}''[sic]''&lt;br /&gt;
|They range in size from the {{w|Marine Otter}} (about 1m) to the {{w|Blue Whale}} (up to 30m).&lt;br /&gt;
|About 125 non-extinct species.&lt;br /&gt;
|Marine mammals are the largest extant animals. The US Government [http://www.nmfs.noaa.gov/pr/species/mammals/ recognizes] 119 marine mammals. However, what constitutes each species is [https://www.marinemammalscience.org/species-information/list-marine-mammal-species-subspecies/ constantly being revised], with new studies indicating either that what used to be considered a subspecies is actually a separate species, or that what used to be considered a separate species is actually a subspecies. As the depths of the ocean are further explored, species that were outright unknown are spotted and need to be classified. However, since marine mammals breathe air and thus must surface, it's likely that all species have been observed by scientists.&lt;br /&gt;
|-&lt;br /&gt;
|{{w|List_of_Presidents_of_the_United_States|Presidential History}}&lt;br /&gt;
|All presidents are {{w|Heights of presidents and presidential candidates of the United States|human-sized}}, with the tallest being {{w|Abraham Lincoln}} at 6 ft 4 in and the shortest being {{w|James Madison}} at 5 ft 4 in.&lt;br /&gt;
|As of 2018, 45 people (only 44 are unique; Grover Cleveland is counted twice because his terms were not consecutive) have served or are serving as President of the United States.&lt;br /&gt;
|Presidents are generally considered &amp;quot;big&amp;quot; men in history. Therefore, each one is fairly well known and documented. There is, however, some discussion on how many presidents there have been in the history of the United States, since prior to the {{w|Twenty-fifth Amendment to the United States Constitution|25th amendment}}, it was unspecified whether vice presidents counted as presidents during the President's absence. Most notably, this ambiguity is the reason {{w|David Rice Atchison}}'s tombstone is inscribed with the words &amp;quot;President of the United States for one day&amp;quot; (he was not eligible and did not accept the duties even if he was). &lt;br /&gt;
|-&lt;br /&gt;
|{{w|Railway engineering}}&lt;br /&gt;
|Railways can span across countries, and therefore are fairly large&lt;br /&gt;
|As railroads are built by humans, we know pretty well how many there are. However small systems(parks, mines) may make this number uncertain.&lt;br /&gt;
|A railway can span anywhere from a few hundred feet, to thousands of miles, so they're pretty big. The type of a railway is generally given by its {{w|track gauge}}, which is defined as &amp;quot;standard&amp;quot; (the usual gauge for a region or country), &amp;quot;narrow&amp;quot; (rails closer together than that standard) and &amp;quot;broad&amp;quot; (rails farther apart than that standard). Since what is standard varies from country to country, and indeed from line to line, how many kinds of &amp;quot;narrow&amp;quot; gauge and &amp;quot;broad&amp;quot; gauge exist depend on who you ask. However, whereas every region has ''a'' standard gauge, &amp;quot;{{w|standard-gauge railway}}&amp;quot; has a specific meaning used by rail technicians and enthusiasts worldwide, of a track with rails 1435 mm (4 ft 8.5 in) apart. Anything narrower than that is often described as a narrow-gauge line, even if it is the standard gauge for a particular rail network.&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Geology}}&lt;br /&gt;
|The {{w|Earth}} is larger, by far, than everything else on the chart except the universe (Cosmology), Black Holes, and God (at least under some conceptions, see &amp;quot;Theology&amp;quot; below).&lt;br /&gt;
|There is only one Earth (at least if you set aside the possibility of multiverses, see below in Cosmology).&lt;br /&gt;
|Geology is generally considered the study of rocks (small rocks being considered fragments of mountain layers, so what counts as a &amp;quot;rock&amp;quot; for a geologist can be pretty big). There is no universally agreed upon number to how many {{w|List of rock types|types of rock}} there are, but all geologists agree they can be grouped into igneous, metamorphic, and sedimentary rock. Alternatively, geology can be construed as the study of the planet Earth's composition ( *geo*- meaning &amp;quot;Earth&amp;quot; ), and geologists are confident that the planet Earth is big and there is only one of it.&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Cosmology}}&lt;br /&gt;
| As this encompasses (at least) all of the visible parts of the {{w|universe}} we live in, there can be no other &amp;quot;items&amp;quot; to study that would be larger.&lt;br /&gt;
| There is only one visible universe, but there could be multiverses/parallel universes, and also an infinite universe beyond the borders of our own part of this universe's event horizon. So it depends on who you ask if they say there is one of and infinite number of universes to study, thus it is placed close to the middle of the two extremes.&lt;br /&gt;
|Cosmology is the study of the universe.  There is an asterisk with the note &amp;quot;Depends on who you ask&amp;quot;, relating to the estimate of how many universes there are.  While it might seem obvious that there is only one universe, some branches of physics believe that our universe is part of a {{w|multiverse}}, and this remains an open and contested subject in the field.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Lower left quadrant===&lt;br /&gt;
This is the section with the small items with count unknown.&lt;br /&gt;
&lt;br /&gt;
{| class = &amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Research field&lt;br /&gt;
! Size&lt;br /&gt;
! Knowledge of #&lt;br /&gt;
! Explanation&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Mycology}}&lt;br /&gt;
|microscopic to a few miles&lt;br /&gt;
|Estimated at 2.2 million to 3.8 million species.(Though of these only about 120,000 have been described.)&lt;br /&gt;
|Mycology is the study of fungi (since fungi tend to grow flat -- excepting for mushrooms, which are their sexual organs, and do not exceed a foot in height (see [http://www.isciencetimes.com/articles/5740/20130729/giant-fungus-china-mushroom-world-s-largest-size.htm World's Largest mushrooms] -- mushrooms are generally considered small). Many fungi are microscopic, but some get to be a few miles in diameter.[http://www.nationalgeographic.com.au/nature/the-worlds-largest-living-organism.aspx The World's largest living organism.]  It is a lot harder to discern which species a fungus is, and therefore classify it, so we &amp;quot;have no idea&amp;quot; how many kinds of fungi there are. Studies [https://www.ncbi.nlm.nih.gov/pubmed/21613136 vary wildly] between about 70,000 to over 5,000,000. There is a comic named after this study: [[1664: Mycology]].&lt;br /&gt;
|-&lt;br /&gt;
|[[1012: Wrong Superhero|Entymology]]&lt;br /&gt;
| For insects, from a fraction of a mm to several 100.&lt;br /&gt;
| Estimated from 1,000,000 to 3,000,000&lt;br /&gt;
|It is unclear whether [[Randall]] means {{w|entomology}} or {{w|etymology}} (probably neither; it's likely that this wasn't a mistake and it is possibly a direct reference to [[1012: Wrong Superhero]]). In either case, [https://www.ncbi.nlm.nih.gov/pubmed/28938083 estimates for insects] (entomology) vary from less than 1,000,000 to 30,000,000; and [https://www.quora.com/How-many-root-words-are-there-in-the-English-language estimates for root words] (etymology) reaching hundreds of thousands.  Entomology was mentioned in the title text of [[1610: Fire Ants]].&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Microbiology}}&lt;br /&gt;
|The {{w|Smallest organisms|smallest viruses}} are around 30nm long. The largest bacterium may reach almost 1mm.[https://curiosity.com/topics/the-worlds-largest-bacterium-is-visible-to-the-naked-eye-curiosity/]. &lt;br /&gt;
|120,000 to 10,000,000+.&lt;br /&gt;
|Microbiology studies microscopic (too small to see) organisms, of which some 1,400 are known and &amp;quot;estimates for the total number of microbial species vary wildly, from as low as 120,000 to tens of millions and higher&amp;quot;, according to [https://www.quora.com/How-many-root-words-are-there-in-the-English-language Nature magazine]. &lt;br /&gt;
|-&lt;br /&gt;
|{{w|Pharmacology}}&lt;br /&gt;
|{{w|Drugs}}, including {{w|medications}} and {{w|recreational drug use|illegal and recreational drugs}} are molecules which are sub-microscopic (in the range of nanometers).&lt;br /&gt;
|Although it is possible to tally all the known drugs, this is at the extreme low end of the pile because the number of possible organic compounds is nearly infinite and the fraction of those are bioactive is completely unknown.&lt;br /&gt;
|The number of drugs (pharmaceuticals) discovered and synthesized is not tallied, according to [https://www.raps.org/regulatory-focus%E2%84%A2/news-articles/2014/10/how-many-drugs-has-fda-approved-in-its-entire-history-new-paper-explains recent studies], but an estimate can be obtained by seeing how many have passed through the {{w|Food and Drug Administration|U.S. FDA}} (1,453). Many home remedies, which might technically qualify as drugs, have not been approved because {{w|Novelty (patent)|&amp;quot;everybody knows that&amp;quot;}}, as well as many solely recreational drugs since regulation might result in outlawing. Because of this, &amp;quot;we have no idea&amp;quot; how many drugs truly exist. Since drugs are extremely powerful molecules that are only administered in choice amounts, they are generally perceived as small.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Lower right quadrant===&lt;br /&gt;
This is the section with the big items with count unknown.&lt;br /&gt;
&lt;br /&gt;
{| class = &amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Research field&lt;br /&gt;
! Size&lt;br /&gt;
! Knowledge of #&lt;br /&gt;
! Explanation&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Botany}}&lt;br /&gt;
|Plants tend to range from few centimeters to hundreds of meters. Therefore, on average plants are about the same size as human beings.&lt;br /&gt;
|Plants estimated from 295,000 to 305,000 in total.&lt;br /&gt;
|Botany studies plants, which can reach {{w|List of superlative trees|hundreds of feet by any measure}}.  Some {{w|Pando (tree)|clonal colonies of trees}} spread for miles. However, plant tend to clump together in forests and jungles, which makes it hard to get to them and document them. Every year, thousands of new plants are discovered, with the best estimate being that there are [https://news.mongabay.com/2016/05/many-plants-world-scientists-may-now-answer/ nearly 400,000 vascular plants] and an additional [https://www.britannica.com/topic-browse/Plants/Nonvascular-Plants 12,000 non-vascular plants]. However, the rate of discovery doesn't appear to be slowing down significantly, so we truly &amp;quot;have no idea.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Paleontology}}&lt;br /&gt;
|Paleontologists study fossils, which range in size from very small to very large.  When most people think of paleontologists though, they tend to think of them as studying large animals such as dinosaurs.&lt;br /&gt;
|Estimated at around 5 billion species.&lt;br /&gt;
|Paleontology studies fossils, particularly those of extinct animals, which can reach {{w|Largest prehistoric animals|huge sizes}}. However, since fossils form under very special circumstances, if the animal did not die under those special circumstances, there will be no record of their existence. Therefore, the number of extinct animals can never truly be known, but we've found [http://scienceblogs.com/authority/2010/01/12/how-do-we-know-that-most-of-th/ around 250,000]&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Black Hole}} {{w|Astronomy}}&lt;br /&gt;
|Compared to most astronomical objects, black holes are fairly small.  However, most of them (that we are able to detect) are still larger than the Earth, so they would still fall on the &amp;quot;big&amp;quot; end of this chart.  Alternatively, Randall may be referring to their mass, which is on the scale of stars.&lt;br /&gt;
|It has been estimated that the number of black holes in the {{w|Milky Way}} is around 100 million ([http://hubblesite.org/explore_astronomy/black_holes/encyc_mod3_q7.html]), although there is uncertainty in that estimate and the total number in the universe depends on the size of the universe (see &amp;quot;cosmology&amp;quot;, above).&lt;br /&gt;
|&amp;quot;Most stellar black holes [...] are impossible to detect. Judging from the number of stars large enough to produce such black holes, however, scientists estimate that there are as many as ten million to a billion such black holes in the Milky Way alone.&amp;quot; ([https://science.nasa.gov/astrophysics/focus-areas/black-holes NASA Black Hole information page])&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Exobiology}}&lt;br /&gt;
|The comic puts this in the size range of paleontology, which can include many sizes (see above), and also marine mammalogy, which tends to have individuals that are in the range of tens of centimeters to several tens of meters.  However, {{w|life|life as we know it}} is dominated in numbers by {{w|microbes}}, and {{w|Evolutionary history of life|life on Earth}} began {{w|Abiogenesis|microscopic}}, leading most {{w|Astrobiology|Astrobiologists}} to hypothesize that life on other planets would necessarily include microbes and [https://en.wikipedia.org/wiki/Fermi_paradox#No_other_intelligent_species_have_arisen only possibly include macroscopic life].&lt;br /&gt;
|The estimate of {{w|List of potentially habitable exoplanets|how many planets with life there are}} varies from 16 to 40,000,000,000; additionally, [https://en.wikipedia.org/wiki/Habitability_of_natural_satellites#In_the_Solar_System multiple moons] are believed to be potentially habitable for some forms of life in our own solar system. However, the number of bodies apart from Earth confirmed to have life is currently zero. Even more uncertain than the number of potentially habitable exoplanets is the {{w|Rare Earth Hypothesis|huge uncertainty}} in the likelihood of life arising on a habitable planet.&lt;br /&gt;
|Exobiology refers to the study of life outside Earth, which requires {{w|SETI|scanning the entire universe for life}}. Currently, exobiology seeks to find a planet or similar body with life (and, {{w|definition of planet|to qualify as a planet}}, bodies capable of sustaining life are big). The uncertainty about how many planets have life in the Milky Way relates to the {{w|Fermi Paradox}}. For life, of the type we know, to exist outside of the Solar system there need to be planets around other stars. Such planets are called Exoplanets, and they have been a [[:Category:Exoplanets|recurrent subject]] on xkcd.&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Theology}}&lt;br /&gt;
|Presumably, any god transcends the bounds of spacetime, making this the largest.&lt;br /&gt;
|Depends on who you ask.&lt;br /&gt;
|Theology is not a strict science, but as presented here it is the field concerned with the study of one or more {{w|deity|deities}} which is a sacred supernatural being. In particular, theologians study the question of whether {{w|theism|one or more gods exist}} {{w|atheism|or not}}, and, in the former case, whether there are {{w|polytheism|multiple gods}} or {{w|monotheism|just one}}  or indeed whether there is literally only {{w|pantheism|one god}}. Although the existence of any supernatural being(s) is unfalsifiable by any natural means, the entire human race has very strong opinions on the subject, so this field probably deserves the “depends on who you ask” disclaimer as well.  quantitative uncertainty is also mentioned in [[900: Religions]].&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[An X-Y scatter plot of research areas, written in gray font, where both axes have arrows in both ends. At the end of each arrow is a label. Above the left part of the X-axis there is a line which goes to a text about the meaning of the X-axis. Similarly there is a line to from the top of the Y-axis to a questions “asked” to those that study the given subject, their answers being somewhere between the two labels on the Y axis.]  &lt;br /&gt;
&lt;br /&gt;
:[The X-axis from left to right, text first and then labels:]&lt;br /&gt;
:Size of the thing you study&lt;br /&gt;
:Small&lt;br /&gt;
:Big&lt;br /&gt;
&lt;br /&gt;
:[The Y-axis from top to bottom, question first and then labels:]&lt;br /&gt;
:&amp;quot;That thing you study - how many of them are there?&amp;quot;&lt;br /&gt;
:&amp;quot;We have a pretty good estimate.&amp;quot;&lt;br /&gt;
:&amp;quot;We have no idea&amp;quot;&lt;br /&gt;
&lt;br /&gt;
:[The research areas names are listed here below by sorting them into the four quadrants from top left to bottom right. In each quadrant the areas are listed after most left first, and then top to bottom for those at the same x position.]&lt;br /&gt;
&lt;br /&gt;
:[Upper left quadrant (Small &amp;amp; count known):]&lt;br /&gt;
:Elementary particle physics &lt;br /&gt;
:Dentistry &lt;br /&gt;
:Shakespeare studies&lt;br /&gt;
:Ornithology&lt;br /&gt;
:Ancient Literature&lt;br /&gt;
&lt;br /&gt;
:[Upper right quadrant (Big &amp;amp; count known):]&lt;br /&gt;
:Presidential History 	&lt;br /&gt;
:Marine Mammology 	&lt;br /&gt;
:Railway Engineering 	&lt;br /&gt;
:Geology 	&lt;br /&gt;
:Cosmology*&lt;br /&gt;
:&amp;lt;small&amp;gt;(*Depends who you ask)&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:[Lower left quadrant (Small &amp;amp; count unknown):]&lt;br /&gt;
:Pharmacology&lt;br /&gt;
:Microbiology&lt;br /&gt;
:Entymology&lt;br /&gt;
:Mycology&lt;br /&gt;
&lt;br /&gt;
:[Upper right quadrant (Big &amp;amp; count unknown):]&lt;br /&gt;
:Botany 	&lt;br /&gt;
:Paleontology 	&lt;br /&gt;
:Exobiology 	&lt;br /&gt;
:Black Hole Astronomy 	&lt;br /&gt;
:Theology&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
Sortable table with the coordinates in percent:&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
! Research area&lt;br /&gt;
! Size (%)&lt;br /&gt;
! Estimate (%)&lt;br /&gt;
|-&lt;br /&gt;
|Elementary Particle Physics ||7 ||72&lt;br /&gt;
|-&lt;br /&gt;
|Pharmacology ||12 ||6&lt;br /&gt;
|-&lt;br /&gt;
|Microbiology ||15 ||13&lt;br /&gt;
|-&lt;br /&gt;
|Dentistry ||21 ||84&lt;br /&gt;
|-&lt;br /&gt;
|Entymology ||24 ||25&lt;br /&gt;
|-&lt;br /&gt;
|Mycology ||29 ||38&lt;br /&gt;
|-&lt;br /&gt;
|Ornithology ||34 ||62&lt;br /&gt;
|-&lt;br /&gt;
|Shakespeare Studies ||37 ||88&lt;br /&gt;
|-&lt;br /&gt;
|Ancient Literature ||38 ||53&lt;br /&gt;
|-&lt;br /&gt;
|Botany ||60 ||40&lt;br /&gt;
|-&lt;br /&gt;
|Presidential History ||62 ||89&lt;br /&gt;
|-&lt;br /&gt;
|Marine Mammology ||66 ||68&lt;br /&gt;
|-&lt;br /&gt;
|Paleontology ||68 ||31&lt;br /&gt;
|-&lt;br /&gt;
|Exobiology ||68 ||5&lt;br /&gt;
|-&lt;br /&gt;
|Railway Engineering ||79 ||81&lt;br /&gt;
|-&lt;br /&gt;
|Geology ||90 ||90&lt;br /&gt;
|-&lt;br /&gt;
|Theology ||91 ||5&lt;br /&gt;
|-&lt;br /&gt;
|Black Hole Astronomy ||92 ||26&lt;br /&gt;
|-&lt;br /&gt;
|Cosmology ||94 ||62&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Scatter plots]]&lt;br /&gt;
[[Category:Rankings]]&lt;br /&gt;
[[Category:Science]]&lt;br /&gt;
[[Category:Physics]]&lt;br /&gt;
[[Category:Astronomy]]&lt;br /&gt;
[[Category:Math]] &amp;lt;!--Title text --&amp;gt;&lt;br /&gt;
[[Category:Fiction]] &amp;lt;!--Shakespeare/Theology --&amp;gt;&lt;br /&gt;
[[Category:Religion]] &amp;lt;!--Theology --&amp;gt;&lt;br /&gt;
[[Category:Animals]] &amp;lt;!-- Several studies --&amp;gt;&lt;br /&gt;
[[Category:Exoplanets]] &amp;lt;!--Exo biology --&amp;gt;&lt;br /&gt;
[[Category:Politics]] &amp;lt;!--President --&amp;gt;&lt;br /&gt;
[[Category:Geology]]&lt;br /&gt;
[[Category: Research Papers]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:593:_Voynich_Manuscript&amp;diff=202607</id>
		<title>Talk:593: Voynich Manuscript</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:593:_Voynich_Manuscript&amp;diff=202607"/>
				<updated>2020-12-03T03:28:39Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: repair wiki link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I feel that the title text is not well enough explained, but I don't know if it's enough to add an incomplete tag. [[Special:Contributions/108.162.254.163|108.162.254.163]] 03:37, 2 January 2014 (UTC)&lt;br /&gt;
&lt;br /&gt;
[http://www.santa-coloma.net/voynich_drebbel/voynich.html It has been proposed] that the VM is a token artifact for Francis Bacon's utopian book ''{{W|New Atlantis|New Atlantis}}''. Under this theory, it would be akin to a prop replica made in relatively recent times. --[[User:Ishldgetoutmore|I Should Get Out More]] ([[User talk:Ishldgetoutmore|talk]]) 14:43, 18 March 2014 (UTC)&lt;br /&gt;
&lt;br /&gt;
I feel like the [http://en.wikipedia.org/wiki/Codex_Seraphinianus Codex Seraphinianus] should be mentioned, but I'm not sure how it would fit in. [[User:Leafy Greens|Leafy Greens]] ([[User talk:Leafy Greens|talk]]) 17:05, 16 November 2014 (UTC)&lt;br /&gt;
&lt;br /&gt;
Alternately, Megan could be attempting to distract Cueball from his line of questioning about where she got the book, by suggesting they play a game (possibly with the book), to steer the conversation away from the difficult question of where she got it. [[Special:Contributions/162.158.75.232|162.158.75.232]] 15:59, 28 June 2017 (UTC)&lt;br /&gt;
&lt;br /&gt;
Why is Harry Potter part of this explanation? The idea of wolfsbane keeping werewolves at bay isn't anything like that new. --[[Special:Contributions/172.69.33.11|172.69.33.11]] 18:42, 27 August 2018 (UTC)&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=2342:_Exposure_Notification&amp;diff=195577</id>
		<title>2342: Exposure Notification</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=2342:_Exposure_Notification&amp;diff=195577"/>
				<updated>2020-08-05T23:05:41Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Transcript */ think of the colons&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 2342&lt;br /&gt;
| date      = August 5, 2020&lt;br /&gt;
| title     = Exposure Notification&lt;br /&gt;
| image     = exposure_notification.png&lt;br /&gt;
| titletext = I don't see why everyone is so hungry for BAD news, but fine, I'll give in to feedback and add a dark mode.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Created by a BOT THAT RECENTLY HAD CLOSE CONTACT WITH SOMEONE WHO HAS NOT TESTED POSITIVE FOR COVID. Do NOT delete this tag too soon.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
During the coronavirus pandemic, several apps were developed to implement [https://en.wikipedia.org/wiki/Digital_contact_tracing digital contact tracing] by using one's location along with the location of others to notify someone if they had been potentially exposed to COVID-19. In this comic, a different type of app has been developed. Instead of notifying someone if they have been exposed to COVID-19, the app produces notifications if they have '''not''' tested positive. This is much less useful because it is not possible to tell whether anyone has actually been near anyone who was infected but rather annoys the user with excessive notifications.[[File:GNOME Shell, GNOME Clocks, Evince, gThumb, GNOME Files at version 3.30 (2018-09) in Dark theme.png|thumb|right|The GNOME desktop environment in dark mode]]&lt;br /&gt;
&lt;br /&gt;
Dark mode is a common feature in apps which allows users the options to have a darker user interface. The title text, however, refers to dark mode not in the sense of the color scheme but rather that receiving notifications bearing the bad news that you have been exposed to COVID-19 is &amp;quot;dark.&amp;quot; Because nobody likes his current app, Randall decides to give in and create a dark mode, which would make his app much more desirable for users.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Cueball standing, holds out his smartphone to review alerts it has received]&lt;br /&gt;
&lt;br /&gt;
:Exposure notification:&lt;br /&gt;
:1st alert 1:43PM:  Good news. You recently had close contact with someone who has not tested positive for covid.&lt;br /&gt;
:2nd alert 1:38PM:  Good news. You recently had close contact with someone who has not tested positive for covid.&lt;br /&gt;
:3rd alert 1:36PM:  Good news. You recently had close contact with someone who has not tested positive for covid.&lt;br /&gt;
:4th alert 1:31PM:  Good news. You recently had close contact with someone who has not tested positive for covid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:2342:_Exposure_Notification&amp;diff=195574</id>
		<title>Talk:2342: Exposure Notification</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:2342:_Exposure_Notification&amp;diff=195574"/>
				<updated>2020-08-05T21:59:37Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: Me thinks thou overthinketh this a bit much&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--Please sign your posts with ~~~~ and don't delete this text. New comments should be added at the bottom.--&amp;gt;&lt;br /&gt;
Is it dark mode as in low light UI or dark mode as in depressing? Or both [[Special:Contributions/198.41.238.106|198.41.238.106]] 21:24, 5 August 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think the title text is using the term &amp;quot;dark mode&amp;quot; not in the sense of UI design but rather that COVID-19 is &amp;quot;dark&amp;quot; and if the app were to have a mode that did what other apps did and gave notifications for potential exposures (bad news) that would be a &amp;quot;dark mode.&amp;quot; I have refrained from putting this in the explanation for now as I am curious if there are other interpretations.[[User:Nk1406|Nk1406]] ([[User talk:Nk1406|talk]]) 21:27, 5 August 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see we were thinking the same thing. I will add it.[[User:Nk1406|Nk1406]] ([[User talk:Nk1406|talk]]) 21:27, 5 August 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
Sheesh, why dance around the point, say it loud and proud— ‘’dark humor’’ --[[User:WurmWoode|WurmWoode]] ([[User talk:WurmWoode|talk]]) 21:59, 5 August 2020 (UTC)&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=2342:_Exposure_Notification&amp;diff=195573</id>
		<title>2342: Exposure Notification</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=2342:_Exposure_Notification&amp;diff=195573"/>
				<updated>2020-08-05T21:53:22Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Transcript */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 2342&lt;br /&gt;
| date      = August 5, 2020&lt;br /&gt;
| title     = Exposure Notification&lt;br /&gt;
| image     = exposure_notification.png&lt;br /&gt;
| titletext = I don't see why everyone is so hungry for BAD news, but fine, I'll give in to feedback and add a dark mode.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Created by a BOT THAT RECENTLY HAD CLOSE CONTACT WITH SOMEONE WHO HAS NOT TESTED POSITIVE FOR COVID. Do NOT delete this tag too soon.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
During the coronavirus pandemic, several apps were developed to implement [https://en.wikipedia.org/wiki/Digital_contact_tracing digital contact tracing] by using one's location along with the location of others to notify someone if they had been potentially exposed to COVID-19. In this comic, a different type of app has been developed. Instead of notifying someone if they have been exposed to COVID-19, the app produces notifications if they have '''not''' tested positive. This is much less useful because it is not possible to tell whether anyone has actually been near anyone who was infected but rather annoys the user with excessive notifications.[[File:GNOME Shell, GNOME Clocks, Evince, gThumb, GNOME Files at version 3.30 (2018-09) in Dark theme.png|thumb|right|The GNOME desktop environment in dark mode]]&lt;br /&gt;
&lt;br /&gt;
Dark mode is a common feature in apps which allows users the options to have a darker user interface. The title text, however, refers to dark mode not in the sense of the color scheme but rather that receiving notifications bearing the bad news that you have been exposed to COVID-19 is &amp;quot;dark.&amp;quot; Because nobody likes his current app, Randall decides to give in and create a dark mode, which would make his app much more desirable for users.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
[Cueball standing, holds out his smartphone to review alerts it has received]&lt;br /&gt;
&lt;br /&gt;
Exposure notification:&lt;br /&gt;
&lt;br /&gt;
1st alert 1:43PM:  Good news. You recently had close contact with someone who has not tested positive for covid.&lt;br /&gt;
&lt;br /&gt;
2nd alert 1:38PM:  Good news. You recently had close contact with someone who has not tested positive for covid.&lt;br /&gt;
&lt;br /&gt;
3rd alert 1:36PM:  Good news. You recently had close contact with someone who has not tested positive for covid.&lt;br /&gt;
&lt;br /&gt;
4th alert 1:31PM:  Good news. You recently had close contact with someone who has not tested positive for covid.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=555:_Two_Mirrors&amp;diff=186744</id>
		<title>555: Two Mirrors</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=555:_Two_Mirrors&amp;diff=186744"/>
				<updated>2020-01-31T02:08:16Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: Luck would have it&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 555&lt;br /&gt;
| date      = March 13, 2009&lt;br /&gt;
| title     = Two Mirrors&lt;br /&gt;
| image     = two_mirrors.png&lt;br /&gt;
| titletext = If you actually do this, what really happens is Douglas Hofstadter appears and talks to you for eight hours about strange loops.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
In folklore, {{w|Bloody Mary (folklore)|Bloody Mary}} is a legendary ghost or spirit conjured to reveal the future. She is said to appear in a mirror when her name is called multiple times (mainly 3). The Bloody Mary apparition may be benign or malevolent, depending on historic variations of the legend. The Bloody Mary appearances are mostly &amp;quot;witnessed&amp;quot; in teenage group participation games, often as part of a game of truth or dare.&lt;br /&gt;
&lt;br /&gt;
In this comic, Megan sets up two mirrors facing each other, in which she can see herself receding ad infinitum. She then says &amp;quot;Bloody Mary&amp;quot; three times (as in the folklore) before ducking, conjuring an infinite number of spirits who jump from the mirror towards each other. It's not clear if they simply collide, or pass into the opposing mirror. Megan may be attempting an experiment either in particle physics upon {{w|LHC|colliding}} {{w|mirror matter}} or bridging {{w|Mirror Universe}}s by enabling Bloody Mary’s opposing characterizations to interact with each other, or both.&lt;br /&gt;
&lt;br /&gt;
Megan is under several threats of bad luck, this escapade taking place (published) on a {{w|Friday the 13th}}, or [https://www.snopes.com/fact-check/breaking-a-mirror/ breaking a mirror] and according to myth, harm to body and soul for 7 years, and the risks of blasphemy and angering or losing control during the {{w|evocation}} of spirits, especially considering the quantity and consequent duration of such an invocation.&lt;br /&gt;
&lt;br /&gt;
{{w|Douglas Hofstadter}} (also referenced in [[917: Hofstadter]]) is the author of ''{{w|Gödel, Escher, Bach}}'' and ''{{w|I Am a Strange Loop}}''. In the former book, among many other discussions of infinite loops, he points a television camera at the screen on which its image is projected, forming an endless series of screens similar to panel 2 of this comic. In the latter book he focuses on the idea of minds being self-referential. &amp;quot;In the end, we are self-perceiving, self-inventing, locked-in mirages that are little miracles of self-reference&amp;quot;. This blends with the idea of the images of the person looking in the mirror being reflected endlessly.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Megan sets up a full mirror adjacent to a bathroom-counter mirror.]&lt;br /&gt;
&lt;br /&gt;
:[Megan looks through the bathroom counter mirror to see the infinite reflections.]&lt;br /&gt;
&lt;br /&gt;
:Megan: Bloody Mary, Bloody Mary, Bloody Mary.&lt;br /&gt;
&lt;br /&gt;
:[Megan ducks as the infinite Bloody Marys pop out between the two mirrors above her head.]&lt;br /&gt;
:''RAAGHHHHH''&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics featuring Megan]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=555:_Two_Mirrors&amp;diff=186743</id>
		<title>555: Two Mirrors</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=555:_Two_Mirrors&amp;diff=186743"/>
				<updated>2020-01-31T01:28:14Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Explanation */   {{w|Mirror, Mirror (Star Trek: The Original Series)|Mirror, Mirror}}&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 555&lt;br /&gt;
| date      = March 13, 2009&lt;br /&gt;
| title     = Two Mirrors&lt;br /&gt;
| image     = two_mirrors.png&lt;br /&gt;
| titletext = If you actually do this, what really happens is Douglas Hofstadter appears and talks to you for eight hours about strange loops.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
In folklore, {{w|Bloody Mary (folklore)|Bloody Mary}} is a legendary ghost or spirit conjured to reveal the future. She is said to appear in a mirror when her name is called multiple times (mainly 3). The Bloody Mary apparition may be benign or malevolent, depending on historic variations of the legend. The Bloody Mary appearances are mostly &amp;quot;witnessed&amp;quot; in teenage group participation games, often as part of a game of truth or dare.&lt;br /&gt;
&lt;br /&gt;
In this comic, Megan sets up two mirrors facing each other, in which she can see herself receding ad infinitum. She then says &amp;quot;Bloody Mary&amp;quot; three times (as in the folklore) before ducking, conjuring an infinite number of spirits who jump from the mirror towards each other. It's not clear if they simply collide, or pass into the opposing mirror. Megan may be attempting an experiment either in particle physics upon {{w|LHC|colliding}} {{w|mirror matter}} or bridging {{w|Mirror Universe}}s by enabling Bloody Mary’s opposing characterizations to interact with each other, or both.&lt;br /&gt;
&lt;br /&gt;
{{w|Douglas Hofstadter}} (also referenced in [[917: Hofstadter]]) is the author of ''{{w|Gödel, Escher, Bach}}'' and ''{{w|I Am a Strange Loop}}''. In the former book, among many other discussions of infinite loops, he points a television camera at the screen on which its image is projected, forming an endless series of screens similar to panel 2 of this comic. In the latter book he focuses on the idea of minds being self-referential. &amp;quot;In the end, we are self-perceiving, self-inventing, locked-in mirages that are little miracles of self-reference&amp;quot;. This blends with the idea of the images of the person looking in the mirror being reflected endlessly.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Megan sets up a full mirror adjacent to a bathroom-counter mirror.]&lt;br /&gt;
&lt;br /&gt;
:[Megan looks through the bathroom counter mirror to see the infinite reflections.]&lt;br /&gt;
&lt;br /&gt;
:Megan: Bloody Mary, Bloody Mary, Bloody Mary.&lt;br /&gt;
&lt;br /&gt;
:[Megan ducks as the infinite Bloody Marys pop out between the two mirrors above her head.]&lt;br /&gt;
:''RAAGHHHHH''&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics featuring Megan]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1493:_Meeting&amp;diff=186740</id>
		<title>1493: Meeting</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1493:_Meeting&amp;diff=186740"/>
				<updated>2020-01-31T00:18:03Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: Chairs and bugs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1493&lt;br /&gt;
| date      = March 2, 2015&lt;br /&gt;
| title     = Meeting&lt;br /&gt;
| image     = meeting.png&lt;br /&gt;
| titletext = Here at CompanyName.website, our three main strengths are our web-facing chairs, our huge collection of white papers, and the fact that we physically cannot die.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
[[Beret Guy]]'s business, as previously seen in [[1032: Networking]] and [[1293: Job Interview]], is going well, although it is unclear why. The common theme in these three comics is that Beret Guy misuses common business cliches. The following are examples and phrases that [[Randall]] is likely making a joke about:&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;If you're reading this, the web server was installed correctly.™&amp;quot; When a web server is installed automatically (like Apache through a package manager), it typically comes with a minimal configuration meant to deliver a single page saying all is working fine. Usually, a company will then configure the web server to provide actual meaningful content. It appears that in this case Beret Guy's company kept the page as is, but also trademarked the sentence as the company's motto, and proudly displays it under the company logo.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;CompanyName.website&amp;quot;: Companies are usually given descriptive or evocative names; Beret Guy's company, meanwhile, has been given a generic placeholder name that explains nothing about the company or website except that it is a company with a website. Currently, almost every middle-sized company runs a website, so it doesn't mean Beret Guy's company is in the information technology business (but many elements are specifically parodying Google). “Companyname.website” links to xkcd.com.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Welcome to a meeting!&amp;quot; The usual way to start a meeting is to welcome the participants by telling them in which meeting they are (e.g. &amp;quot;Welcome to the meeting on...&amp;quot;). Here, the complete lack of specifics in this sentence is an indication that the meeting has, in fact, no purpose at all, except to be just &amp;quot;A meeting&amp;quot;. It could also mean that Beret Guy does not know the proper way to welcome people to a meeting.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;I'm almost out of words so I'll keep this short.&amp;quot; A common theme in the busy world of business is lack of time, so &amp;quot;I'm almost out of time&amp;quot; would be a valid reason for keeping a meeting short, rather than a finite quantity of words. Aside from the fiction movie {{w|A Thousand Words (film)|A Thousand Words}} or people taking a {{w|Vow of Silence}}, people usually don't have a particular quota on the number of words they have or can use. Beret Guy also seems to run out of words in the title text of [[1560: Bubblegum]].&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Just wanna touch bases.&amp;quot; Often business professions will contact a customer to &amp;quot;touch base,&amp;quot; meaning to check in for a status update. The use of the plural &amp;quot;bases&amp;quot; suggests Beret Guy does not know what this means. This could also be a word play on the expression &amp;quot;Cover some bases&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Self-driving car project&amp;quot; Google has been working on {{w|self-driving cars}}, which usually shouldn't be lost track of and found by the police. The fact that it was launched &amp;quot;by accident&amp;quot; is concerning. It could mean the car was turned on by mistake and then left unattended, or perhaps that a driver of one of their cars fell asleep or otherwise stopped controlling the vehicle, but it is not clear because the accidental launch may refer to the project itself rather than the car. The involvement of the police may imply that the car crashed or otherwise obstructed traffic. That said, 90 miles before crashing is a good result for a self-driving car, especially when you didn't even know you built a self-driving car. What's especially ironic is the implication that the employees were carpooling (sharing a single vehicle for their commute, for reasons of efficiency/economy) in the self-driving car, and yet this carpool activity ended with the car setting off with nobody in it at all. These types of car was the topic of the later comic [[1559: Driving]], maybe misusing one of Beret Guy's cars. Self-driving cars is a [[:Category: Self-driving cars|recurring topic]] on xkcd.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Sales, any luck figuring out who our customers are?&amp;quot; In the real world, when companies want to find out &amp;quot;who [their] customers are&amp;quot;, they are talking about learning more about their existing customers (e.g. age groups, interests, genders) in order to more closely match these customers' needs, and to discover ways to attract more of them. Here, Beret Guy and [[Ponytail]] apparently use the phrase literally - they have no records of making any sales. A normal enterprise struggles to sell its products/services in order to get money. Getting cash from an unknown source would lead to serious troubles - failure to comply with tax code, suspicion of money laundering - but overall, most enterprises suffer the opposite problem: they try as hard as they can but don't get enough cash to be profitable (despite keeping precise information about where cash comes from). Note, that the accidental launching of a project would suggest a theme, that large cash infusions for unknown or {{w| Money laundering|unscrupulous}} reasons could imply anonymous {{w|Venture capital|VC}} investors, perhaps amateurs or acting in an overheated market.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;{{w|Bug tracker}}&amp;quot; usually refers to systems for tracking discovery, analysis, and fixing of software bugs (errors and problems), not the physical location of insects.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Web-facing&amp;quot; (title text) usually refers to software or a server that is connected to the internet using a web interface. However, in this case, the term is applied to chairs (likely meaning that they are either materially {{w|Webbing#Furniture|web-plaited}} or placed in front of a computer with internet browsing capability, or both).&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;White papers&amp;quot; (title text) are usually policy recommendations, but here Beret Guy is likely talking about actual (near-worthless) blank white pieces of paper.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Main strengths&amp;quot; (title text) typically refer to one's skills, but &amp;quot;we physically cannot die&amp;quot; may refer to the fact that incorporated companies are in a sense anthropomorphized — they're legally treated as &amp;quot;persons&amp;quot;, with the ability to sue and be sued in civil courts; or, just as likely, that Beret Guy and his employees are literally immortal, in which case that would indeed be a great asset which could be used in a variety of ways, from things like making an unstoppable army (though they could still be captured or incapacitated) to investing for a long long time.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Beret Guy is shown in silhouette. Above Beret Guy there is a black sign with white (and grey) text. Above this is his address to those in the meeting:]&lt;br /&gt;
:Beret Guy: Welcome to a meeting! I'm almost out of words, so I'll keep this short. Just wanna touch bases.&lt;br /&gt;
:[White text in the black sign (''.website'' in grey):]&lt;br /&gt;
:CompanyName.website&lt;br /&gt;
:''If you're reading this, the web''&lt;br /&gt;
:''server was installed correctly.™''&lt;br /&gt;
&lt;br /&gt;
:[Beret Guy stands in front of an office chair and a table talking.]&lt;br /&gt;
:Beret Guy: First, a few updates. We've learned from the state police that the self-driving car project we launched by accident during this morning's carpool has come to an end about 90 miles outside of town. Very exciting!&lt;br /&gt;
&lt;br /&gt;
:[Pony tail sits at the table.]&lt;br /&gt;
:Beret Guy [off-panel]: Profits are up. Sales, any luck figuring out who our customers are?&lt;br /&gt;
:Ponytail: Nope. Money keeps appearing, but we have no idea how or why.&lt;br /&gt;
:Beret Guy [off-panel]: Great!&lt;br /&gt;
&lt;br /&gt;
:[Back to the situation from frame two.]&lt;br /&gt;
:Beret Guy: Oh, and one last thing—I saw a cool red beetle in the hall. Can someone add it to the bug tracker?&lt;br /&gt;
:[person off-panel]: Just did!&lt;br /&gt;
:Beret Guy: Thanks!&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
*&amp;quot;CompanyName.website&amp;quot; is actually a domain name that was registered on 2014-11-20 and [http://companyname.website which redirects to xkcd.com]. Presumably, it is owned by Randall, for the same reason as in [[305]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics featuring Beret Guy]]&lt;br /&gt;
[[Category:Comics featuring Ponytail]]&lt;br /&gt;
[[Category:Beret Guy's Business]]&lt;br /&gt;
[[Category:Self-driving cars]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1493:_Meeting&amp;diff=186739</id>
		<title>1493: Meeting</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1493:_Meeting&amp;diff=186739"/>
				<updated>2020-01-30T23:53:46Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Explanation */ is there a theme&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1493&lt;br /&gt;
| date      = March 2, 2015&lt;br /&gt;
| title     = Meeting&lt;br /&gt;
| image     = meeting.png&lt;br /&gt;
| titletext = Here at CompanyName.website, our three main strengths are our web-facing chairs, our huge collection of white papers, and the fact that we physically cannot die.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
[[Beret Guy]]'s business, as previously seen in [[1032: Networking]] and [[1293: Job Interview]], is going well, although it is unclear why. The common theme in these three comics is that Beret Guy misuses common business cliches. The following are examples and phrases that [[Randall]] is likely making a joke about:&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;If you're reading this, the web server was installed correctly.™&amp;quot; When a web server is installed automatically (like Apache through a package manager), it typically comes with a minimal configuration meant to deliver a single page saying all is working fine. Usually, a company will then configure the web server to provide actual meaningful content. It appears that in this case Beret Guy's company kept the page as is, but also trademarked the sentence as the company's motto, and proudly displays it under the company logo.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;CompanyName.website&amp;quot;: Companies are usually given descriptive or evocative names; Beret Guy's company, meanwhile, has been given a generic placeholder name that explains nothing about the company or website except that it is a company with a website. Currently, almost every middle-sized company runs a website, so it doesn't mean Beret Guy's company is in the information technology business (but many elements are specifically parodying Google). “Companyname.website” links to xkcd.com.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Welcome to a meeting!&amp;quot; The usual way to start a meeting is to welcome the participants by telling them in which meeting they are (e.g. &amp;quot;Welcome to the meeting on...&amp;quot;). Here, the complete lack of specifics in this sentence is an indication that the meeting has, in fact, no purpose at all, except to be just &amp;quot;A meeting&amp;quot;. It could also mean that Beret Guy does not know the proper way to welcome people to a meeting.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;I'm almost out of words so I'll keep this short.&amp;quot; A common theme in the busy world of business is lack of time, so &amp;quot;I'm almost out of time&amp;quot; would be a valid reason for keeping a meeting short, rather than a finite quantity of words. Aside from the fiction movie {{w|A Thousand Words (film)|A Thousand Words}} or people taking a {{w|Vow of Silence}}, people usually don't have a particular quota on the number of words they have or can use. Beret Guy also seems to run out of words in the title text of [[1560: Bubblegum]].&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Just wanna touch bases.&amp;quot; Often business professions will contact a customer to &amp;quot;touch base,&amp;quot; meaning to check in for a status update. The use of the plural &amp;quot;bases&amp;quot; suggests Beret Guy does not know what this means. This could also be a word play on the expression &amp;quot;Cover some bases&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Self-driving car project&amp;quot; Google has been working on {{w|self-driving cars}}, which usually shouldn't be lost track of and found by the police. The fact that it was launched &amp;quot;by accident&amp;quot; is concerning. It could mean the car was turned on by mistake and then left unattended, or perhaps that a driver of one of their cars fell asleep or otherwise stopped controlling the vehicle, but it is not clear because the accidental launch may refer to the project itself rather than the car. The involvement of the police may imply that the car crashed or otherwise obstructed traffic. That said, 90 miles before crashing is a good result for a self-driving car, especially when you didn't even know you built a self-driving car. What's especially ironic is the implication that the employees were carpooling (sharing a single vehicle for their commute, for reasons of efficiency/economy) in the self-driving car, and yet this carpool activity ended with the car setting off with nobody in it at all. These types of car was the topic of the later comic [[1559: Driving]], maybe misusing one of Beret Guy's cars. Self-driving cars is a [[:Category: Self-driving cars|recurring topic]] on xkcd.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Sales, any luck figuring out who our customers are?&amp;quot; In the real world, when companies want to find out &amp;quot;who [their] customers are&amp;quot;, they are talking about learning more about their existing customers (e.g. age groups, interests, genders) in order to more closely match these customers' needs, and to discover ways to attract more of them. Here, Beret Guy and [[Ponytail]] apparently use the phrase literally - they have no records of making any sales. A normal enterprise struggles to sell its products/services in order to get money. Getting cash from an unknown source would lead to serious troubles - failure to comply with tax code, suspicion of money laundering - but overall, most enterprises suffer the opposite problem: they try as hard as they can but don't get enough cash to be profitable (despite keeping precise information about where cash comes from). Note, that the accidental launching of a project would suggest a theme, that large cash infusions for unknown or {{w| Money laundering|unscrupulous}} reasons could imply anonymous {{w|Venture capital|VC}} investors, perhaps amateurs or in an overheated market.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Bug tracker&amp;quot; usually refers to systems for tracking discovery, analysis, and fixing of software bugs (errors and problems), not the physical location of insects.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Web-facing&amp;quot; (title text) usually refers to software or a server that is connected to the internet using a web interface. However, in this case, the term is applied to chairs (Likely meaning they are placed in front of a computer with internet browsing capability).&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;White papers&amp;quot; (title text) are usually policy recommendations, but here Beret Guy is likely talking about actual (near-worthless) blank white pieces of paper.&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;Main strengths&amp;quot; (title text) typically refer to one's skills, but &amp;quot;we physically cannot die&amp;quot; may refer to the fact that incorporated companies are in a sense anthropomorphized — they're legally treated as &amp;quot;persons&amp;quot;, with the ability to sue and be sued in civil courts; or, just as likely, that Beret Guy and his employees are literally immortal, in which case that would indeed be a great asset which could be used in a variety of ways, from things like making an unstoppable army (though they could still be captured or incapacitated) to investing for a long long time.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Beret Guy is shown in silhouette. Above Beret Guy there is a black sign with white (and grey) text. Above this is his address to those in the meeting:]&lt;br /&gt;
:Beret Guy: Welcome to a meeting! I'm almost out of words, so I'll keep this short. Just wanna touch bases.&lt;br /&gt;
:[White text in the black sign (''.website'' in grey):]&lt;br /&gt;
:CompanyName.website&lt;br /&gt;
:''If you're reading this, the web''&lt;br /&gt;
:''server was installed correctly.™''&lt;br /&gt;
&lt;br /&gt;
:[Beret Guy stands in front of an office chair and a table talking.]&lt;br /&gt;
:Beret Guy: First, a few updates. We've learned from the state police that the self-driving car project we launched by accident during this morning's carpool has come to an end about 90 miles outside of town. Very exciting!&lt;br /&gt;
&lt;br /&gt;
:[Pony tail sits at the table.]&lt;br /&gt;
:Beret Guy [off-panel]: Profits are up. Sales, any luck figuring out who our customers are?&lt;br /&gt;
:Ponytail: Nope. Money keeps appearing, but we have no idea how or why.&lt;br /&gt;
:Beret Guy [off-panel]: Great!&lt;br /&gt;
&lt;br /&gt;
:[Back to the situation from frame two.]&lt;br /&gt;
:Beret Guy: Oh, and one last thing—I saw a cool red beetle in the hall. Can someone add it to the bug tracker?&lt;br /&gt;
:[person off-panel]: Just did!&lt;br /&gt;
:Beret Guy: Thanks!&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
*&amp;quot;CompanyName.website&amp;quot; is actually a domain name that was registered on 2014-11-20 and [http://companyname.website which redirects to xkcd.com]. Presumably, it is owned by Randall, for the same reason as in [[305]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics featuring Beret Guy]]&lt;br /&gt;
[[Category:Comics featuring Ponytail]]&lt;br /&gt;
[[Category:Beret Guy's Business]]&lt;br /&gt;
[[Category:Self-driving cars]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:2191:_Conference_Question&amp;diff=186737</id>
		<title>Talk:2191: Conference Question</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:2191:_Conference_Question&amp;diff=186737"/>
				<updated>2020-01-30T23:10:08Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: Syntax o’r grammar?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!--Please sign your posts with ~~~~ and don't delete this text. New comments should be added at the bottom.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I don't know to what &amp;quot;Word of Power&amp;quot; in the title text refers. A quick Google revealed something from Skyrim and something from D&amp;amp;D, but I have the feeling there must surely be a more original source for it, even if it is just a common term in folklore or something. [[User:Pureawes0me|Pureawes0me]] ([[User talk:Pureawes0me|talk]]) 07:45, 19 August 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
: I think it means &amp;quot;magic word&amp;quot;.  The next step, &amp;quot;Unforgivable Curse&amp;quot;, is from Harry Potter; a magic spell against someone that will get you jail time.  (C. S. Lewis had an apocalyptic option, the &amp;quot;{{w|Deplorable Word}}&amp;quot;, which killed every living person except the speaker)  So Harry Potter's schoolteacher demonstrates the Unforgivables on spiders... and on students.  (You find out why.)  Also I think the title text is the platform speaker's response to Beret Guy.  rja.carnegie@gmail.com [[Special:Contributions/162.158.158.183|162.158.158.183]] 09:12, 19 August 2019 (UTC) [[User:WhiteDragon|WhiteDragon]] ([[User talk:WhiteDragon|talk]]) 13:51, 19 August 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
:: Yeah, I understand the &amp;quot;Unforgivable Curse&amp;quot; part - it's more &amp;quot;Word of Power&amp;quot; I'm struggling with. I agree that the title text could potentially be a response by the speaker, and I've updated the page to reflect this. [[User:Pureawes0me|Pureawes0me]] ([[User talk:Pureawes0me|talk]]) 10:20, 19 August 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
::: It's from tabletop roleplaying games; [https://dungeonsdragons.fandom.com/wiki/Power_word some of the earliest high level spells from the original edition of Dungeons and Dragons were &amp;quot;Power Word Kill,&amp;quot; &amp;quot;Power Word Blind,&amp;quot; and &amp;quot;Power Word Stun.&amp;quot;] These spells have been carried forward into newer editions where they are extremely unpopular because they were designed for campaigns when most monsters had a tiny fraction of the number of hit points typical today, and unlike essentially all of the fifth edition spells, they don't do anything when they don't work, and they don't work based on facts which are theoretically unknowable to the players. So, they kind of have a reputation for being the worst high level spells, and are sometimes included in magic items which turn out to be, well, like fruitcake, if you know what I mean. [[Special:Contributions/172.69.22.134|172.69.22.134]] 11:36, 19 August 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
:::: Re-reading, incantation already is a magic spell, probably.  In current use, malediction can be either speaking against someone or something, or its original meaning of actual malicious verbal magic.  So I suppose Word of Power has to be more than a magic word...  I found a couple of references in the world of H. P. Lovecraft but those I traced were 1970s or later, actually after D-and-D.  So, not definite.  rja.carnegie@gmail.com [[Special:Contributions/162.158.158.209|162.158.158.209]] 00:14, 20 August 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
::Note that Unforgivable Curse will not get you just &amp;quot;little jail time&amp;quot;. It gets you life sentence in Azkaban. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 22:41, 20 August 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
One thing I feel needs to be said is that this behavior shows a lack of linguistic skill, because any statement can always be phrased in the form of a question, e.g, most easily, &amp;quot;Do you agree that _______?&amp;quot; Or by asking about the details of the comment in which the commenter is most interested in emphasizing or soliciting a response. That this kind of thing happens among advanced academics shows how narcissistic and tone-deaf even otherwise intelligent people can often be. [[Special:Contributions/162.158.255.34|162.158.255.34]] 12:20, 19 August 2019 (UTC)&lt;br /&gt;
:Similar to how the comic ends in a question? I think your statement is part of the joke. Less of a statement, and more of an utterance. [[User:OhFFS|OhFFS]] ([[User talk:OhFFS|talk]]) 14:28, 19 August 2019 (UTC)&lt;br /&gt;
::Do you agree it could be more of a noun phrase and a verb phrase, or perhaps merely a subject and a predicate? [[Special:Contributions/162.158.255.34|162.158.255.34]] 00:15, 20 August 2019 (UTC)&lt;br /&gt;
:::And whereof is the object therein?  [[User:WurmWoode|WurmWoode]] ([[User talk:WurmWoode|talk]]) 23:10, 30 January 2020 (UTC)&lt;br /&gt;
&lt;br /&gt;
There is a Russian Folk Tale, among those collected by Afanasyev, called &amp;quot;Go I don't know where, Bring back I don't know what&amp;quot;. In that story, the archer Andrey is given several impossible tasks by a tsar who covets his beautiful wife, the last of which is to go to I don't know where and bring back I don't know what.  After journeying a vast distance and meeting his mother in law Baba Yaga, he is guided by an ancient frog across a river of fire, and is told &amp;quot;Over there you will find a house. Well, not so much a house as a hut.  And it is not so much of a hut as a barn.&amp;quot;  This is I don't know where. So Beret Guy's intro to his statement may be a reference to this formulaic format. {{unsigned ip|172.68.174.22}}&lt;br /&gt;
: ...his mother in law is Baba Yaga?  Did he know that?  Does the tsar know that?  Does it change matters tsar-and-beautiful-wife-wise...  (Is this story in English at all, I don't know where...)  Wikipedia knows several Baba Yaga stories (some with three Baba Yagas who don't live together, unless this is a complicated alibi) but none match this.  rja.carnegie@gmail.com [[Special:Contributions/162.158.158.209|162.158.158.209]] 00:14, 20 August 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think the Unforgivable Curse line in the title text is meant to reference the scene in HP&amp;amp;tGoF when Barty Crouch, posing as Professor Moody, demonstrates their use on spiders to the fourth years in Defense Against the Dark Arts. The curse, be it an annoyed audience member or the speaker, is to be cast on the friendly bug. [[Special:Contributions/108.162.238.83|108.162.238.83]] 21:04, 19 August 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
I don't think Beret Guy is trying to say that he and the speaker are friends in his last line, I'm pretty sure he's saying that he's friends with the bug he found. {{unsigned ip|108.162.210.220}}&lt;br /&gt;
:^^^ Agreed.  The &amp;quot;we&amp;quot; in &amp;quot;now we're friends&amp;quot; means Beret Guy and the bug, not Beret Guy and the speaker.  It is, after all, a friendly bug. {{unsigned|Divgradcurl}}&lt;br /&gt;
::I also now agree, and I wrote the original wording.  Thanks for fixing it, whoever fixed it.  Oh, and remember to sign your comments with the four ~ thingies. [[User:N0lqu|-boB]] ([[User talk:N0lqu|talk]]) 13:07, 20 August 2019 (UTC)&lt;br /&gt;
:::I would like to meet the bug. I wonder whether Randall has ever introduced people to bugs he found. [[Special:Contributions/162.158.146.166|162.158.146.166]] 04:44, 21 August 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
I have created a [[:Category:Harry Potter]] and found almost 20 comics to go there. And also a few that could have gone there, but where it was uncertain that Harry was the reference. --[[User:Kynde|Kynde]] ([[User talk:Kynde|talk]]) 13:44, 20 August 2019 (UTC)&lt;br /&gt;
&lt;br /&gt;
I believe the reference to &amp;quot;It might be the person simply blowing.&amp;quot; is technically inaccurate. The movement of air (i.e. breeze/wind or someone exhaling air/blowing) is not the same phenomenon as a sound pressure wave propagating through air. [[Special:Contributions/162.158.158.149|162.158.158.149]] 13:09, 22 August 2019 (UTC)&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=2191:_Conference_Question&amp;diff=186736</id>
		<title>2191: Conference Question</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=2191:_Conference_Question&amp;diff=186736"/>
				<updated>2020-01-30T22:57:47Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Explanation */ clarify&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 2191&lt;br /&gt;
| date      = August 19, 2019&lt;br /&gt;
| title     = Conference Question&lt;br /&gt;
| image     = conference_question.png&lt;br /&gt;
| titletext = I also have an utterance. Less of an utterance and more of an incantation. Less of an incantation and more of a malediction. Less of a malediction and more of a Word of Power. Less of a Word of Power and more of an Unforgivable Curse.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
Usually at a conference or other event involving a speaker addressing a crowd, members of the crowd are given the chance to ask questions. This is intended so that people can perhaps ask the speaker to elaborate on a point they've made, or to ask the speaker's opinion on a topic related to their talk.  &lt;br /&gt;
&lt;br /&gt;
Occasionally, people at such an event will use (or, rather, abuse) the opportunity to ask a question to instead provide their own (unsolicited) opinion or statement. Such statements are often preceded with something along the lines of &amp;quot;I have a question. Well, less of a question and more of a comment.&amp;quot; This formulation in particular has attracted [https://jamesmendezhodes.com/blog/2019/4/30/less-of-a-question-more-of-a-comment a lot of criticism] for not adding anything to the discussion and for pulling focus away from the speaker.&lt;br /&gt;
&lt;br /&gt;
In the comic, this idea is taken to an extreme, with [[Beret Guy]] not only transforming the opportunity to ask a question into an opportunity to make a statement through successive rephrasing, turning this into an opportunity to show off a bug he has found. This is accomplished by using a multitude of synonyms in a ''continuum'' of relatable word pairs, except near the last: &amp;quot;question&amp;quot; and &amp;quot;comment&amp;quot; are similar, as are &amp;quot;comment&amp;quot; and &amp;quot;utterance&amp;quot;, but the extremes, the difference between the first and the last in the entire set (in this case &amp;quot;question&amp;quot; and &amp;quot;friendly bug&amp;quot;) is profound. In a way, this segue is meant to be similar to how, in the lines of a color spectrum, red fades into yellow: gradually, and with no abrupt transitions in color ({{w|YMMV}}: {{w|Color Graphics Adapter|CGA}} versus {{w|4K resolution|4K}}.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:'''Question.'''  A {{w|question}} is what the crowd member is expected to provide, such that the speaker or a panel member could provide a related answer.&lt;br /&gt;
&lt;br /&gt;
:'''Comment.'''  A {{w|Topic and comment|comment}} by a crowd member, is when they just say something they believe, without expecting an answer, giving the speaker or panel members nothing to do. This may be seen as annoying by everyone else, as the crowd did not come to hear the opinion of other crowd members. But answers to relevant questions would be interesting to the crowd and the panel.&lt;br /&gt;
&lt;br /&gt;
:'''Utterance.'''  An {{w|utterance}} is just making a noise, which may or may not be actual words, or if actual words it may not be a complete sentence.&lt;br /&gt;
&lt;br /&gt;
:'''Air Pressure Wave.'''  {{w|Sounds}} are literally pressure waves in the air.  So this could be a simple sound, or not a sound at all depending on the severity of the wave.  It might be the person simply blowing.&lt;br /&gt;
&lt;br /&gt;
:'''Friendly Hand Wave.'''  Now instead of using his mouth to generate an air pressure wave, he's producing it with his hand, in a manner intended to be interpreted as &amp;quot;friendly&amp;quot;.  Many times hand waves are done in a friendly manner, designed more for the visual appeal than the amount of air pressure waves they generate.&lt;br /&gt;
&lt;br /&gt;
:'''Friendly Bug.'''  Now he is no longer doing anything himself, except to point out the fact that he has found a bug or {{w|insect}}, which he {{w|anthropomorphizes}} as being friendly.&lt;br /&gt;
&lt;br /&gt;
:'''Want to meet it?'''  He has decided that he and the friendly bug are actual friends, and ironically comes full circle by finally asking a question, though presumably whether the speaker wants to meet a bug is not related to the topic of the speaker's talk.&lt;br /&gt;
&lt;br /&gt;
The title text takes the opposite route of Beret Guy, and each step instead refers to successively worse forms of magic spells which would, presumably, have a negative effect upon the listener. Starting from a mere utterance and then using Beret Guy's &amp;quot;it is less than&amp;quot; scheme, it progresses over worse and worse curses, ending with an unforgivable curse!&lt;br /&gt;
&lt;br /&gt;
:'''Utterance.''' It begins with utterance which was also used by Beret Guy. See above.&lt;br /&gt;
&lt;br /&gt;
:'''Incantation.''' {{w|Incantation}}, or a spell, is a magical formula intended to trigger a magical effect on a person or objects. It is not necessarily with evil intent.&lt;br /&gt;
&lt;br /&gt;
:'''Malediction.''' A malediction is another word for {{w|curse}} (the prefix &amp;quot;mal&amp;quot; being a Latin root meaning &amp;quot;evil&amp;quot;). This is always with evil intent.&lt;br /&gt;
&lt;br /&gt;
:'''Word of Power.''' &amp;quot;Word of Power&amp;quot; could refer to the dragonish form of magic in ''{{w|The Elder Scrolls V: Skyrim}},'' or the [https://dungeonsdragons.fandom.com/wiki/Power_word early 1st edition Dungeons &amp;amp; Dragons high level spells]. &lt;br /&gt;
&lt;br /&gt;
:'''Unforgivable Curse.''' The term &amp;quot;{{w|Magic_in_Harry_Potter#Unforgivable_Curses|Unforgivable Curse}}&amp;quot; refers to a set of three spells from the {{w|Harry Potter}} series, said to be so evil that their use on another person is unforgivable and illegal. The three spells are able to mind control (''Imperius''), torture (''Cruciatus''), and kill (''Avada Kedavra'') their target. It is unclear which spell is implied, though if it was accurate to call it a singular word of power, it is unlikely to be the killing curse.&lt;br /&gt;
&lt;br /&gt;
The title text can be interpreted as a reply by [[Hairy]] (the speaker) to Beret Guy, indicating his annoyance at the topic being derailed. It could also be representative of [[Randall|Randall's]] feelings towards those who abuse the opportunity to ask a question in order to make a statement.  Randall has recently done some book tours and was at {{w|San Diego Comic-Con}} [https://blog.xkcd.com/2019/07/15/san-diego-comic-con/ last month] where he served on various panels, so he probably has had personal first-hand experience with these kinds of circuitous non-questions.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Hairy stands on a podium having just addressed a crowd of seated people. Beret Guy stands in the middle of the crowd, addressing Hairy. One of Beret Guy's hands is raised at chest height. The front row consists of Cueball, Ponytail, another Hairy, Megan, Hairbun, Danish and another Cueball.]&lt;br /&gt;
&lt;br /&gt;
:Beret Guy: I have a question.&lt;br /&gt;
:Beret Guy: Well, less of a question and more of a comment.&lt;br /&gt;
:Beret Guy: I guess it's less of a comment and more of an utterance.&lt;br /&gt;
:Beret Guy: Really it's less an utterance more an air pressure wave.&lt;br /&gt;
:Beret Guy: It's less an air pressure wave and more a friendly hand wave.&lt;br /&gt;
:Beret Guy: I guess it's less a friendly wave than it is a friendly bug.&lt;br /&gt;
:Beret Guy: I found this bug and now we're friends. Do you want to meet it?&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics featuring Hairy]]&lt;br /&gt;
[[Category:Comics featuring Beret Guy]]&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;br /&gt;
[[Category:Comics featuring Ponytail]]&lt;br /&gt;
[[Category:Comics featuring Hairbun]]&lt;br /&gt;
[[Category:Comics featuring Danish]]&lt;br /&gt;
[[Category:Multiple Cueballs]]&lt;br /&gt;
[[Category:Public speaking]]&lt;br /&gt;
[[Category:Animals]]&lt;br /&gt;
[[Category:Fiction]]&lt;br /&gt;
[[Category:Harry Potter]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1156:_Conditioning&amp;diff=186700</id>
		<title>1156: Conditioning</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1156:_Conditioning&amp;diff=186700"/>
				<updated>2020-01-30T21:43:37Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Explanation */ OMG — a visiting Pope, like the nuisance factor is NOT reknown&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1156&lt;br /&gt;
| date      = January 4, 2013&lt;br /&gt;
| title     = Conditioning&lt;br /&gt;
| image     = conditioning.png&lt;br /&gt;
| titletext = 'Why are you standing in the yard wearing a papal hat and a robe covered in seeds?' 'Well, the Pope is visiting our town next month ...'&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
Herein, the author devises a method of addressing the issue of drivers who turn up their music to irritating levels which usually results in a lot of bass coming from the car — the low frequencies being the ones that most easily penetrate the car and travel farther, thus being more audible to those around the car.&lt;br /&gt;
&lt;br /&gt;
As the title suggests, the idea is to {{w|Classical conditioning|condition}} animals to respond to a thumping bass. The machine is described as working as follows: every few hours, the bass would turn on, and the box would dispense food behind an opening designed to look like an open car window. Over time, local wildlife would flock to the box to get the food from inside, and would become trained that the sound of a subwoofer means that they can get food by flying through a car window.. Eventually, the animals would respond to any low music, including that played by cars.&lt;br /&gt;
&lt;br /&gt;
The end result would be that the local wildlife would approach, and presumably attempt to enter, any car that has that same thumping bass. Drivers, in turn, would cease to turn up their music in order to prevent the groups of animals from chasing after their cars, thus solving the problem of annoyingly loud bass. This behavior modification can itself be seen as a {{w|Operant conditioning|somewhat different form of conditioning}}.&lt;br /&gt;
&lt;br /&gt;
Although this plan may seem far-fetched, a similar scheme was seriously proposed in Britain during {{w|World War I}} to condition {{w|Gull|seagulls}} to associate a submarine's {{w|periscope}} with food, which would give away the locations of enemy submarines as the gulls flocked to their periscopes being raised.&lt;br /&gt;
&lt;br /&gt;
The title text is a dialogue about using a similar method of conditioning to send animals after a visiting {{w|Pope}}. Why someone would want that to happen is left to the reader's imagination, although papal visitations usually disrupt the local communities with onerous traffic and special and ostentatious ceremonies, and do attract huge crowds of dignitaries, celebrities, the faithful, the curious, and attending purveyors of foodstuffs and trinkets. Not to mention the impact to the local AirBnB market. Or it could just be Black Hat, who would not need any particular reason for this sort of behavior, and might choose the Pope because of his highly recognizable outfit.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:Every few hours, subwoofer plays throbbing bass for 10 seconds... [With arrow pointing to subwoofer.]&lt;br /&gt;
:...then bread crumbs are dispensed into box [With arrow pointing to bread feeder machine.]&lt;br /&gt;
:Opening [With arrow pointing to feeder opening shaped like a driver side car window.]&lt;br /&gt;
:Local wildlife [With arrows pointing to birds and a squirrel.]&lt;br /&gt;
:Protip: Leave this device in your yard for a week, then watch as the problem of loud music from passing cars solves itself.&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Biology]]&lt;br /&gt;
[[Category:Protip]]&lt;br /&gt;
[[Category:Squirrels]]&lt;br /&gt;
[[Category:Music]]&lt;br /&gt;
[[Category:Animals]]&lt;br /&gt;
[[Category:Science]]&lt;br /&gt;
[[Category:Psychology]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=208:_Regular_Expressions&amp;diff=177736</id>
		<title>208: Regular Expressions</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=208:_Regular_Expressions&amp;diff=177736"/>
				<updated>2019-08-08T03:24:35Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Explanation */  Playing favorates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 208&lt;br /&gt;
| date      = January 10, 2007&lt;br /&gt;
| title     = Regular Expressions&lt;br /&gt;
| image     = regular_expressions.png&lt;br /&gt;
| titletext = Wait, forgot to escape a space. Wheeeeee[taptaptap]eeeeee!&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
The comic begins with [[Randall]] saying how every time he develops a new skill, he finds himself daydreaming about using it to save the day. Computer skills aren't usually superhero material, which lends itself to the humor of the comic.&lt;br /&gt;
&lt;br /&gt;
In computing, {{w|regular expression}}s (&amp;quot;regex&amp;quot;) provide a concise and flexible means to &amp;quot;match&amp;quot; (specify and recognize) strings of text, such as particular characters, words, or patterns of characters.&lt;br /&gt;
&lt;br /&gt;
Manually trying to look for a specific pattern through 200 MB of text is equivalent to looking for a needle in a haystack. But this task can be made easy by using regexes, since a script can read through text and match specific string patterns much faster than humans can achieve.&lt;br /&gt;
&lt;br /&gt;
Obviously favoring a Perl implementation and supporting OS over some other syntax, like POSIX.&lt;br /&gt;
&lt;br /&gt;
{{w|Perl}} is a popular scripting language that has often been referenced favorably in the comic. Perl is also the most acknowledged language when it comes to the performance while evaluating regular expressions.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;PERL!&amp;quot; in the fifth panel is reminiscent of old superhero serials, particularly {{w|Batman (TV series)}}, in which sound effects such as &amp;quot;BAM!&amp;quot; &amp;quot;POW!&amp;quot; &amp;quot;ZAP!&amp;quot; would be displayed on screen in similar spiky bubbles. This fits with the theme of the comic, with Cueball being a &amp;quot;superhero&amp;quot; who fights crime using computer skills.&lt;br /&gt;
&lt;br /&gt;
The title text refers to how sensitive regexes can be to small mistakes or missing characters. In [[1168: tar]], another potential hero fails (and gets blown up by a nuclear bomb that is only able to be disarmed by typing in a valid tar command) because the syntax of some commands and programming languages are just too difficult to remember by heart.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:Whenever I learn a new skill I concoct elaborate fantasy scenarios where it lets me save the day.&lt;br /&gt;
&lt;br /&gt;
:Megan: Oh no! The killer must have followed her on vacation!&lt;br /&gt;
:[Megan points to computer.]&lt;br /&gt;
:Megan: But to find them we'd have to search through 200 MB of emails looking for something formatted like an address!&lt;br /&gt;
:Cueball: It's hopeless!&lt;br /&gt;
&lt;br /&gt;
:Off-panel voice: Everybody stand back.&lt;br /&gt;
&lt;br /&gt;
:Off-panel voice: I know regular expressions.&lt;br /&gt;
&lt;br /&gt;
:[A man swings in on a rope, toward the computer.]&lt;br /&gt;
&lt;br /&gt;
:''tap tap''&lt;br /&gt;
:The word ''PERL!'' appears in a bubble.&lt;br /&gt;
&lt;br /&gt;
:[The man swings away, and the other characters cheer.]&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
*This comic is featured on one of the [http://shop.xkcd.com/products/i-know-regular-expressions T-shirts] sold at the xkcd store.&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;br /&gt;
[[Category:Comics featuring Megan]]&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Regex]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159400</id>
		<title>1957: 2018 CVE List</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159400"/>
				<updated>2018-06-28T00:34:38Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Table of possible CVE */ wikify&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1957&lt;br /&gt;
| date      = February 19, 2018&lt;br /&gt;
| title     = 2018 CVE List&lt;br /&gt;
| image     = 2018_cve_list.png&lt;br /&gt;
| titletext = CVE-2018-?????: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
{{w|Common Vulnerabilities and Exposures|CVE}} (Common Vulnerabilities and Exposures) is a standardized format for assigning an identity to a cybersecurity vulnerability (similar to the way that astronomical bodies are assigned unique identifiers by committees). Giving vulnerabilities a unique identifier makes them easier to talk about and helps in keeping track of the progress made toward resolving them. The typical format of a CVE identifier is '''CVE-[YEAR]-[NUMBER]'''. For example, the CVE identifier for 2017's widespread {{w|Meltdown (security vulnerability)|Meltdown vulnerability}} is [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 CVE-2017-5754]. CVEs also contain a short description of the issue.&lt;br /&gt;
&lt;br /&gt;
In this comic (released in February 2018), Randall presents a number of spurious predicted CVEs for later in 2018. Each CVE identifier is given as &amp;quot;CVE-2018-?????&amp;quot;, reflecting the fact that they have not yet happened so we don't know exactly what their CVE identifier will be.&lt;br /&gt;
&lt;br /&gt;
==Table of possible CVE==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%;&amp;quot; | Security Vulnerability&lt;br /&gt;
! style=&amp;quot;width: 70%;&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|Apple products crash when displaying certain {{w|Telugu language|Telugu}} or {{w|Bengali language|Bengali}} letter combinations.&lt;br /&gt;
|This refers to a real vulnerability in iOS and MacOS publicized a few days before the comic was released,&amp;lt;ref&amp;gt;https://techcrunch.com/2018/02/15/iphone-text-bomb-ios-mac-crash-apple/&amp;lt;/ref&amp;gt; as well as past similar iOS vulnerabilities&amp;lt;ref&amp;gt;https://thenextweb.com/apps/2017/01/18/iphone-ipad-apple-text-ios-bug/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.telegraph.co.uk/technology/2018/01/18/apple-text-bomb-can-crash-iphones-single-message/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can use a timing attack to extploit [''sic''] a race condition in {{w|Garbage collection (computer science)|garbage collection}} to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
|The reference to using a Timing Attack to exploit a race condition in garbage collection refers to Meltdown and Spectre CPU flaws that can be exploited in a cloud server like the ones in Wikipedia. {{w|Claude Shannon}} was an early and highly influential information scientist whose work underlies compression, encryption, security, and the theory behind how information is encoded into binary digits. &lt;br /&gt;
&lt;br /&gt;
This is not a security problem. However, since Shannon formulated how the amount of unique or actual information some entity contains is proportional to the number of bits required to encode it, retrieving only a few bits casts a dark perspective upon the significance of the Shannon article's content.&lt;br /&gt;
|-&lt;br /&gt;
|At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
|Cafés often offer free access to WiFi as a service to patrons, as a business strategy to encourage said patrons to remain in the building and buy more coffee. Some use a password, so that only patrons can use the WiFi, and may display the password on signage inside. Since anybody could go into the cafe to read the post-it, and then use the network from nearby, the ability to read it from outside is, at most, a trivial problem. For systems that are supposed to be secure, writing passwords in a visible place is a major security flaw. For instance, following the [[wikipedia:2018 Hawaii false missile alert|2018 Hawaii false missile alert]], the agency concerned received criticism for a press photo showing a password written on a sticky note attached to a monitor.&amp;lt;ref&amp;gt;http://uk.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1?r=US&amp;amp;IR=T&amp;lt;/ref&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
|A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
|Describes a common feature on news sites or social media sites like Facebook. The possibility for users to &amp;quot;inject&amp;quot; text into the page is by design. This is a humorous reference to the relatively common security vulnerability &amp;quot;[[Wikipedia:Cross-site_scripting|persistent cross-site scripting]]&amp;quot;, where input provided by a user, such as through a comment section, can result in dangerous content containing arbitrary HTML or JavaScript code being displayed to other users. &lt;br /&gt;
|-&lt;br /&gt;
|MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
|Some people pronounce &amp;quot;{{w|SQL}}&amp;quot; like &amp;quot;sequel&amp;quot;, after SQL's predecessor &amp;quot;SEQUEL (Structured English Query Language)&amp;quot;. The standard for SQL suggests that it should be pronounced as separate letters; however, the author of SQL pronounces it &amp;quot;sequel&amp;quot;, so the debate is persisting (with even more justification than arguments about how to pronounce &amp;quot;GIF&amp;quot;). MySQL is an open-source relational database management system. The latest generally available version (at the time of writing) is MySQL 5.7.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
|{{w|Privilege escalation}} refers to any illegitimate means by which a system user gains greater access than they are supposed to have, and most hackers will seek to achieve this if they can. The most highly-sought privilege is that of the root user, which allows complete access to an entire system&amp;amp;mdash; a ''superuser''.&lt;br /&gt;
&lt;br /&gt;
The irony of this CVE presents the reverse situation: that a flaw inadvertently ''de-escalates'' a root user to a less privileged user, which would cripple the ''superuser'', they would be disallowed access or ability to accomplish their required tasks, or worse, cause such tasks which do not {{w|fail safe}} to have catastrophic side effects.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
|This is a reference to a common problem of modern gadgets catching fire (usually related to flaws in lithium-ion batteries), as well as to Apple products crashing when attempting to display certain character sequences. Diacritics are the accents found on letters in some languages (eg. č, ģ ķ, ļ, ņ, š, ž). These would not normally be found on emojis.&lt;br /&gt;
|-&lt;br /&gt;
|An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
|This probably refers to the movie {{w|Air Bud}}, about a dog playing basketball. This has been a common theme in xkcd comics: see [[115: Meerkat]], [[1439: Rack Unit]], [[1819: Sweet 16]], [[1552: Rulebook]].&lt;br /&gt;
In 2017, it was discovered that an oversight in the constitution of the state of Kansas may [http://www.kansascity.com/news/politics-government/article175956836.html permit a dog to be governor]. Shortly before this comic published, the Secretary of State's office ruled that [http://dfw.cbslocal.com/2018/02/13/dog-kansas-governor/ it could not].&lt;br /&gt;
|-&lt;br /&gt;
|Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer [''sic''] in Missouri that no one's checked on in a while.&lt;br /&gt;
|{{w|Haskell (programming language)|Haskell}} is a functional programming language. Functional programming is characterized by using functions that don't have side effects because they can not change things accessible in other parts of the program, as in [[1312: Haskell]]. The joke here is discovering that it does indeed have side-effects, manifested via external alteration, not violating the internal alteration paradigm.&lt;br /&gt;
|-&lt;br /&gt;
|Nobody really knows how hypervisors work.&lt;br /&gt;
|[[wikipedia:Hypervisor|&amp;quot;Hypervisors&amp;quot;]] are a tool for computer virtualization. Virtualization is implemented via various combinations of hardware and/or software, which requires a computer to completely simulate another computer, with its own unique hardware and software, and to varying degrees as to whether or not the virtualization is aware of or can determine whether it is being virtualized. Many IT professionals and businesses rely heavily on various forms of virtualization, but most of the individual employees would be hard-pressed to explain how it works. Programs running on other virtual computers, or on the real computer, may be able to access information on a virtual computer in ways which would not be possible with a single real computer. Consequently, understanding how the hypervisor works is important to assessing the security of a virtual server. Meltdown and Spectre are related to this.&lt;br /&gt;
|-&lt;br /&gt;
|Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
|This joke is about arcane systems that are running Linux in exceedingly rare situations, meaning that reproducing errors would be incredibly difficult or inconvenient, and would only affect a very tiny user base (if any at all). {{w|IBM System/390 ES/9000 Enterprise Systems Architecture ESA family|System/390}} is an IBM mainframe introduced almost 30 years before this comic, which has a version of Linux. UTC+14 is a time zone used only on some islands in the Pacific Ocean (Primarily [[Wikipedia:Line_Islands|the Line Islands]]) and is also the earliest time zone on earth. Even if all of these absurd conditions were met, the resulting vulnerability would still be relatively benign: simply changing a user's preferred clock display format. Other xkcd comics make references to such obscure computer-time issues relating to time zones and time conversions, and how many programmers find these issues frustrating or even traumatizing. &lt;br /&gt;
|-&lt;br /&gt;
|x86 has way too many instructions.&lt;br /&gt;
|The x86 architecture (used in many Intel and AMD processors) is very complicated. Processors typically implement such a complex architecture using programs (microcode) run on a set of hidden, proprietary processors. The details of these hidden machines and errors in the microcode can result in security vulnerabilities, such as Meltdown, where the physical machine does not match the conceptual machine.&lt;br /&gt;
&lt;br /&gt;
A more complicated instruction set is more complex to implement.{{Citation needed}} The x86 architecture is considered &amp;quot;CISC&amp;quot; (a &amp;quot;{{w|Complex instruction set computer}}&amp;quot;), having many instructions originally provided to make programming by a human simpler; other examples include the 68000 series used in the first {{w|Apple Macintosh}}. In the 1980s, this design philosophy was countered by the &amp;quot;RISC&amp;quot; (&amp;quot;{{w|Reduced instruction set computer}}&amp;quot;) design movement - based on the observation that computer programs were increasingly generated by compilers (which only used a few instructions) rather than directly by people, and that the chip area dedicated to extra instructions could be better dedicated to, for example, cache. Examples of RISC style designs include {{w|SPARC}}, {{w|MIPS}}, {{w|PowerPC}} (used by Apple in later Macintoshes) and the {{w|ARM architecture|ARM}} chips common in mobile phones. Historically, there was considerable discussion about the merits of each approach. At one time the Mac and Windows PC were on different sides; owners of other competing systems such as the Archimedes and Amiga had similar arguments on usenet in the early 1990s. This &amp;quot;issue&amp;quot; may be posted by someone who still recalls these debates. Technically, the extra instructions do slightly complicate the task of validating correct chip behaviour and complicate the tool chains that manage software, which could be seen as a minor security risk. However, the 64-bit architecture introduced by {{w|AMD}}, and since adopted by {{w|Intel}}, does rationalise things somewhat, and all recent x86 chips break down instructions into RISC-like micro-operations, so the complication from a hardware perspective is localised. Recent security issues, such as the speculative cache load issue in Meltdown and Spectre, depend more on details of implementation, rather than instruction set, and have been exhibited both by x86 (CISC) and ARM (RISC) processors.&lt;br /&gt;
&lt;br /&gt;
This explanation has way too many words.&lt;br /&gt;
|-&lt;br /&gt;
|NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
|Fantastically, this would be an unimaginable software threat, not to be confused with the even speedier, but future-bound, threat in hardware via {{w|Quantum computing}}. &lt;br /&gt;
NumPy is the fundamental package for scientific computing with the programming language Python. ''O''(log ''n'') is [[wikipedia:Big_O_notation#Infinite_asymptotics|Big O notation]] meaning that the time it takes for a computer algorithm to run is in the order of log ''n'', for an input of size ''n''. ''O''(log ''n'') is very fast and is more usual for a search algorithm. Prime factorization currently is ''O''(''2''&amp;lt;sup&amp;gt;''n''&amp;lt;/sup&amp;gt;n)). If something can find the prime factors of a number this quickly, especially a [[wikipedia:semiprime|semiprime]] with two large factors, it will enable attacks to break many crypto functions used in internet security. However, prime numbers have only a single factor, and &amp;quot;factoring primes&amp;quot; quickly is a simpler problem, that of [[wikipedia:Primality test|proving that a number is in fact a prime]]. &lt;br /&gt;
|-&lt;br /&gt;
|Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
|Another joke on the first CVE and [[wikipedia:I before E except after C|a common English writing rule of thumb]], which fails almost as often as it succeeds. Possibly a jab at Apple's image, portraying their software as unable to handle improper grammar or spelling.&lt;br /&gt;
|-&lt;br /&gt;
|Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
|Skylake x86 chips are a line of microprocessors made by Intel. Some processors are soldered directly to a system board or daughter board, while others are attached to boards that plug into the system board by means of a socket (pins or connectors that make physical contact with receptacles or connectors on a system board). Some sockets, especially older ones, require force to insert or remove, and often require the use of a flat blade screwdriver or a specialized tool, but most modern ones use ZIF (Zero Insertion Force) techniques, often involving a lever or similar to tighten or loosen the friction/tightness of the contacts. No screwdriver is needed in this case. However, any processor ''can'' be forcefully removed from its socket with a screwdriver.{{Citation needed}}&lt;br /&gt;
|-&lt;br /&gt;
|Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
|{{w|Linus Torvalds}} is the {{w|benevolent dictator for life}} of the Linux kernel codebase. Normally it is hard to make changes because he has the last word, and because the kernel is replicated in all Linux installations. Linus made the news in January 2018 when, having looked at one of Intel's proposed fixes for the Spectre and Meltdown vulnerabilities, he declared &amp;quot;the patches are COMPLETE AND UTTER GARBAGE&amp;quot;.&amp;lt;ref&amp;gt;https://techcrunch.com/2018/01/22/linus-torvalds-declares-intel-fix-for-meltdown-spectre-complete-and-utter-garbage/&amp;lt;/ref&amp;gt; Presumably, it may be found that he may be successfully bribed to be less blunt and/or less critical of vulnerability fixes that are complete and/or utter garbage. If this were the case, this would be a severe critical vulnerability to all Linux servers and machines.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
|The point of an attack is to make someone else's machine perform actions against the owner's will. Anyone can make their own machine execute any code if they have root access and the necessary tools, but this would usually not be described as an attack, except in the case of a locked-down appliance, such as a video game console, a John Deere tractor, or pay TV decoder.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
|This could refer to a CVE vulnerability of JPG files where JavaScript embedded within the image file is executed by some application. In this case, though, the code is visible on the image instead of invisibly encoded within the image file. The code is also only executed if the image contains a photo of a baby in a saddle riding a dog. It's unclear whether the photo would be a digital photo, a printed photo (i.e. as taken using a digital camera), or maybe both. &lt;br /&gt;
Other than by some {{w|metadata}}, either internal to the image file, or embedded along with it, as in a web page, or a PDF or other container file, this &amp;quot;bug&amp;quot; would require the device to {{w|Hard AI|figure out}} specifically what the photo contains image-wise (something that's REALLY HARD for computers to do reliably), but would also require OCR (optical character recognition) code to convert the text superimposed on the photo into executable code. In other words, it's hard to believe in 2018 that such a bug could exist. Maybe in the future when such things are more routine...? As an example, OCR used to be hard to do reliably, but now it's a lot more routine and built into a lot of devices.&lt;br /&gt;
|-&lt;br /&gt;
|Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
|Flash has been an integral browser plugin for decades, but has fallen out of favor in the 2010s, and eventually discontinued because of its notoriously abysmal security record. All security experts advise against installing it. Preventing installation of Flash would make systems more secure, but most versions of Windows do not prevent Flash installation. The joke here relates to the difficulty of keeping Flash up to date, or even installed properly to begin with. A common user experience, which is the subject of numerous jokes and memes, is the constant nagging notification to install or update Flash in order for web pages to display properly. Many IT professionals will bemoan the trouble they have experienced in the workplace due to these notifications and problems related to them.&lt;br /&gt;
|-&lt;br /&gt;
|Turns out the cloud is just other people's computers.&lt;br /&gt;
|This refers to a meme that demands that &amp;quot;cloud&amp;quot; be replaced with &amp;quot;other people's computers&amp;quot; in all marketing presentation to CEOs and non-computer literate persons evaluating the security impact of using cloud services. Part of the humor here is that &amp;quot;the cloud&amp;quot; is, in actuality, simply a term for hosted services, or in other words computers being run by other people (typically businesses that specialize in this type of &amp;quot;{{w|Platform as a Service}}&amp;quot; or &amp;quot;PaaS&amp;quot; service model). Referring to &amp;quot;the cloud&amp;quot; as &amp;quot;other people's computers&amp;quot; is, at its core, entirely accurate, though it takes away the business jargon and simplifies the situation in such a way that it might cast doubt on the security, reliability, and general effectiveness of using &amp;quot;cloud&amp;quot; solutions.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in Mitre's CVE database allows arbitrary code insertion.[[779|[~~CLICK HERE FOR CHEAP VIAGRA~~]]]&lt;br /&gt;
|Mitre's CVE database is where all {{w|Common Vulnerabilities and Exposures|CVEs}} are stored. This log message forms the punchline of the comic, as it implies that all of the exaggerated error messages above might have been inserted by hackers exploiting the vulnerability. To pour salt in the wound, they then included in a typical spam link purporting to offer inexpensive {{w|Viagra|brand-name Sildenafil}}.&lt;br /&gt;
|-&lt;br /&gt;
|It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
|Appears in the title text. {{w|Bruce Schneier}} is security researcher and blogger. The &amp;quot;two kids in a trenchcoat&amp;quot; is a reference to the {{tvtropes|TotemPoleTrench|Totem Pole Trench}} trope. Shortly before this comic was posted, a [https://rare.us/rare-humor/two-kids-dressed-as-a-tall-man-to-get-into-black-panther-is-caught-on-video story went viral] in which two kids were photographed attempting this for real to get into a screening of ''Black Panther''.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A heading is centered above a list of 21 vulnerabilities]&lt;br /&gt;
:&amp;lt;big&amp;gt;Leaked list of major 2018 security vulnerabilities &amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:CVE-2018-????? Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
:CVE-2018-????? An attacker can use a timing attack to extploit a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
:CVE-2018-????? At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
:CVE-2018-????? A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
:CVE-2018-????? MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
:CVE-2018-????? A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
:CVE-2018-????? Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
:CVE-2018-????? An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
:CVE-2018-????? Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer in Missouri that no one's checked on in a while.&lt;br /&gt;
:CVE-2018-????? Nobody really knows how hypervisors work.&lt;br /&gt;
:CVE-2018-????? Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
:CVE-2018-????? x86 has way too many instructions.&lt;br /&gt;
:CVE-2018-????? NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
:CVE-2018-????? Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
:CVE-2018-????? Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
:CVE-2018-????? Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
:CVE-2018-????? An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
:CVE-2018-????? Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
:CVE-2018-????? Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
:CVE-2018-????? Turns out the cloud is just other people's computers.&lt;br /&gt;
:CVE-2018-????? A flaw in Mitre's CVE database allows arbitrary code insertion.&amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;[~~Click here for cheap viagra~~]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
&lt;br /&gt;
Randall has previously referenced diacritics in [[1647: Diacritics]].&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier was previously mentioned in the title texts of [[748: Worst-Case Scenario]] and [[1039: RuBisCO]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Charts]]&lt;br /&gt;
[[Category:Programming]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159399</id>
		<title>1957: 2018 CVE List</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159399"/>
				<updated>2018-06-28T00:31:21Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Table of possible CVE */ Don't be afraid of quad-syllabics (metadata)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1957&lt;br /&gt;
| date      = February 19, 2018&lt;br /&gt;
| title     = 2018 CVE List&lt;br /&gt;
| image     = 2018_cve_list.png&lt;br /&gt;
| titletext = CVE-2018-?????: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
{{w|Common Vulnerabilities and Exposures|CVE}} (Common Vulnerabilities and Exposures) is a standardized format for assigning an identity to a cybersecurity vulnerability (similar to the way that astronomical bodies are assigned unique identifiers by committees). Giving vulnerabilities a unique identifier makes them easier to talk about and helps in keeping track of the progress made toward resolving them. The typical format of a CVE identifier is '''CVE-[YEAR]-[NUMBER]'''. For example, the CVE identifier for 2017's widespread {{w|Meltdown (security vulnerability)|Meltdown vulnerability}} is [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 CVE-2017-5754]. CVEs also contain a short description of the issue.&lt;br /&gt;
&lt;br /&gt;
In this comic (released in February 2018), Randall presents a number of spurious predicted CVEs for later in 2018. Each CVE identifier is given as &amp;quot;CVE-2018-?????&amp;quot;, reflecting the fact that they have not yet happened so we don't know exactly what their CVE identifier will be.&lt;br /&gt;
&lt;br /&gt;
==Table of possible CVE==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%;&amp;quot; | Security Vulnerability&lt;br /&gt;
! style=&amp;quot;width: 70%;&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|Apple products crash when displaying certain {{w|Telugu language|Telugu}} or {{w|Bengali language|Bengali}} letter combinations.&lt;br /&gt;
|This refers to a real vulnerability in iOS and MacOS publicized a few days before the comic was released,&amp;lt;ref&amp;gt;https://techcrunch.com/2018/02/15/iphone-text-bomb-ios-mac-crash-apple/&amp;lt;/ref&amp;gt; as well as past similar iOS vulnerabilities&amp;lt;ref&amp;gt;https://thenextweb.com/apps/2017/01/18/iphone-ipad-apple-text-ios-bug/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.telegraph.co.uk/technology/2018/01/18/apple-text-bomb-can-crash-iphones-single-message/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can use a timing attack to extploit [''sic''] a race condition in {{w|Garbage collection (computer science)|garbage collection}} to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
|The reference to using a Timing Attack to exploit a race condition in garbage collection refers to Meltdown and Spectre CPU flaws that can be exploited in a cloud server like the ones in Wikipedia. {{w|Claude Shannon}} was an early and highly influential information scientist whose work underlies compression, encryption, security, and the theory behind how information is encoded into binary digits. &lt;br /&gt;
&lt;br /&gt;
This is not a security problem. However, since Shannon formulated how the amount of unique or actual information some entity contains is proportional to the number of bits required to encode it, retrieving only a few bits casts a dark perspective upon the significance of the Shannon article's content.&lt;br /&gt;
|-&lt;br /&gt;
|At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
|Cafés often offer free access to WiFi as a service to patrons, as a business strategy to encourage said patrons to remain in the building and buy more coffee. Some use a password, so that only patrons can use the WiFi, and may display the password on signage inside. Since anybody could go into the cafe to read the post-it, and then use the network from nearby, the ability to read it from outside is, at most, a trivial problem. For systems that are supposed to be secure, writing passwords in a visible place is a major security flaw. For instance, following the [[wikipedia:2018 Hawaii false missile alert|2018 Hawaii false missile alert]], the agency concerned received criticism for a press photo showing a password written on a sticky note attached to a monitor.&amp;lt;ref&amp;gt;http://uk.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1?r=US&amp;amp;IR=T&amp;lt;/ref&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
|A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
|Describes a common feature on news sites or social media sites like Facebook. The possibility for users to &amp;quot;inject&amp;quot; text into the page is by design. This is a humorous reference to the relatively common security vulnerability &amp;quot;[[Wikipedia:Cross-site_scripting|persistent cross-site scripting]]&amp;quot;, where input provided by a user, such as through a comment section, can result in dangerous content containing arbitrary HTML or JavaScript code being displayed to other users. &lt;br /&gt;
|-&lt;br /&gt;
|MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
|Some people pronounce &amp;quot;{{w|SQL}}&amp;quot; like &amp;quot;sequel&amp;quot;, after SQL's predecessor &amp;quot;SEQUEL (Structured English Query Language)&amp;quot;. The standard for SQL suggests that it should be pronounced as separate letters; however, the author of SQL pronounces it &amp;quot;sequel&amp;quot;, so the debate is persisting (with even more justification than arguments about how to pronounce &amp;quot;GIF&amp;quot;). MySQL is an open-source relational database management system. The latest generally available version (at the time of writing) is MySQL 5.7.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
|{{w|Privilege escalation}} refers to any illegitimate means by which a system user gains greater access than they are supposed to have, and most hackers will seek to achieve this if they can. The most highly-sought privilege is that of the root user, which allows complete access to an entire system&amp;amp;mdash; a ''superuser''.&lt;br /&gt;
&lt;br /&gt;
The irony of this CVE presents the reverse situation: that a flaw inadvertently ''de-escalates'' a root user to a less privileged user, which would cripple the ''superuser'', they would be disallowed access or ability to accomplish their required tasks, or worse, cause such tasks which do not {{w|fail safe}} to have catastrophic side effects.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
|This is a reference to a common problem of modern gadgets catching fire (usually related to flaws in lithium-ion batteries), as well as to Apple products crashing when attempting to display certain character sequences. Diacritics are the accents found on letters in some languages (eg. č, ģ ķ, ļ, ņ, š, ž). These would not normally be found on emojis.&lt;br /&gt;
|-&lt;br /&gt;
|An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
|This probably refers to the movie {{w|Air Bud}}, about a dog playing basketball. This has been a common theme in xkcd comics: see [[115: Meerkat]], [[1439: Rack Unit]], [[1819: Sweet 16]], [[1552: Rulebook]].&lt;br /&gt;
In 2017, it was discovered that an oversight in the constitution of the state of Kansas may [http://www.kansascity.com/news/politics-government/article175956836.html permit a dog to be governor]. Shortly before this comic published, the Secretary of State's office ruled that [http://dfw.cbslocal.com/2018/02/13/dog-kansas-governor/ it could not].&lt;br /&gt;
|-&lt;br /&gt;
|Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer [''sic''] in Missouri that no one's checked on in a while.&lt;br /&gt;
|{{w|Haskell (programming language)|Haskell}} is a functional programming language. Functional programming is characterized by using functions that don't have side effects because they can not change things accessible in other parts of the program, as in [[1312: Haskell]]. The joke here is discovering that it does indeed have side-effects, manifested via external alteration, not violating the internal alteration paradigm.&lt;br /&gt;
|-&lt;br /&gt;
|Nobody really knows how hypervisors work.&lt;br /&gt;
|[[wikipedia:Hypervisor|&amp;quot;Hypervisors&amp;quot;]] are a tool for computer virtualization. Virtualization is implemented via various combinations of hardware and/or software, which requires a computer to completely simulate another computer, with its own unique hardware and software, and to varying degrees as to whether or not the virtualization is aware of or can determine whether it is being virtualized. Many IT professionals and businesses rely heavily on various forms of virtualization, but most of the individual employees would be hard-pressed to explain how it works. Programs running on other virtual computers, or on the real computer, may be able to access information on a virtual computer in ways which would not be possible with a single real computer. Consequently, understanding how the hypervisor works is important to assessing the security of a virtual server. Meltdown and Spectre are related to this.&lt;br /&gt;
|-&lt;br /&gt;
|Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
|This joke is about arcane systems that are running Linux in exceedingly rare situations, meaning that reproducing errors would be incredibly difficult or inconvenient, and would only affect a very tiny user base (if any at all). {{w|IBM System/390 ES/9000 Enterprise Systems Architecture ESA family|System/390}} is an IBM mainframe introduced almost 30 years before this comic, which has a version of Linux. UTC+14 is a time zone used only on some islands in the Pacific Ocean (Primarily [[Wikipedia:Line_Islands|the Line Islands]]) and is also the earliest time zone on earth. Even if all of these absurd conditions were met, the resulting vulnerability would still be relatively benign: simply changing a user's preferred clock display format. Other xkcd comics make references to such obscure computer-time issues relating to time zones and time conversions, and how many programmers find these issues frustrating or even traumatizing. &lt;br /&gt;
|-&lt;br /&gt;
|x86 has way too many instructions.&lt;br /&gt;
|The x86 architecture (used in many Intel and AMD processors) is very complicated. Processors typically implement such a complex architecture using programs (microcode) run on a set of hidden, proprietary processors. The details of these hidden machines and errors in the microcode can result in security vulnerabilities, such as Meltdown, where the physical machine does not match the conceptual machine.&lt;br /&gt;
&lt;br /&gt;
A more complicated instruction set is more complex to implement.{{Citation needed}} The x86 architecture is considered &amp;quot;CISC&amp;quot; (a &amp;quot;{{w|Complex instruction set computer}}&amp;quot;), having many instructions originally provided to make programming by a human simpler; other examples include the 68000 series used in the first {{w|Apple Macintosh}}. In the 1980s, this design philosophy was countered by the &amp;quot;RISC&amp;quot; (&amp;quot;{{w|Reduced instruction set computer}}&amp;quot;) design movement - based on the observation that computer programs were increasingly generated by compilers (which only used a few instructions) rather than directly by people, and that the chip area dedicated to extra instructions could be better dedicated to, for example, cache. Examples of RISC style designs include {{w|SPARC}}, {{w|MIPS}}, {{w|PowerPC}} (used by Apple in later Macintoshes) and the {{w|ARM architecture|ARM}} chips common in mobile phones. Historically, there was considerable discussion about the merits of each approach. At one time the Mac and Windows PC were on different sides; owners of other competing systems such as the Archimedes and Amiga had similar arguments on usenet in the early 1990s. This &amp;quot;issue&amp;quot; may be posted by someone who still recalls these debates. Technically, the extra instructions do slightly complicate the task of validating correct chip behaviour and complicate the tool chains that manage software, which could be seen as a minor security risk. However, the 64-bit architecture introduced by {{w|AMD}}, and since adopted by {{w|Intel}}, does rationalise things somewhat, and all recent x86 chips break down instructions into RISC-like micro-operations, so the complication from a hardware perspective is localised. Recent security issues, such as the speculative cache load issue in Meltdown and Spectre, depend more on details of implementation, rather than instruction set, and have been exhibited both by x86 (CISC) and ARM (RISC) processors.&lt;br /&gt;
&lt;br /&gt;
This explanation has way too many words.&lt;br /&gt;
|-&lt;br /&gt;
|NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
|Fantastically, this would be an unimaginable software threat, not to be confused with the even speedier, but future-bound, threat in hardware via {{w|Quantum computing}}. &lt;br /&gt;
NumPy is the fundamental package for scientific computing with the programming language Python. ''O''(log ''n'') is [[wikipedia:Big_O_notation#Infinite_asymptotics|Big O notation]] meaning that the time it takes for a computer algorithm to run is in the order of log ''n'', for an input of size ''n''. ''O''(log ''n'') is very fast and is more usual for a search algorithm. Prime factorization currently is ''O''(''2''&amp;lt;sup&amp;gt;''n''&amp;lt;/sup&amp;gt;n)). If something can find the prime factors of a number this quickly, especially a [[wikipedia:semiprime|semiprime]] with two large factors, it will enable attacks to break many crypto functions used in internet security. However, prime numbers have only a single factor, and &amp;quot;factoring primes&amp;quot; quickly is a simpler problem, that of [[wikipedia:Primality test|proving that a number is in fact a prime]]. &lt;br /&gt;
|-&lt;br /&gt;
|Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
|Another joke on the first CVE and [[wikipedia:I before E except after C|a common English writing rule of thumb]], which fails almost as often as it succeeds. Possibly a jab at Apple's image, portraying their software as unable to handle improper grammar or spelling.&lt;br /&gt;
|-&lt;br /&gt;
|Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
|Skylake x86 chips are a line of microprocessors made by Intel. Some processors are soldered directly to a system board or daughter board, while others are attached to boards that plug into the system board by means of a socket (pins or connectors that make physical contact with receptacles or connectors on a system board). Some sockets, especially older ones, require force to insert or remove, and often require the use of a flat blade screwdriver or a specialized tool, but most modern ones use ZIF (Zero Insertion Force) techniques, often involving a lever or similar to tighten or loosen the friction/tightness of the contacts. No screwdriver is needed in this case. However, any processor ''can'' be forcefully removed from its socket with a screwdriver.{{Citation needed}}&lt;br /&gt;
|-&lt;br /&gt;
|Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
|{{w|Linus Torvalds}} is the {{w|benevolent dictator for life}} of the Linux kernel codebase. Normally it is hard to make changes because he has the last word, and because the kernel is replicated in all Linux installations. Linus made the news in January 2018 when, having looked at one of Intel's proposed fixes for the Spectre and Meltdown vulnerabilities, he declared &amp;quot;the patches are COMPLETE AND UTTER GARBAGE&amp;quot;.&amp;lt;ref&amp;gt;https://techcrunch.com/2018/01/22/linus-torvalds-declares-intel-fix-for-meltdown-spectre-complete-and-utter-garbage/&amp;lt;/ref&amp;gt; Presumably, it may be found that he may be successfully bribed to be less blunt and/or less critical of vulnerability fixes that are complete and/or utter garbage. If this were the case, this would be a severe critical vulnerability to all Linux servers and machines.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
|The point of an attack is to make someone else's machine perform actions against the owner's will. Anyone can make their own machine execute any code if they have root access and the necessary tools, but this would usually not be described as an attack, except in the case of a locked-down appliance, such as a video game console, a John Deere tractor, or pay TV decoder.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
|This could refer to a CVE vulnerability of JPG files where JavaScript embedded within the image file is executed by some application. In this case, though, the code is visible on the image instead of invisibly encoded within the image file. The code is also only executed if the image contains a photo of a baby in a saddle riding a dog. It's unclear whether the photo would be a digital photo, a printed photo (i.e. as taken using a digital camera), or maybe both. &lt;br /&gt;
Other than by some {{w|metadata}}, either internal to the image file, or embedded along with it, as in a web page, or a PDF or other container file, this &amp;quot;bug&amp;quot; would require the device to {{w|Hard AI|figure out}} specifically what the photo contains image-wise (something that's REALLY HARD for computers to do reliably), but would also require OCR (optical character recognition) code to convert the text superimposed on the photo into executable code. In other words, it's hard to believe in 2018 that such a bug could exist. Maybe in the future when such things are more routine...? As an example, OCR used to be hard to do reliably, but now it's a lot more routine and built into a lot of devices.&lt;br /&gt;
|-&lt;br /&gt;
|Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
|Flash has been an integral browser plugin for decades, but has fallen out of favor in the 2010s, and eventually discontinued because of its notoriously abysmal security record. All security experts advise against installing it. Preventing installation of Flash would make systems more secure, but most versions of Windows do not prevent Flash installation. The joke here relates to the difficulty of keeping Flash up to date, or even installed properly to begin with. A common user experience, which is the subject of numerous jokes and memes, is the constant nagging notification to install or update Flash in order for web pages to display properly. Many IT professionals will bemoan the trouble they have experienced in the workplace due to these notifications and problems related to them.&lt;br /&gt;
|-&lt;br /&gt;
|Turns out the cloud is just other people's computers.&lt;br /&gt;
|This refers to a meme that demands that &amp;quot;cloud&amp;quot; be replaced with &amp;quot;other people's computers&amp;quot; in all marketing presentation to CEOs and non-computer literate persons evaluating the security impact of using cloud services. Part of the humor here is that &amp;quot;the cloud&amp;quot; is, in actuality, simply a term for hosted services, or in other words computers being run by other people (typically businesses that specialize in this type of &amp;quot;Platform as a Service&amp;quot; or &amp;quot;PaaS&amp;quot; service model). Referring to &amp;quot;the cloud&amp;quot; as &amp;quot;other people's computers&amp;quot; is, at its core, entirely accurate, though it takes away the business jargon and simplifies the situation in such a way that it might cast doubt on the security, reliability, and general effectiveness of using &amp;quot;cloud&amp;quot; solutions.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in Mitre's CVE database allows arbitrary code insertion.[[779|[~~CLICK HERE FOR CHEAP VIAGRA~~]]]&lt;br /&gt;
|Mitre's CVE database is where all {{w|Common Vulnerabilities and Exposures|CVEs}} are stored. This log message forms the punchline of the comic, as it implies that all of the exaggerated error messages above might have been inserted by hackers exploiting the vulnerability. To pour salt in the wound, they then included in a typical spam link purporting to offer inexpensive {{w|Viagra|brand-name Sildenafil}}.&lt;br /&gt;
|-&lt;br /&gt;
|It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
|Appears in the title text. {{w|Bruce Schneier}} is security researcher and blogger. The &amp;quot;two kids in a trenchcoat&amp;quot; is a reference to the {{tvtropes|TotemPoleTrench|Totem Pole Trench}} trope. Shortly before this comic was posted, a [https://rare.us/rare-humor/two-kids-dressed-as-a-tall-man-to-get-into-black-panther-is-caught-on-video story went viral] in which two kids were photographed attempting this for real to get into a screening of ''Black Panther''.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A heading is centered above a list of 21 vulnerabilities]&lt;br /&gt;
:&amp;lt;big&amp;gt;Leaked list of major 2018 security vulnerabilities &amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:CVE-2018-????? Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
:CVE-2018-????? An attacker can use a timing attack to extploit a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
:CVE-2018-????? At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
:CVE-2018-????? A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
:CVE-2018-????? MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
:CVE-2018-????? A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
:CVE-2018-????? Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
:CVE-2018-????? An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
:CVE-2018-????? Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer in Missouri that no one's checked on in a while.&lt;br /&gt;
:CVE-2018-????? Nobody really knows how hypervisors work.&lt;br /&gt;
:CVE-2018-????? Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
:CVE-2018-????? x86 has way too many instructions.&lt;br /&gt;
:CVE-2018-????? NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
:CVE-2018-????? Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
:CVE-2018-????? Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
:CVE-2018-????? Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
:CVE-2018-????? An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
:CVE-2018-????? Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
:CVE-2018-????? Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
:CVE-2018-????? Turns out the cloud is just other people's computers.&lt;br /&gt;
:CVE-2018-????? A flaw in Mitre's CVE database allows arbitrary code insertion.&amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;[~~Click here for cheap viagra~~]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
&lt;br /&gt;
Randall has previously referenced diacritics in [[1647: Diacritics]].&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier was previously mentioned in the title texts of [[748: Worst-Case Scenario]] and [[1039: RuBisCO]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Charts]]&lt;br /&gt;
[[Category:Programming]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159397</id>
		<title>1957: 2018 CVE List</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159397"/>
				<updated>2018-06-27T23:49:47Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Table of possible CVE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1957&lt;br /&gt;
| date      = February 19, 2018&lt;br /&gt;
| title     = 2018 CVE List&lt;br /&gt;
| image     = 2018_cve_list.png&lt;br /&gt;
| titletext = CVE-2018-?????: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
{{w|Common Vulnerabilities and Exposures|CVE}} (Common Vulnerabilities and Exposures) is a standardized format for assigning an identity to a cybersecurity vulnerability (similar to the way that astronomical bodies are assigned unique identifiers by committees). Giving vulnerabilities a unique identifier makes them easier to talk about and helps in keeping track of the progress made toward resolving them. The typical format of a CVE identifier is '''CVE-[YEAR]-[NUMBER]'''. For example, the CVE identifier for 2017's widespread {{w|Meltdown (security vulnerability)|Meltdown vulnerability}} is [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 CVE-2017-5754]. CVEs also contain a short description of the issue.&lt;br /&gt;
&lt;br /&gt;
In this comic (released in February 2018), Randall presents a number of spurious predicted CVEs for later in 2018. Each CVE identifier is given as &amp;quot;CVE-2018-?????&amp;quot;, reflecting the fact that they have not yet happened so we don't know exactly what their CVE identifier will be.&lt;br /&gt;
&lt;br /&gt;
==Table of possible CVE==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%;&amp;quot; | Security Vulnerability&lt;br /&gt;
! style=&amp;quot;width: 70%;&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|Apple products crash when displaying certain {{w|Telugu language|Telugu}} or {{w|Bengali language|Bengali}} letter combinations.&lt;br /&gt;
|This refers to a real vulnerability in iOS and MacOS publicized a few days before the comic was released,&amp;lt;ref&amp;gt;https://techcrunch.com/2018/02/15/iphone-text-bomb-ios-mac-crash-apple/&amp;lt;/ref&amp;gt; as well as past similar iOS vulnerabilities&amp;lt;ref&amp;gt;https://thenextweb.com/apps/2017/01/18/iphone-ipad-apple-text-ios-bug/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.telegraph.co.uk/technology/2018/01/18/apple-text-bomb-can-crash-iphones-single-message/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can use a timing attack to extploit [''sic''] a race condition in {{w|Garbage collection (computer science)|garbage collection}} to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
|The reference to using a Timing Attack to exploit a race condition in garbage collection refers to Meltdown and Spectre CPU flaws that can be exploited in a cloud server like the ones in Wikipedia. {{w|Claude Shannon}} was an early and highly influential information scientist whose work underlies compression, encryption, security, and the theory behind how information is encoded into binary digits. &lt;br /&gt;
&lt;br /&gt;
This is not a security problem. However, since Shannon formulated how the amount of unique or actual information some entity contains is proportional to the number of bits required to encode it, retrieving only a few bits casts a dark perspective upon the significance of the Shannon article's content.&lt;br /&gt;
|-&lt;br /&gt;
|At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
|Cafés often offer free access to WiFi as a service to patrons, as a business strategy to encourage said patrons to remain in the building and buy more coffee. Some use a password, so that only patrons can use the WiFi, and may display the password on signage inside. Since anybody could go into the cafe to read the post-it, and then use the network from nearby, the ability to read it from outside is, at most, a trivial problem. For systems that are supposed to be secure, writing passwords in a visible place is a major security flaw. For instance, following the [[wikipedia:2018 Hawaii false missile alert|2018 Hawaii false missile alert]], the agency concerned received criticism for a press photo showing a password written on a sticky note attached to a monitor.&amp;lt;ref&amp;gt;http://uk.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1?r=US&amp;amp;IR=T&amp;lt;/ref&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
|A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
|Describes a common feature on news sites or social media sites like Facebook. The possibility for users to &amp;quot;inject&amp;quot; text into the page is by design. This is a humorous reference to the relatively common security vulnerability &amp;quot;[[Wikipedia:Cross-site_scripting|persistent cross-site scripting]]&amp;quot;, where input provided by a user, such as through a comment section, can result in dangerous content containing arbitrary HTML or JavaScript code being displayed to other users. &lt;br /&gt;
|-&lt;br /&gt;
|MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
|Some people pronounce &amp;quot;{{w|SQL}}&amp;quot; like &amp;quot;sequel&amp;quot;, after SQL's predecessor &amp;quot;SEQUEL (Structured English Query Language)&amp;quot;. The standard for SQL suggests that it should be pronounced as separate letters; however, the author of SQL pronounces it &amp;quot;sequel&amp;quot;, so the debate is persisting (with even more justification than arguments about how to pronounce &amp;quot;GIF&amp;quot;). MySQL is an open-source relational database management system. The latest generally available version (at the time of writing) is MySQL 5.7.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
|{{w|Privilege escalation}} refers to any illegitimate means by which a system user gains greater access than they are supposed to have, and most hackers will seek to achieve this if they can. The most highly-sought privilege is that of the root user, which allows complete access to an entire system&amp;amp;mdash; a ''superuser''.&lt;br /&gt;
&lt;br /&gt;
The irony of this CVE presents the reverse situation: that a flaw inadvertently ''de-escalates'' a root user to a less privileged user, which would cripple the ''superuser'', they would be disallowed access or ability to accomplish their required tasks, or worse, cause such tasks which do not {{w|fail safe}} to have catastrophic side effects.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
|This is a reference to a common problem of modern gadgets catching fire (usually related to flaws in lithium-ion batteries), as well as to Apple products crashing when attempting to display certain character sequences. Diacritics are the accents found on letters in some languages (eg. č, ģ ķ, ļ, ņ, š, ž). These would not normally be found on emojis.&lt;br /&gt;
|-&lt;br /&gt;
|An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
|This probably refers to the movie {{w|Air Bud}}, about a dog playing basketball. This has been a common theme in xkcd comics: see [[115: Meerkat]], [[1439: Rack Unit]], [[1819: Sweet 16]], [[1552: Rulebook]].&lt;br /&gt;
In 2017, it was discovered that an oversight in the constitution of the state of Kansas may [http://www.kansascity.com/news/politics-government/article175956836.html permit a dog to be governor]. Shortly before this comic published, the Secretary of State's office ruled that [http://dfw.cbslocal.com/2018/02/13/dog-kansas-governor/ it could not].&lt;br /&gt;
|-&lt;br /&gt;
|Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer [''sic''] in Missouri that no one's checked on in a while.&lt;br /&gt;
|{{w|Haskell (programming language)|Haskell}} is a functional programming language. Functional programming is characterized by using functions that don't have side effects because they can not change things accessible in other parts of the program, as in [[1312: Haskell]]. The joke here is discovering that it does indeed have side-effects, manifested via external alteration, not violating the internal alteration paradigm.&lt;br /&gt;
|-&lt;br /&gt;
|Nobody really knows how hypervisors work.&lt;br /&gt;
|[[wikipedia:Hypervisor|&amp;quot;Hypervisors&amp;quot;]] are a tool for computer virtualization. Virtualization is implemented via various combinations of hardware and/or software, which requires a computer to completely simulate another computer, with its own unique hardware and software, and to varying degrees as to whether or not the virtualization is aware of or can determine whether it is being virtualized. Many IT professionals and businesses rely heavily on various forms of virtualization, but most of the individual employees would be hard-pressed to explain how it works. Programs running on other virtual computers, or on the real computer, may be able to access information on a virtual computer in ways which would not be possible with a single real computer. Consequently, understanding how the hypervisor works is important to assessing the security of a virtual server. Meltdown and Spectre are related to this.&lt;br /&gt;
|-&lt;br /&gt;
|Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
|This joke is about arcane systems that are running Linux in exceedingly rare situations, meaning that reproducing errors would be incredibly difficult or inconvenient, and would only affect a very tiny user base (if any at all). {{w|IBM System/390 ES/9000 Enterprise Systems Architecture ESA family|System/390}} is an IBM mainframe introduced almost 30 years before this comic, which has a version of Linux. UTC+14 is a time zone used only on some islands in the Pacific Ocean (Primarily [[Wikipedia:Line_Islands|the Line Islands]]) and is also the earliest time zone on earth. Even if all of these absurd conditions were met, the resulting vulnerability would still be relatively benign: simply changing a user's preferred clock display format. Other xkcd comics make references to such obscure computer-time issues relating to time zones and time conversions, and how many programmers find these issues frustrating or even traumatizing. &lt;br /&gt;
|-&lt;br /&gt;
|x86 has way too many instructions.&lt;br /&gt;
|The x86 architecture (used in many Intel and AMD processors) is very complicated. Processors typically implement such a complex architecture using programs (microcode) run on a set of hidden, proprietary processors. The details of these hidden machines and errors in the microcode can result in security vulnerabilities, such as Meltdown, where the physical machine does not match the conceptual machine.&lt;br /&gt;
&lt;br /&gt;
A more complicated instruction set is more complex to implement.{{Citation needed}} The x86 architecture is considered &amp;quot;CISC&amp;quot; (a &amp;quot;{{w|Complex instruction set computer}}&amp;quot;), having many instructions originally provided to make programming by a human simpler; other examples include the 68000 series used in the first {{w|Apple Macintosh}}. In the 1980s, this design philosophy was countered by the &amp;quot;RISC&amp;quot; (&amp;quot;{{w|Reduced instruction set computer}}&amp;quot;) design movement - based on the observation that computer programs were increasingly generated by compilers (which only used a few instructions) rather than directly by people, and that the chip area dedicated to extra instructions could be better dedicated to, for example, cache. Examples of RISC style designs include {{w|SPARC}}, {{w|MIPS}}, {{w|PowerPC}} (used by Apple in later Macintoshes) and the {{w|ARM architecture|ARM}} chips common in mobile phones. Historically, there was considerable discussion about the merits of each approach. At one time the Mac and Windows PC were on different sides; owners of other competing systems such as the Archimedes and Amiga had similar arguments on usenet in the early 1990s. This &amp;quot;issue&amp;quot; may be posted by someone who still recalls these debates. Technically, the extra instructions do slightly complicate the task of validating correct chip behaviour and complicate the tool chains that manage software, which could be seen as a minor security risk. However, the 64-bit architecture introduced by {{w|AMD}}, and since adopted by {{w|Intel}}, does rationalise things somewhat, and all recent x86 chips break down instructions into RISC-like micro-operations, so the complication from a hardware perspective is localised. Recent security issues, such as the speculative cache load issue in Meltdown and Spectre, depend more on details of implementation, rather than instruction set, and have been exhibited both by x86 (CISC) and ARM (RISC) processors.&lt;br /&gt;
&lt;br /&gt;
This explanation has way too many words.&lt;br /&gt;
|-&lt;br /&gt;
|NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
|Fantastically, this would be an unimaginable software threat, not to be confused with the even speedier, but future-bound, threat in hardware via {{w|Quantum computing}}. &lt;br /&gt;
NumPy is the fundamental package for scientific computing with the programming language Python. ''O''(log ''n'') is [[wikipedia:Big_O_notation#Infinite_asymptotics|Big O notation]] meaning that the time it takes for a computer algorithm to run is in the order of log ''n'', for an input of size ''n''. ''O''(log ''n'') is very fast and is more usual for a search algorithm. Prime factorization currently is ''O''(''2''&amp;lt;sup&amp;gt;''n''&amp;lt;/sup&amp;gt;n)). If something can find the prime factors of a number this quickly, especially a [[wikipedia:semiprime|semiprime]] with two large factors, it will enable attacks to break many crypto functions used in internet security. However, prime numbers have only a single factor, and &amp;quot;factoring primes&amp;quot; quickly is a simpler problem, that of [[wikipedia:Primality test|proving that a number is in fact a prime]]. &lt;br /&gt;
|-&lt;br /&gt;
|Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
|Another joke on the first CVE and [[wikipedia:I before E except after C|a common English writing rule of thumb]], which fails almost as often as it succeeds. Possibly a jab at Apple's image, portraying their software as unable to handle improper grammar or spelling.&lt;br /&gt;
|-&lt;br /&gt;
|Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
|Skylake x86 chips are a line of microprocessors made by Intel. Some processors are soldered directly to a system board or daughter board, while others are attached to boards that plug into the system board by means of a socket (pins or connectors that make physical contact with receptacles or connectors on a system board). Some sockets, especially older ones, require force to insert or remove, and often require the use of a flat blade screwdriver or a specialized tool, but most modern ones use ZIF (Zero Insertion Force) techniques, often involving a lever or similar to tighten or loosen the friction/tightness of the contacts. No screwdriver is needed in this case. However, any processor ''can'' be forcefully removed from its socket with a screwdriver.{{Citation needed}}&lt;br /&gt;
|-&lt;br /&gt;
|Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
|{{w|Linus Torvalds}} is the {{w|benevolent dictator for life}} of the Linux kernel codebase. Normally it is hard to make changes because he has the last word, and because the kernel is replicated in all Linux installations. Linus made the news in January 2018 when, having looked at one of Intel's proposed fixes for the Spectre and Meltdown vulnerabilities, he declared &amp;quot;the patches are COMPLETE AND UTTER GARBAGE&amp;quot;.&amp;lt;ref&amp;gt;https://techcrunch.com/2018/01/22/linus-torvalds-declares-intel-fix-for-meltdown-spectre-complete-and-utter-garbage/&amp;lt;/ref&amp;gt; Presumably, it may be found that he may be successfully bribed to be less blunt and/or less critical of vulnerability fixes that are complete and/or utter garbage. If this were the case, this would be a severe critical vulnerability to all Linux servers and machines.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
|The point of an attack is to make someone else's machine perform actions against the owner's will. Anyone can make their own machine execute any code if they have root access and the necessary tools, but this would usually not be described as an attack, except in the case of a locked-down appliance, such as a video game console, a John Deere tractor, or pay TV decoder.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
|This could refer to a CVE vulnerability of JPG files where JavaScript embedded within the image file is executed by some application. In this case, though, the code is visible on the image instead of invisibly encoded within the image file. The code is also only executed if the image contains a photo of a baby in a saddle riding a dog. It's unclear whether the photo would be a digital photo, a printed photo (i.e. as taken using a digital camera), or maybe both. This &amp;quot;bug&amp;quot; would not only require the device to figure out specifically what the photo contains image-wise (something that's REALLY HARD for computers to do reliably), but would also require OCR (optical character recognition) code to convert the text superimposed on the photo into executable code. In other words, it's hard to believe in 2018 that such a bug could exist. Maybe in the future when such things are more routine...? As an example, OCR used to be hard to do reliably, but now it's a lot more routine and built into a lot of devices.&lt;br /&gt;
|-&lt;br /&gt;
|Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
|Flash has been an integral browser plugin for decades, but has fallen out of favor in the 2010s, and eventually discontinued because of its notoriously abysmal security record. All security experts advise against installing it. Preventing installation of Flash would make systems more secure, but most versions of Windows do not prevent Flash installation. The joke here relates to the difficulty of keeping Flash up to date, or even installed properly to begin with. A common user experience, which is the subject of numerous jokes and memes, is the constant nagging notification to install or update Flash in order for web pages to display properly. Many IT professionals will bemoan the trouble they have experienced in the workplace due to these notifications and problems related to them.&lt;br /&gt;
|-&lt;br /&gt;
|Turns out the cloud is just other people's computers.&lt;br /&gt;
|This refers to a meme that demands that &amp;quot;cloud&amp;quot; be replaced with &amp;quot;other people's computers&amp;quot; in all marketing presentation to CEOs and non-computer literate persons evaluating the security impact of using cloud services. Part of the humor here is that &amp;quot;the cloud&amp;quot; is, in actuality, simply a term for hosted services, or in other words computers being run by other people (typically businesses that specialize in this type of &amp;quot;Platform as a Service&amp;quot; or &amp;quot;PaaS&amp;quot; service model). Referring to &amp;quot;the cloud&amp;quot; as &amp;quot;other people's computers&amp;quot; is, at its core, entirely accurate, though it takes away the business jargon and simplifies the situation in such a way that it might cast doubt on the security, reliability, and general effectiveness of using &amp;quot;cloud&amp;quot; solutions.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in Mitre's CVE database allows arbitrary code insertion.[[779|[~~CLICK HERE FOR CHEAP VIAGRA~~]]]&lt;br /&gt;
|Mitre's CVE database is where all {{w|Common Vulnerabilities and Exposures|CVEs}} are stored. This log message forms the punchline of the comic, as it implies that all of the exaggerated error messages above might have been inserted by hackers exploiting the vulnerability. To pour salt in the wound, they then included in a typical spam link purporting to offer inexpensive {{w|Viagra|brand-name Sildenafil}}.&lt;br /&gt;
|-&lt;br /&gt;
|It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
|Appears in the title text. {{w|Bruce Schneier}} is security researcher and blogger. The &amp;quot;two kids in a trenchcoat&amp;quot; is a reference to the {{tvtropes|TotemPoleTrench|Totem Pole Trench}} trope. Shortly before this comic was posted, a [https://rare.us/rare-humor/two-kids-dressed-as-a-tall-man-to-get-into-black-panther-is-caught-on-video story went viral] in which two kids were photographed attempting this for real to get into a screening of ''Black Panther''.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A heading is centered above a list of 21 vulnerabilities]&lt;br /&gt;
:&amp;lt;big&amp;gt;Leaked list of major 2018 security vulnerabilities &amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:CVE-2018-????? Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
:CVE-2018-????? An attacker can use a timing attack to extploit a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
:CVE-2018-????? At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
:CVE-2018-????? A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
:CVE-2018-????? MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
:CVE-2018-????? A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
:CVE-2018-????? Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
:CVE-2018-????? An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
:CVE-2018-????? Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer in Missouri that no one's checked on in a while.&lt;br /&gt;
:CVE-2018-????? Nobody really knows how hypervisors work.&lt;br /&gt;
:CVE-2018-????? Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
:CVE-2018-????? x86 has way too many instructions.&lt;br /&gt;
:CVE-2018-????? NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
:CVE-2018-????? Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
:CVE-2018-????? Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
:CVE-2018-????? Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
:CVE-2018-????? An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
:CVE-2018-????? Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
:CVE-2018-????? Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
:CVE-2018-????? Turns out the cloud is just other people's computers.&lt;br /&gt;
:CVE-2018-????? A flaw in Mitre's CVE database allows arbitrary code insertion.&amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;[~~Click here for cheap viagra~~]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
&lt;br /&gt;
Randall has previously referenced diacritics in [[1647: Diacritics]].&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier was previously mentioned in the title texts of [[748: Worst-Case Scenario]] and [[1039: RuBisCO]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Charts]]&lt;br /&gt;
[[Category:Programming]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159396</id>
		<title>1957: 2018 CVE List</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159396"/>
				<updated>2018-06-27T23:35:54Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Table of possible CVE */ The odds are, in an infinite universe, that we ourselves are virtualized&amp;amp;mdash; so who virtualizes the virtualizers?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1957&lt;br /&gt;
| date      = February 19, 2018&lt;br /&gt;
| title     = 2018 CVE List&lt;br /&gt;
| image     = 2018_cve_list.png&lt;br /&gt;
| titletext = CVE-2018-?????: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
{{w|Common Vulnerabilities and Exposures|CVE}} (Common Vulnerabilities and Exposures) is a standardized format for assigning an identity to a cybersecurity vulnerability (similar to the way that astronomical bodies are assigned unique identifiers by committees). Giving vulnerabilities a unique identifier makes them easier to talk about and helps in keeping track of the progress made toward resolving them. The typical format of a CVE identifier is '''CVE-[YEAR]-[NUMBER]'''. For example, the CVE identifier for 2017's widespread {{w|Meltdown (security vulnerability)|Meltdown vulnerability}} is [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 CVE-2017-5754]. CVEs also contain a short description of the issue.&lt;br /&gt;
&lt;br /&gt;
In this comic (released in February 2018), Randall presents a number of spurious predicted CVEs for later in 2018. Each CVE identifier is given as &amp;quot;CVE-2018-?????&amp;quot;, reflecting the fact that they have not yet happened so we don't know exactly what their CVE identifier will be.&lt;br /&gt;
&lt;br /&gt;
==Table of possible CVE==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%;&amp;quot; | Security Vulnerability&lt;br /&gt;
! style=&amp;quot;width: 70%;&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|Apple products crash when displaying certain {{w|Telugu language|Telugu}} or {{w|Bengali language|Bengali}} letter combinations.&lt;br /&gt;
|This refers to a real vulnerability in iOS and MacOS publicized a few days before the comic was released,&amp;lt;ref&amp;gt;https://techcrunch.com/2018/02/15/iphone-text-bomb-ios-mac-crash-apple/&amp;lt;/ref&amp;gt; as well as past similar iOS vulnerabilities&amp;lt;ref&amp;gt;https://thenextweb.com/apps/2017/01/18/iphone-ipad-apple-text-ios-bug/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.telegraph.co.uk/technology/2018/01/18/apple-text-bomb-can-crash-iphones-single-message/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can use a timing attack to extploit [''sic''] a race condition in {{w|Garbage collection (computer science)|garbage collection}} to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
|The reference to using a Timing Attack to exploit a race condition in garbage collection refers to Meltdown and Spectre CPU flaws that can be exploited in a cloud server like the ones in Wikipedia. {{w|Claude Shannon}} was an early and highly influential information scientist whose work underlies compression, encryption, security, and the theory behind how information is encoded into binary digits. &lt;br /&gt;
&lt;br /&gt;
This is not a security problem. However, since Shannon formulated how the amount of unique or actual information some entity contains is proportional to the number of bits required to encode it, retrieving only a few bits casts a dark perspective upon the significance of the Shannon article's content.&lt;br /&gt;
|-&lt;br /&gt;
|At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
|Cafés often offer free access to WiFi as a service to patrons, as a business strategy to encourage said patrons to remain in the building and buy more coffee. Some use a password, so that only patrons can use the WiFi, and may display the password on signage inside. Since anybody could go into the cafe to read the post-it, and then use the network from nearby, the ability to read it from outside is, at most, a trivial problem. For systems that are supposed to be secure, writing passwords in a visible place is a major security flaw. For instance, following the [[wikipedia:2018 Hawaii false missile alert|2018 Hawaii false missile alert]], the agency concerned received criticism for a press photo showing a password written on a sticky note attached to a monitor.&amp;lt;ref&amp;gt;http://uk.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1?r=US&amp;amp;IR=T&amp;lt;/ref&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
|A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
|Describes a common feature on news sites or social media sites like Facebook. The possibility for users to &amp;quot;inject&amp;quot; text into the page is by design. This is a humorous reference to the relatively common security vulnerability &amp;quot;[[Wikipedia:Cross-site_scripting|persistent cross-site scripting]]&amp;quot;, where input provided by a user, such as through a comment section, can result in dangerous content containing arbitrary HTML or JavaScript code being displayed to other users. &lt;br /&gt;
|-&lt;br /&gt;
|MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
|Some people pronounce &amp;quot;{{w|SQL}}&amp;quot; like &amp;quot;sequel&amp;quot;, after SQL's predecessor &amp;quot;SEQUEL (Structured English Query Language)&amp;quot;. The standard for SQL suggests that it should be pronounced as separate letters; however, the author of SQL pronounces it &amp;quot;sequel&amp;quot;, so the debate is persisting (with even more justification than arguments about how to pronounce &amp;quot;GIF&amp;quot;). MySQL is an open-source relational database management system. The latest generally available version (at the time of writing) is MySQL 5.7.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
|{{w|Privilege escalation}} refers to any illegitimate means by which a system user gains greater access than they are supposed to have, and most hackers will seek to achieve this if they can. The most highly-sought privilege is that of the root user, which allows complete access to an entire system&amp;amp;mdash; a ''superuser''.&lt;br /&gt;
&lt;br /&gt;
The irony of this CVE presents the reverse situation: that a flaw inadvertently ''de-escalates'' a root user to a less privileged user, which would cripple the ''superuser'', they would be disallowed access or ability to accomplish their required tasks, or worse, cause such tasks which do not {{w|fail safe}} to have catastrophic side effects.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
|This is a reference to a common problem of modern gadgets catching fire (usually related to flaws in lithium-ion batteries), as well as to Apple products crashing when attempting to display certain character sequences. Diacritics are the accents found on letters in some languages (eg. č, ģ ķ, ļ, ņ, š, ž). These would not normally be found on emojis.&lt;br /&gt;
|-&lt;br /&gt;
|An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
|This probably refers to the movie {{w|Air Bud}}, about a dog playing basketball. This has been a common theme in xkcd comics: see [[115: Meerkat]], [[1439: Rack Unit]], [[1819: Sweet 16]], [[1552: Rulebook]].&lt;br /&gt;
In 2017, it was discovered that an oversight in the constitution of the state of Kansas may [http://www.kansascity.com/news/politics-government/article175956836.html permit a dog to be governor]. Shortly before this comic published, the Secretary of State's office ruled that [http://dfw.cbslocal.com/2018/02/13/dog-kansas-governor/ it could not].&lt;br /&gt;
|-&lt;br /&gt;
|Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer [''sic''] in Missouri that no one's checked on in a while.&lt;br /&gt;
|{{w|Haskell (programming language)|Haskell}} is a functional programming language. Functional programming is characterized by using functions that don't have side effects because they can not change things accessible in other parts of the program, as in [[1312: Haskell]]. The joke here is discovering that it does indeed have side-effects, manifested via external alteration, not violating the internal alteration paradigm.&lt;br /&gt;
|-&lt;br /&gt;
|Nobody really knows how hypervisors work.&lt;br /&gt;
|[[wikipedia:Hypervisor|&amp;quot;Hypervisors&amp;quot;]] are a tool for computer virtualization. Virtualization is implemented via various combinations of hardware and/or software, which requires a computer to completely simulate another computer, with its own unique hardware and software, and to varying degrees as to whether or not the virtualization is aware of or can determine whether it is being virtualized. Many IT professionals and businesses rely heavily on various forms of virtualization, but most of the individual employees would be hard-pressed to explain how it works. Programs running on other virtual computers, or on the real computer, may be able to access information on a virtual computer in ways which would not be possible with a single real computer. Consequently, understanding how the hypervisor works is important to assessing the security of a virtual server. Meltdown and Spectre are related to this.&lt;br /&gt;
|-&lt;br /&gt;
|Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
|This joke is about arcane systems that are running Linux in exceedingly rare situations, meaning that reproducing errors would be incredibly difficult or inconvenient, and would only affect a very tiny user base (if any at all). {{w|IBM System/390 ES/9000 Enterprise Systems Architecture ESA family|System/390}} is an IBM mainframe introduced almost 30 years before this comic, which has a version of Linux. UTC+14 is a time zone used only on some islands in the Pacific Ocean (Primarily [[Wikipedia:Line_Islands|the Line Islands]]) and is also the earliest time zone on earth. Even if all of these absurd conditions were met, the resulting vulnerability would still be relatively benign: simply changing a user's preferred clock display format. Other xkcd comics make references to such obscure computer-time issues relating to time zones and time conversions, and how many programmers find these issues frustrating or even traumatizing. &lt;br /&gt;
|-&lt;br /&gt;
|x86 has way too many instructions.&lt;br /&gt;
|The x86 architecture (used in many Intel and AMD processors) is very complicated. Processors typically implement such a complex architecture using programs (microcode) run on a set of hidden, proprietary processors. The details of these hidden machines and errors in the microcode can result in security vulnerabilities, such as Meltdown, where the physical machine does not match the conceptual machine.&lt;br /&gt;
&lt;br /&gt;
A more complicated instruction set is more complex to implement.{{Citation needed}} The x86 architecture is considered &amp;quot;CISC&amp;quot; (a &amp;quot;{{w|Complex instruction set computer}}&amp;quot;), having many instructions originally provided to make programming by a human simpler; other examples include the 68000 series used in the first {{w|Apple Macintosh}}. In the 1980s, this design philosophy was countered by the &amp;quot;RISC&amp;quot; (&amp;quot;{{w|Reduced instruction set computer}}&amp;quot;) design movement - based on the observation that computer programs were increasingly generated by compilers (which only used a few instructions) rather than directly by people, and that the chip area dedicated to extra instructions could be better dedicated to, for example, cache. Examples of RISC style designs include {{w|SPARC}}, {{w|MIPS}}, {{w|PowerPC}} (used by Apple in later Macintoshes) and the {{w|ARM architecture|ARM}} chips common in mobile phones. Historically, there was considerable discussion about the merits of each approach. At one time the Mac and Windows PC were on different sides; owners of other competing systems such as the Archimedes and Amiga had similar arguments on usenet in the early 1990s. This &amp;quot;issue&amp;quot; may be posted by someone who still recalls these debates. Technically, the extra instructions do slightly complicate the task of validating correct chip behaviour and complicate the tool chains that manage software, which could be seen as a minor security risk. However, the 64-bit architecture introduced by {{w|AMD}}, and since adopted by {{w|Intel}}, does rationalise things somewhat, and all recent x86 chips break down instructions into RISC-like micro-operations, so the complication from a hardware perspective is localised. Recent security issues, such as the speculative cache load issue in Meltdown and Spectre, depend more on details of implementation, rather than instruction set, and have been exhibited both by x86 (CISC) and ARM (RISC) processors.&lt;br /&gt;
&lt;br /&gt;
This explanation has way too many words.&lt;br /&gt;
|-&lt;br /&gt;
|NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
|NumPy is the fundamental package for scientific computing with the programming language Python. ''O''(log ''n'') is [[wikipedia:Big_O_notation#Infinite_asymptotics|Big O notation]] meaning that the time it takes for a computer algorithm to run is in the order of log ''n'', for an input of size ''n''. ''O''(log ''n'') is very fast and is more usual for a search algorithm. Prime factorization currently is ''O''(''2''&amp;lt;sup&amp;gt;''n''&amp;lt;/sup&amp;gt;n)). If something can find the prime factors of a number this quickly, especially a [[wikipedia:semiprime|semiprime]] with two large factors, it will enable attacks to break many crypto functions used in internet security. However, prime numbers have only a single factor, and &amp;quot;factoring primes&amp;quot; quickly is a simpler problem, that of [[wikipedia:Primality test|proving that a number is in fact a prime]]. &lt;br /&gt;
|-&lt;br /&gt;
|Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
|Another joke on the first CVE and [[wikipedia:I before E except after C|a common English writing rule of thumb]], which fails almost as often as it succeeds. Possibly a jab at Apple's image, portraying their software as unable to handle improper grammar or spelling.&lt;br /&gt;
|-&lt;br /&gt;
|Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
|Skylake x86 chips are a line of microprocessors made by Intel. Some processors are soldered directly to a system board or daughter board, while others are attached to boards that plug into the system board by means of a socket (pins or connectors that make physical contact with receptacles or connectors on a system board). Some sockets, especially older ones, require force to insert or remove, and often require the use of a flat blade screwdriver or a specialized tool, but most modern ones use ZIF (Zero Insertion Force) techniques, often involving a lever or similar to tighten or loosen the friction/tightness of the contacts. No screwdriver is needed in this case. However, any processor ''can'' be forcefully removed from its socket with a screwdriver.{{Citation needed}}&lt;br /&gt;
|-&lt;br /&gt;
|Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
|{{w|Linus Torvalds}} is the {{w|benevolent dictator for life}} of the Linux kernel codebase. Normally it is hard to make changes because he has the last word, and because the kernel is replicated in all Linux installations. Linus made the news in January 2018 when, having looked at one of Intel's proposed fixes for the Spectre and Meltdown vulnerabilities, he declared &amp;quot;the patches are COMPLETE AND UTTER GARBAGE&amp;quot;.&amp;lt;ref&amp;gt;https://techcrunch.com/2018/01/22/linus-torvalds-declares-intel-fix-for-meltdown-spectre-complete-and-utter-garbage/&amp;lt;/ref&amp;gt; Presumably, it may be found that he may be successfully bribed to be less blunt and/or less critical of vulnerability fixes that are complete and/or utter garbage. If this were the case, this would be a severe critical vulnerability to all Linux servers and machines.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
|The point of an attack is to make someone else's machine perform actions against the owner's will. Anyone can make their own machine execute any code if they have root access and the necessary tools, but this would usually not be described as an attack, except in the case of a locked-down appliance, such as a video game console, a John Deere tractor, or pay TV decoder.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
|This could refer to a CVE vulnerability of JPG files where JavaScript embedded within the image file is executed by some application. In this case, though, the code is visible on the image instead of invisibly encoded within the image file. The code is also only executed if the image contains a photo of a baby in a saddle riding a dog. It's unclear whether the photo would be a digital photo, a printed photo (i.e. as taken using a digital camera), or maybe both. This &amp;quot;bug&amp;quot; would not only require the device to figure out specifically what the photo contains image-wise (something that's REALLY HARD for computers to do reliably), but would also require OCR (optical character recognition) code to convert the text superimposed on the photo into executable code. In other words, it's hard to believe in 2018 that such a bug could exist. Maybe in the future when such things are more routine...? As an example, OCR used to be hard to do reliably, but now it's a lot more routine and built into a lot of devices.&lt;br /&gt;
|-&lt;br /&gt;
|Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
|Flash has been an integral browser plugin for decades, but has fallen out of favor in the 2010s, and eventually discontinued because of its notoriously abysmal security record. All security experts advise against installing it. Preventing installation of Flash would make systems more secure, but most versions of Windows do not prevent Flash installation. The joke here relates to the difficulty of keeping Flash up to date, or even installed properly to begin with. A common user experience, which is the subject of numerous jokes and memes, is the constant nagging notification to install or update Flash in order for web pages to display properly. Many IT professionals will bemoan the trouble they have experienced in the workplace due to these notifications and problems related to them.&lt;br /&gt;
|-&lt;br /&gt;
|Turns out the cloud is just other people's computers.&lt;br /&gt;
|This refers to a meme that demands that &amp;quot;cloud&amp;quot; be replaced with &amp;quot;other people's computers&amp;quot; in all marketing presentation to CEOs and non-computer literate persons evaluating the security impact of using cloud services. Part of the humor here is that &amp;quot;the cloud&amp;quot; is, in actuality, simply a term for hosted services, or in other words computers being run by other people (typically businesses that specialize in this type of &amp;quot;Platform as a Service&amp;quot; or &amp;quot;PaaS&amp;quot; service model). Referring to &amp;quot;the cloud&amp;quot; as &amp;quot;other people's computers&amp;quot; is, at its core, entirely accurate, though it takes away the business jargon and simplifies the situation in such a way that it might cast doubt on the security, reliability, and general effectiveness of using &amp;quot;cloud&amp;quot; solutions.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in Mitre's CVE database allows arbitrary code insertion.[[779|[~~CLICK HERE FOR CHEAP VIAGRA~~]]]&lt;br /&gt;
|Mitre's CVE database is where all {{w|Common Vulnerabilities and Exposures|CVEs}} are stored. This log message forms the punchline of the comic, as it implies that all of the exaggerated error messages above might have been inserted by hackers exploiting the vulnerability. To pour salt in the wound, they then included in a typical spam link purporting to offer inexpensive {{w|Viagra|brand-name Sildenafil}}.&lt;br /&gt;
|-&lt;br /&gt;
|It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
|Appears in the title text. {{w|Bruce Schneier}} is security researcher and blogger. The &amp;quot;two kids in a trenchcoat&amp;quot; is a reference to the {{tvtropes|TotemPoleTrench|Totem Pole Trench}} trope. Shortly before this comic was posted, a [https://rare.us/rare-humor/two-kids-dressed-as-a-tall-man-to-get-into-black-panther-is-caught-on-video story went viral] in which two kids were photographed attempting this for real to get into a screening of ''Black Panther''.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A heading is centered above a list of 21 vulnerabilities]&lt;br /&gt;
:&amp;lt;big&amp;gt;Leaked list of major 2018 security vulnerabilities &amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:CVE-2018-????? Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
:CVE-2018-????? An attacker can use a timing attack to extploit a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
:CVE-2018-????? At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
:CVE-2018-????? A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
:CVE-2018-????? MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
:CVE-2018-????? A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
:CVE-2018-????? Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
:CVE-2018-????? An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
:CVE-2018-????? Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer in Missouri that no one's checked on in a while.&lt;br /&gt;
:CVE-2018-????? Nobody really knows how hypervisors work.&lt;br /&gt;
:CVE-2018-????? Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
:CVE-2018-????? x86 has way too many instructions.&lt;br /&gt;
:CVE-2018-????? NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
:CVE-2018-????? Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
:CVE-2018-????? Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
:CVE-2018-????? Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
:CVE-2018-????? An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
:CVE-2018-????? Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
:CVE-2018-????? Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
:CVE-2018-????? Turns out the cloud is just other people's computers.&lt;br /&gt;
:CVE-2018-????? A flaw in Mitre's CVE database allows arbitrary code insertion.&amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;[~~Click here for cheap viagra~~]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
&lt;br /&gt;
Randall has previously referenced diacritics in [[1647: Diacritics]].&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier was previously mentioned in the title texts of [[748: Worst-Case Scenario]] and [[1039: RuBisCO]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Charts]]&lt;br /&gt;
[[Category:Programming]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159394</id>
		<title>1957: 2018 CVE List</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159394"/>
				<updated>2018-06-27T23:24:16Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Table of possible CVE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1957&lt;br /&gt;
| date      = February 19, 2018&lt;br /&gt;
| title     = 2018 CVE List&lt;br /&gt;
| image     = 2018_cve_list.png&lt;br /&gt;
| titletext = CVE-2018-?????: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
{{w|Common Vulnerabilities and Exposures|CVE}} (Common Vulnerabilities and Exposures) is a standardized format for assigning an identity to a cybersecurity vulnerability (similar to the way that astronomical bodies are assigned unique identifiers by committees). Giving vulnerabilities a unique identifier makes them easier to talk about and helps in keeping track of the progress made toward resolving them. The typical format of a CVE identifier is '''CVE-[YEAR]-[NUMBER]'''. For example, the CVE identifier for 2017's widespread {{w|Meltdown (security vulnerability)|Meltdown vulnerability}} is [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 CVE-2017-5754]. CVEs also contain a short description of the issue.&lt;br /&gt;
&lt;br /&gt;
In this comic (released in February 2018), Randall presents a number of spurious predicted CVEs for later in 2018. Each CVE identifier is given as &amp;quot;CVE-2018-?????&amp;quot;, reflecting the fact that they have not yet happened so we don't know exactly what their CVE identifier will be.&lt;br /&gt;
&lt;br /&gt;
==Table of possible CVE==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%;&amp;quot; | Security Vulnerability&lt;br /&gt;
! style=&amp;quot;width: 70%;&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|Apple products crash when displaying certain {{w|Telugu language|Telugu}} or {{w|Bengali language|Bengali}} letter combinations.&lt;br /&gt;
|This refers to a real vulnerability in iOS and MacOS publicized a few days before the comic was released,&amp;lt;ref&amp;gt;https://techcrunch.com/2018/02/15/iphone-text-bomb-ios-mac-crash-apple/&amp;lt;/ref&amp;gt; as well as past similar iOS vulnerabilities&amp;lt;ref&amp;gt;https://thenextweb.com/apps/2017/01/18/iphone-ipad-apple-text-ios-bug/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.telegraph.co.uk/technology/2018/01/18/apple-text-bomb-can-crash-iphones-single-message/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can use a timing attack to extploit [''sic''] a race condition in {{w|Garbage collection (computer science)|garbage collection}} to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
|The reference to using a Timing Attack to exploit a race condition in garbage collection refers to Meltdown and Spectre CPU flaws that can be exploited in a cloud server like the ones in Wikipedia. {{w|Claude Shannon}} was an early and highly influential information scientist whose work underlies compression, encryption, security, and the theory behind how information is encoded into binary digits. &lt;br /&gt;
&lt;br /&gt;
This is not a security problem. However, since Shannon formulated how the amount of unique or actual information some entity contains is proportional to the number of bits required to encode it, retrieving only a few bits casts a dark perspective upon the significance of the Shannon article's content.&lt;br /&gt;
|-&lt;br /&gt;
|At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
|Cafés often offer free access to WiFi as a service to patrons, as a business strategy to encourage said patrons to remain in the building and buy more coffee. Some use a password, so that only patrons can use the WiFi, and may display the password on signage inside. Since anybody could go into the cafe to read the post-it, and then use the network from nearby, the ability to read it from outside is, at most, a trivial problem. For systems that are supposed to be secure, writing passwords in a visible place is a major security flaw. For instance, following the [[wikipedia:2018 Hawaii false missile alert|2018 Hawaii false missile alert]], the agency concerned received criticism for a press photo showing a password written on a sticky note attached to a monitor.&amp;lt;ref&amp;gt;http://uk.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1?r=US&amp;amp;IR=T&amp;lt;/ref&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
|A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
|Describes a common feature on news sites or social media sites like Facebook. The possibility for users to &amp;quot;inject&amp;quot; text into the page is by design. This is a humorous reference to the relatively common security vulnerability &amp;quot;[[Wikipedia:Cross-site_scripting|persistent cross-site scripting]]&amp;quot;, where input provided by a user, such as through a comment section, can result in dangerous content containing arbitrary HTML or JavaScript code being displayed to other users. &lt;br /&gt;
|-&lt;br /&gt;
|MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
|Some people pronounce &amp;quot;{{w|SQL}}&amp;quot; like &amp;quot;sequel&amp;quot;, after SQL's predecessor &amp;quot;SEQUEL (Structured English Query Language)&amp;quot;. The standard for SQL suggests that it should be pronounced as separate letters; however, the author of SQL pronounces it &amp;quot;sequel&amp;quot;, so the debate is persisting (with even more justification than arguments about how to pronounce &amp;quot;GIF&amp;quot;). MySQL is an open-source relational database management system. The latest generally available version (at the time of writing) is MySQL 5.7.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
|{{w|Privilege escalation}} refers to any illegitimate means by which a system user gains greater access than they are supposed to have, and most hackers will seek to achieve this if they can. The most highly-sought privilege is that of the root user, which allows complete access to an entire system&amp;amp;mdash; a ''superuser''.&lt;br /&gt;
&lt;br /&gt;
The irony of this CVE presents the reverse situation: that a flaw inadvertently ''de-escalates'' a root user to a less privileged user, which would cripple the ''superuser'', they would be disallowed access or ability to accomplish their required tasks, or worse, cause such tasks which do not {{w|fail safe}} to have catastrophic side effects.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
|This is a reference to a common problem of modern gadgets catching fire (usually related to flaws in lithium-ion batteries), as well as to Apple products crashing when attempting to display certain character sequences. Diacritics are the accents found on letters in some languages (eg. č, ģ ķ, ļ, ņ, š, ž). These would not normally be found on emojis.&lt;br /&gt;
|-&lt;br /&gt;
|An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
|This probably refers to the movie {{w|Air Bud}}, about a dog playing basketball. This has been a common theme in xkcd comics: see [[115: Meerkat]], [[1439: Rack Unit]], [[1819: Sweet 16]], [[1552: Rulebook]].&lt;br /&gt;
In 2017, it was discovered that an oversight in the constitution of the state of Kansas may [http://www.kansascity.com/news/politics-government/article175956836.html permit a dog to be governor]. Shortly before this comic published, the Secretary of State's office ruled that [http://dfw.cbslocal.com/2018/02/13/dog-kansas-governor/ it could not].&lt;br /&gt;
|-&lt;br /&gt;
|Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer [''sic''] in Missouri that no one's checked on in a while.&lt;br /&gt;
|{{w|Haskell (programming language)|Haskell}} is a functional programming language. Functional programming is characterized by using functions that don't have side effects because they can not change things accessible in other parts of the program, as in [[1312: Haskell]]. The joke here is discovering that it does indeed have side-effects, manifested via external alteration, not violating the internal alteration paradigm.&lt;br /&gt;
|-&lt;br /&gt;
|Nobody really knows how hypervisors work.&lt;br /&gt;
|[[wikipedia:Hypervisor|&amp;quot;Hypervisors&amp;quot;]] are a tool for computer virtualization. Virtualization is complex to implement, as it requires a computer to completely simulate another computer, with its own unique hardware and software. Many IT professionals and businesses rely heavily on various forms of virtualization, but most of the individual employees would be hard-pressed to explain how it works. Programs running on other virtual computers, or on the real computer, may be able to access information on a virtual computer in ways which would not be possible with a single real computer. Consequently, understanding how the hypervisor works is important to assessing the security of a virtual server. Meltdown and Spectre are related to this.&lt;br /&gt;
|-&lt;br /&gt;
|Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
|This joke is about arcane systems that are running Linux in exceedingly rare situations, meaning that reproducing errors would be incredibly difficult or inconvenient, and would only affect a very tiny user base (if any at all). {{w|IBM System/390 ES/9000 Enterprise Systems Architecture ESA family|System/390}} is an IBM mainframe introduced almost 30 years before this comic, which has a version of Linux. UTC+14 is a time zone used only on some islands in the Pacific Ocean (Primarily [[Wikipedia:Line_Islands|the Line Islands]]) and is also the earliest time zone on earth. Even if all of these absurd conditions were met, the resulting vulnerability would still be relatively benign: simply changing a user's preferred clock display format. Other xkcd comics make references to such obscure computer-time issues relating to time zones and time conversions, and how many programmers find these issues frustrating or even traumatizing. &lt;br /&gt;
|-&lt;br /&gt;
|x86 has way too many instructions.&lt;br /&gt;
|The x86 architecture (used in many Intel and AMD processors) is very complicated. Processors typically implement such a complex architecture using programs (microcode) run on a set of hidden, proprietary processors. The details of these hidden machines and errors in the microcode can result in security vulnerabilities, such as Meltdown, where the physical machine does not match the conceptual machine.&lt;br /&gt;
&lt;br /&gt;
A more complicated instruction set is more complex to implement.{{Citation needed}} The x86 architecture is considered &amp;quot;CISC&amp;quot; (a &amp;quot;{{w|Complex instruction set computer}}&amp;quot;), having many instructions originally provided to make programming by a human simpler; other examples include the 68000 series used in the first {{w|Apple Macintosh}}. In the 1980s, this design philosophy was countered by the &amp;quot;RISC&amp;quot; (&amp;quot;{{w|Reduced instruction set computer}}&amp;quot;) design movement - based on the observation that computer programs were increasingly generated by compilers (which only used a few instructions) rather than directly by people, and that the chip area dedicated to extra instructions could be better dedicated to, for example, cache. Examples of RISC style designs include {{w|SPARC}}, {{w|MIPS}}, {{w|PowerPC}} (used by Apple in later Macintoshes) and the {{w|ARM architecture|ARM}} chips common in mobile phones. Historically, there was considerable discussion about the merits of each approach. At one time the Mac and Windows PC were on different sides; owners of other competing systems such as the Archimedes and Amiga had similar arguments on usenet in the early 1990s. This &amp;quot;issue&amp;quot; may be posted by someone who still recalls these debates. Technically, the extra instructions do slightly complicate the task of validating correct chip behaviour and complicate the tool chains that manage software, which could be seen as a minor security risk. However, the 64-bit architecture introduced by {{w|AMD}}, and since adopted by {{w|Intel}}, does rationalise things somewhat, and all recent x86 chips break down instructions into RISC-like micro-operations, so the complication from a hardware perspective is localised. Recent security issues, such as the speculative cache load issue in Meltdown and Spectre, depend more on details of implementation, rather than instruction set, and have been exhibited both by x86 (CISC) and ARM (RISC) processors.&lt;br /&gt;
&lt;br /&gt;
This explanation has way too many words.&lt;br /&gt;
|-&lt;br /&gt;
|NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
|NumPy is the fundamental package for scientific computing with the programming language Python. ''O''(log ''n'') is [[wikipedia:Big_O_notation#Infinite_asymptotics|Big O notation]] meaning that the time it takes for a computer algorithm to run is in the order of log ''n'', for an input of size ''n''. ''O''(log ''n'') is very fast and is more usual for a search algorithm. Prime factorization currently is ''O''(''2''&amp;lt;sup&amp;gt;''n''&amp;lt;/sup&amp;gt;n)). If something can find the prime factors of a number this quickly, especially a [[wikipedia:semiprime|semiprime]] with two large factors, it will enable attacks to break many crypto functions used in internet security. However, prime numbers have only a single factor, and &amp;quot;factoring primes&amp;quot; quickly is a simpler problem, that of [[wikipedia:Primality test|proving that a number is in fact a prime]]. &lt;br /&gt;
|-&lt;br /&gt;
|Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
|Another joke on the first CVE and [[wikipedia:I before E except after C|a common English writing rule of thumb]], which fails almost as often as it succeeds. Possibly a jab at Apple's image, portraying their software as unable to handle improper grammar or spelling.&lt;br /&gt;
|-&lt;br /&gt;
|Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
|Skylake x86 chips are a line of microprocessors made by Intel. Some processors are soldered directly to a system board or daughter board, while others are attached to boards that plug into the system board by means of a socket (pins or connectors that make physical contact with receptacles or connectors on a system board). Some sockets, especially older ones, require force to insert or remove, and often require the use of a flat blade screwdriver or a specialized tool, but most modern ones use ZIF (Zero Insertion Force) techniques, often involving a lever or similar to tighten or loosen the friction/tightness of the contacts. No screwdriver is needed in this case. However, any processor ''can'' be forcefully removed from its socket with a screwdriver.{{Citation needed}}&lt;br /&gt;
|-&lt;br /&gt;
|Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
|{{w|Linus Torvalds}} is the {{w|benevolent dictator for life}} of the Linux kernel codebase. Normally it is hard to make changes because he has the last word, and because the kernel is replicated in all Linux installations. Linus made the news in January 2018 when, having looked at one of Intel's proposed fixes for the Spectre and Meltdown vulnerabilities, he declared &amp;quot;the patches are COMPLETE AND UTTER GARBAGE&amp;quot;.&amp;lt;ref&amp;gt;https://techcrunch.com/2018/01/22/linus-torvalds-declares-intel-fix-for-meltdown-spectre-complete-and-utter-garbage/&amp;lt;/ref&amp;gt; Presumably, it may be found that he may be successfully bribed to be less blunt and/or less critical of vulnerability fixes that are complete and/or utter garbage. If this were the case, this would be a severe critical vulnerability to all Linux servers and machines.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
|The point of an attack is to make someone else's machine perform actions against the owner's will. Anyone can make their own machine execute any code if they have root access and the necessary tools, but this would usually not be described as an attack, except in the case of a locked-down appliance, such as a video game console, a John Deere tractor, or pay TV decoder.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
|This could refer to a CVE vulnerability of JPG files where JavaScript embedded within the image file is executed by some application. In this case, though, the code is visible on the image instead of invisibly encoded within the image file. The code is also only executed if the image contains a photo of a baby in a saddle riding a dog. It's unclear whether the photo would be a digital photo, a printed photo (i.e. as taken using a digital camera), or maybe both. This &amp;quot;bug&amp;quot; would not only require the device to figure out specifically what the photo contains image-wise (something that's REALLY HARD for computers to do reliably), but would also require OCR (optical character recognition) code to convert the text superimposed on the photo into executable code. In other words, it's hard to believe in 2018 that such a bug could exist. Maybe in the future when such things are more routine...? As an example, OCR used to be hard to do reliably, but now it's a lot more routine and built into a lot of devices.&lt;br /&gt;
|-&lt;br /&gt;
|Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
|Flash has been an integral browser plugin for decades, but has fallen out of favor in the 2010s, and eventually discontinued because of its notoriously abysmal security record. All security experts advise against installing it. Preventing installation of Flash would make systems more secure, but most versions of Windows do not prevent Flash installation. The joke here relates to the difficulty of keeping Flash up to date, or even installed properly to begin with. A common user experience, which is the subject of numerous jokes and memes, is the constant nagging notification to install or update Flash in order for web pages to display properly. Many IT professionals will bemoan the trouble they have experienced in the workplace due to these notifications and problems related to them.&lt;br /&gt;
|-&lt;br /&gt;
|Turns out the cloud is just other people's computers.&lt;br /&gt;
|This refers to a meme that demands that &amp;quot;cloud&amp;quot; be replaced with &amp;quot;other people's computers&amp;quot; in all marketing presentation to CEOs and non-computer literate persons evaluating the security impact of using cloud services. Part of the humor here is that &amp;quot;the cloud&amp;quot; is, in actuality, simply a term for hosted services, or in other words computers being run by other people (typically businesses that specialize in this type of &amp;quot;Platform as a Service&amp;quot; or &amp;quot;PaaS&amp;quot; service model). Referring to &amp;quot;the cloud&amp;quot; as &amp;quot;other people's computers&amp;quot; is, at its core, entirely accurate, though it takes away the business jargon and simplifies the situation in such a way that it might cast doubt on the security, reliability, and general effectiveness of using &amp;quot;cloud&amp;quot; solutions.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in Mitre's CVE database allows arbitrary code insertion.[[779|[~~CLICK HERE FOR CHEAP VIAGRA~~]]]&lt;br /&gt;
|Mitre's CVE database is where all {{w|Common Vulnerabilities and Exposures|CVEs}} are stored. This log message forms the punchline of the comic, as it implies that all of the exaggerated error messages above might have been inserted by hackers exploiting the vulnerability. To pour salt in the wound, they then included in a typical spam link purporting to offer inexpensive {{w|Viagra|brand-name Sildenafil}}.&lt;br /&gt;
|-&lt;br /&gt;
|It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
|Appears in the title text. {{w|Bruce Schneier}} is security researcher and blogger. The &amp;quot;two kids in a trenchcoat&amp;quot; is a reference to the {{tvtropes|TotemPoleTrench|Totem Pole Trench}} trope. Shortly before this comic was posted, a [https://rare.us/rare-humor/two-kids-dressed-as-a-tall-man-to-get-into-black-panther-is-caught-on-video story went viral] in which two kids were photographed attempting this for real to get into a screening of ''Black Panther''.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A heading is centered above a list of 21 vulnerabilities]&lt;br /&gt;
:&amp;lt;big&amp;gt;Leaked list of major 2018 security vulnerabilities &amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:CVE-2018-????? Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
:CVE-2018-????? An attacker can use a timing attack to extploit a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
:CVE-2018-????? At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
:CVE-2018-????? A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
:CVE-2018-????? MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
:CVE-2018-????? A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
:CVE-2018-????? Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
:CVE-2018-????? An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
:CVE-2018-????? Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer in Missouri that no one's checked on in a while.&lt;br /&gt;
:CVE-2018-????? Nobody really knows how hypervisors work.&lt;br /&gt;
:CVE-2018-????? Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
:CVE-2018-????? x86 has way too many instructions.&lt;br /&gt;
:CVE-2018-????? NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
:CVE-2018-????? Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
:CVE-2018-????? Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
:CVE-2018-????? Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
:CVE-2018-????? An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
:CVE-2018-????? Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
:CVE-2018-????? Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
:CVE-2018-????? Turns out the cloud is just other people's computers.&lt;br /&gt;
:CVE-2018-????? A flaw in Mitre's CVE database allows arbitrary code insertion.&amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;[~~Click here for cheap viagra~~]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
&lt;br /&gt;
Randall has previously referenced diacritics in [[1647: Diacritics]].&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier was previously mentioned in the title texts of [[748: Worst-Case Scenario]] and [[1039: RuBisCO]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Charts]]&lt;br /&gt;
[[Category:Programming]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159393</id>
		<title>1957: 2018 CVE List</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159393"/>
				<updated>2018-06-27T23:16:01Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Table of possible CVE */ If you're not a SuperUser, you're a cripple&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1957&lt;br /&gt;
| date      = February 19, 2018&lt;br /&gt;
| title     = 2018 CVE List&lt;br /&gt;
| image     = 2018_cve_list.png&lt;br /&gt;
| titletext = CVE-2018-?????: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
{{w|Common Vulnerabilities and Exposures|CVE}} (Common Vulnerabilities and Exposures) is a standardized format for assigning an identity to a cybersecurity vulnerability (similar to the way that astronomical bodies are assigned unique identifiers by committees). Giving vulnerabilities a unique identifier makes them easier to talk about and helps in keeping track of the progress made toward resolving them. The typical format of a CVE identifier is '''CVE-[YEAR]-[NUMBER]'''. For example, the CVE identifier for 2017's widespread {{w|Meltdown (security vulnerability)|Meltdown vulnerability}} is [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 CVE-2017-5754]. CVEs also contain a short description of the issue.&lt;br /&gt;
&lt;br /&gt;
In this comic (released in February 2018), Randall presents a number of spurious predicted CVEs for later in 2018. Each CVE identifier is given as &amp;quot;CVE-2018-?????&amp;quot;, reflecting the fact that they have not yet happened so we don't know exactly what their CVE identifier will be.&lt;br /&gt;
&lt;br /&gt;
==Table of possible CVE==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%;&amp;quot; | Security Vulnerability&lt;br /&gt;
! style=&amp;quot;width: 70%;&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|Apple products crash when displaying certain {{w|Telugu language|Telugu}} or {{w|Bengali language|Bengali}} letter combinations.&lt;br /&gt;
|This refers to a real vulnerability in iOS and MacOS publicized a few days before the comic was released,&amp;lt;ref&amp;gt;https://techcrunch.com/2018/02/15/iphone-text-bomb-ios-mac-crash-apple/&amp;lt;/ref&amp;gt; as well as past similar iOS vulnerabilities&amp;lt;ref&amp;gt;https://thenextweb.com/apps/2017/01/18/iphone-ipad-apple-text-ios-bug/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.telegraph.co.uk/technology/2018/01/18/apple-text-bomb-can-crash-iphones-single-message/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can use a timing attack to extploit [''sic''] a race condition in {{w|Garbage collection (computer science)|garbage collection}} to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
|The reference to using a Timing Attack to exploit a race condition in garbage collection refers to Meltdown and Spectre CPU flaws that can be exploited in a cloud server like the ones in Wikipedia. {{w|Claude Shannon}} was an early and highly influential information scientist whose work underlies compression, encryption, security, and the theory behind how information is encoded into binary digits. &lt;br /&gt;
&lt;br /&gt;
This is not a security problem. However, since Shannon formulated how the amount of unique or actual information some entity contains is proportional to the number of bits required to encode it, retrieving only a few bits casts a dark perspective upon the significance of the Shannon article's content.&lt;br /&gt;
|-&lt;br /&gt;
|At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
|Cafés often offer free access to WiFi as a service to patrons, as a business strategy to encourage said patrons to remain in the building and buy more coffee. Some use a password, so that only patrons can use the WiFi, and may display the password on signage inside. Since anybody could go into the cafe to read the post-it, and then use the network from nearby, the ability to read it from outside is, at most, a trivial problem. For systems that are supposed to be secure, writing passwords in a visible place is a major security flaw. For instance, following the [[wikipedia:2018 Hawaii false missile alert|2018 Hawaii false missile alert]], the agency concerned received criticism for a press photo showing a password written on a sticky note attached to a monitor.&amp;lt;ref&amp;gt;http://uk.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1?r=US&amp;amp;IR=T&amp;lt;/ref&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
|A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
|Describes a common feature on news sites or social media sites like Facebook. The possibility for users to &amp;quot;inject&amp;quot; text into the page is by design. This is a humorous reference to the relatively common security vulnerability &amp;quot;[[Wikipedia:Cross-site_scripting|persistent cross-site scripting]]&amp;quot;, where input provided by a user, such as through a comment section, can result in dangerous content containing arbitrary HTML or JavaScript code being displayed to other users. &lt;br /&gt;
|-&lt;br /&gt;
|MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
|Some people pronounce &amp;quot;{{w|SQL}}&amp;quot; like &amp;quot;sequel&amp;quot;, after SQL's predecessor &amp;quot;SEQUEL (Structured English Query Language)&amp;quot;. The standard for SQL suggests that it should be pronounced as separate letters; however, the author of SQL pronounces it &amp;quot;sequel&amp;quot;, so the debate is persisting (with even more justification than arguments about how to pronounce &amp;quot;GIF&amp;quot;). MySQL is an open-source relational database management system. The latest generally available version (at the time of writing) is MySQL 5.7.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
|{{w|Privilege escalation}} refers to any illegitimate means by which a system user gains greater access than they are supposed to have, and most hackers will seek to achieve this if they can. The most highly-sought privilege is that of the root user, which allows complete access to an entire system&amp;amp;mdash; a ''superuser''.&lt;br /&gt;
&lt;br /&gt;
The irony of this CVE presents the reverse situation: that a flaw inadvertently ''de-escalates'' a root user to a less privileged user, which would cripple the ''superuser'', they would be disallowed access or ability to accomplish their required tasks, or worse, cause such tasks which do not {{w|fail safe}} to have catastrophic side effects.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
|This is a reference to a common problem of modern gadgets catching fire (usually related to flaws in lithium-ion batteries), as well as to Apple products crashing when attempting to display certain character sequences. Diacritics are the accents found on letters in some languages (eg. č, ģ ķ, ļ, ņ, š, ž). These would not normally be found on emojis.&lt;br /&gt;
|-&lt;br /&gt;
|An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
|This probably refers to the movie {{w|Air Bud}}, about a dog playing basketball. This has been a common theme in xkcd comics: see [[115: Meerkat]], [[1439: Rack Unit]], [[1819: Sweet 16]], [[1552: Rulebook]].&lt;br /&gt;
In 2017, it was discovered that an oversight in the constitution of the state of Kansas may [http://www.kansascity.com/news/politics-government/article175956836.html permit a dog to be governor]. Shortly before this comic published, the Secretary of State's office ruled that [http://dfw.cbslocal.com/2018/02/13/dog-kansas-governor/ it could not].&lt;br /&gt;
|-&lt;br /&gt;
|Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer [''sic''] in Missouri that no one's checked on in a while.&lt;br /&gt;
|{{w|Haskell (programming language)|Haskell}} is a functional programming language. Functional programming is characterized by using functions that don't have side effects (can't change things which would be accessible in other parts of the program), as in [[1312: Haskell]]. The joke here is discovering that it does indeed have side-effects, but for some unknown (and highly absurd) reason they only manifest on a specific computer in a nondescript location, but no one has noticed.&lt;br /&gt;
|-&lt;br /&gt;
|Nobody really knows how hypervisors work.&lt;br /&gt;
|[[wikipedia:Hypervisor|&amp;quot;Hypervisors&amp;quot;]] are a tool for computer virtualization. Virtualization is complex to implement, as it requires a computer to completely simulate another computer, with its own unique hardware and software. Many IT professionals and businesses rely heavily on various forms of virtualization, but most of the individual employees would be hard-pressed to explain how it works. Programs running on other virtual computers, or on the real computer, may be able to access information on a virtual computer in ways which would not be possible with a single real computer. Consequently, understanding how the hypervisor works is important to assessing the security of a virtual server. Meltdown and Spectre are related to this.&lt;br /&gt;
|-&lt;br /&gt;
|Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
|This joke is about arcane systems that are running Linux in exceedingly rare situations, meaning that reproducing errors would be incredibly difficult or inconvenient, and would only affect a very tiny user base (if any at all). {{w|IBM System/390 ES/9000 Enterprise Systems Architecture ESA family|System/390}} is an IBM mainframe introduced almost 30 years before this comic, which has a version of Linux. UTC+14 is a time zone used only on some islands in the Pacific Ocean (Primarily [[Wikipedia:Line_Islands|the Line Islands]]) and is also the earliest time zone on earth. Even if all of these absurd conditions were met, the resulting vulnerability would still be relatively benign: simply changing a user's preferred clock display format. Other xkcd comics make references to such obscure computer-time issues relating to time zones and time conversions, and how many programmers find these issues frustrating or even traumatizing. &lt;br /&gt;
|-&lt;br /&gt;
|x86 has way too many instructions.&lt;br /&gt;
|The x86 architecture (used in many Intel and AMD processors) is very complicated. Processors typically implement such a complex architecture using programs (microcode) run on a set of hidden, proprietary processors. The details of these hidden machines and errors in the microcode can result in security vulnerabilities, such as Meltdown, where the physical machine does not match the conceptual machine.&lt;br /&gt;
&lt;br /&gt;
A more complicated instruction set is more complex to implement.{{Citation needed}} The x86 architecture is considered &amp;quot;CISC&amp;quot; (a &amp;quot;{{w|Complex instruction set computer}}&amp;quot;), having many instructions originally provided to make programming by a human simpler; other examples include the 68000 series used in the first {{w|Apple Macintosh}}. In the 1980s, this design philosophy was countered by the &amp;quot;RISC&amp;quot; (&amp;quot;{{w|Reduced instruction set computer}}&amp;quot;) design movement - based on the observation that computer programs were increasingly generated by compilers (which only used a few instructions) rather than directly by people, and that the chip area dedicated to extra instructions could be better dedicated to, for example, cache. Examples of RISC style designs include {{w|SPARC}}, {{w|MIPS}}, {{w|PowerPC}} (used by Apple in later Macintoshes) and the {{w|ARM architecture|ARM}} chips common in mobile phones. Historically, there was considerable discussion about the merits of each approach. At one time the Mac and Windows PC were on different sides; owners of other competing systems such as the Archimedes and Amiga had similar arguments on usenet in the early 1990s. This &amp;quot;issue&amp;quot; may be posted by someone who still recalls these debates. Technically, the extra instructions do slightly complicate the task of validating correct chip behaviour and complicate the tool chains that manage software, which could be seen as a minor security risk. However, the 64-bit architecture introduced by {{w|AMD}}, and since adopted by {{w|Intel}}, does rationalise things somewhat, and all recent x86 chips break down instructions into RISC-like micro-operations, so the complication from a hardware perspective is localised. Recent security issues, such as the speculative cache load issue in Meltdown and Spectre, depend more on details of implementation, rather than instruction set, and have been exhibited both by x86 (CISC) and ARM (RISC) processors.&lt;br /&gt;
&lt;br /&gt;
This explanation has way too many words.&lt;br /&gt;
|-&lt;br /&gt;
|NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
|NumPy is the fundamental package for scientific computing with the programming language Python. ''O''(log ''n'') is [[wikipedia:Big_O_notation#Infinite_asymptotics|Big O notation]] meaning that the time it takes for a computer algorithm to run is in the order of log ''n'', for an input of size ''n''. ''O''(log ''n'') is very fast and is more usual for a search algorithm. Prime factorization currently is ''O''(''2''&amp;lt;sup&amp;gt;''n''&amp;lt;/sup&amp;gt;n)). If something can find the prime factors of a number this quickly, especially a [[wikipedia:semiprime|semiprime]] with two large factors, it will enable attacks to break many crypto functions used in internet security. However, prime numbers have only a single factor, and &amp;quot;factoring primes&amp;quot; quickly is a simpler problem, that of [[wikipedia:Primality test|proving that a number is in fact a prime]]. &lt;br /&gt;
|-&lt;br /&gt;
|Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
|Another joke on the first CVE and [[wikipedia:I before E except after C|a common English writing rule of thumb]], which fails almost as often as it succeeds. Possibly a jab at Apple's image, portraying their software as unable to handle improper grammar or spelling.&lt;br /&gt;
|-&lt;br /&gt;
|Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
|Skylake x86 chips are a line of microprocessors made by Intel. Some processors are soldered directly to a system board or daughter board, while others are attached to boards that plug into the system board by means of a socket (pins or connectors that make physical contact with receptacles or connectors on a system board). Some sockets, especially older ones, require force to insert or remove, and often require the use of a flat blade screwdriver or a specialized tool, but most modern ones use ZIF (Zero Insertion Force) techniques, often involving a lever or similar to tighten or loosen the friction/tightness of the contacts. No screwdriver is needed in this case. However, any processor ''can'' be forcefully removed from its socket with a screwdriver.{{Citation needed}}&lt;br /&gt;
|-&lt;br /&gt;
|Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
|{{w|Linus Torvalds}} is the {{w|benevolent dictator for life}} of the Linux kernel codebase. Normally it is hard to make changes because he has the last word, and because the kernel is replicated in all Linux installations. Linus made the news in January 2018 when, having looked at one of Intel's proposed fixes for the Spectre and Meltdown vulnerabilities, he declared &amp;quot;the patches are COMPLETE AND UTTER GARBAGE&amp;quot;.&amp;lt;ref&amp;gt;https://techcrunch.com/2018/01/22/linus-torvalds-declares-intel-fix-for-meltdown-spectre-complete-and-utter-garbage/&amp;lt;/ref&amp;gt; Presumably, it may be found that he may be successfully bribed to be less blunt and/or less critical of vulnerability fixes that are complete and/or utter garbage. If this were the case, this would be a severe critical vulnerability to all Linux servers and machines.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
|The point of an attack is to make someone else's machine perform actions against the owner's will. Anyone can make their own machine execute any code if they have root access and the necessary tools, but this would usually not be described as an attack, except in the case of a locked-down appliance, such as a video game console, a John Deere tractor, or pay TV decoder.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
|This could refer to a CVE vulnerability of JPG files where JavaScript embedded within the image file is executed by some application. In this case, though, the code is visible on the image instead of invisibly encoded within the image file. The code is also only executed if the image contains a photo of a baby in a saddle riding a dog. It's unclear whether the photo would be a digital photo, a printed photo (i.e. as taken using a digital camera), or maybe both. This &amp;quot;bug&amp;quot; would not only require the device to figure out specifically what the photo contains image-wise (something that's REALLY HARD for computers to do reliably), but would also require OCR (optical character recognition) code to convert the text superimposed on the photo into executable code. In other words, it's hard to believe in 2018 that such a bug could exist. Maybe in the future when such things are more routine...? As an example, OCR used to be hard to do reliably, but now it's a lot more routine and built into a lot of devices.&lt;br /&gt;
|-&lt;br /&gt;
|Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
|Flash has been an integral browser plugin for decades, but has fallen out of favor in the 2010s, and eventually discontinued because of its notoriously abysmal security record. All security experts advise against installing it. Preventing installation of Flash would make systems more secure, but most versions of Windows do not prevent Flash installation. The joke here relates to the difficulty of keeping Flash up to date, or even installed properly to begin with. A common user experience, which is the subject of numerous jokes and memes, is the constant nagging notification to install or update Flash in order for web pages to display properly. Many IT professionals will bemoan the trouble they have experienced in the workplace due to these notifications and problems related to them.&lt;br /&gt;
|-&lt;br /&gt;
|Turns out the cloud is just other people's computers.&lt;br /&gt;
|This refers to a meme that demands that &amp;quot;cloud&amp;quot; be replaced with &amp;quot;other people's computers&amp;quot; in all marketing presentation to CEOs and non-computer literate persons evaluating the security impact of using cloud services. Part of the humor here is that &amp;quot;the cloud&amp;quot; is, in actuality, simply a term for hosted services, or in other words computers being run by other people (typically businesses that specialize in this type of &amp;quot;Platform as a Service&amp;quot; or &amp;quot;PaaS&amp;quot; service model). Referring to &amp;quot;the cloud&amp;quot; as &amp;quot;other people's computers&amp;quot; is, at its core, entirely accurate, though it takes away the business jargon and simplifies the situation in such a way that it might cast doubt on the security, reliability, and general effectiveness of using &amp;quot;cloud&amp;quot; solutions.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in Mitre's CVE database allows arbitrary code insertion.[[779|[~~CLICK HERE FOR CHEAP VIAGRA~~]]]&lt;br /&gt;
|Mitre's CVE database is where all {{w|Common Vulnerabilities and Exposures|CVEs}} are stored. This log message forms the punchline of the comic, as it implies that all of the exaggerated error messages above might have been inserted by hackers exploiting the vulnerability. To pour salt in the wound, they then included in a typical spam link purporting to offer inexpensive {{w|Viagra|brand-name Sildenafil}}.&lt;br /&gt;
|-&lt;br /&gt;
|It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
|Appears in the title text. {{w|Bruce Schneier}} is security researcher and blogger. The &amp;quot;two kids in a trenchcoat&amp;quot; is a reference to the {{tvtropes|TotemPoleTrench|Totem Pole Trench}} trope. Shortly before this comic was posted, a [https://rare.us/rare-humor/two-kids-dressed-as-a-tall-man-to-get-into-black-panther-is-caught-on-video story went viral] in which two kids were photographed attempting this for real to get into a screening of ''Black Panther''.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A heading is centered above a list of 21 vulnerabilities]&lt;br /&gt;
:&amp;lt;big&amp;gt;Leaked list of major 2018 security vulnerabilities &amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:CVE-2018-????? Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
:CVE-2018-????? An attacker can use a timing attack to extploit a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
:CVE-2018-????? At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
:CVE-2018-????? A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
:CVE-2018-????? MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
:CVE-2018-????? A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
:CVE-2018-????? Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
:CVE-2018-????? An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
:CVE-2018-????? Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer in Missouri that no one's checked on in a while.&lt;br /&gt;
:CVE-2018-????? Nobody really knows how hypervisors work.&lt;br /&gt;
:CVE-2018-????? Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
:CVE-2018-????? x86 has way too many instructions.&lt;br /&gt;
:CVE-2018-????? NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
:CVE-2018-????? Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
:CVE-2018-????? Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
:CVE-2018-????? Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
:CVE-2018-????? An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
:CVE-2018-????? Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
:CVE-2018-????? Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
:CVE-2018-????? Turns out the cloud is just other people's computers.&lt;br /&gt;
:CVE-2018-????? A flaw in Mitre's CVE database allows arbitrary code insertion.&amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;[~~Click here for cheap viagra~~]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
&lt;br /&gt;
Randall has previously referenced diacritics in [[1647: Diacritics]].&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier was previously mentioned in the title texts of [[748: Worst-Case Scenario]] and [[1039: RuBisCO]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Charts]]&lt;br /&gt;
[[Category:Programming]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159390</id>
		<title>1957: 2018 CVE List</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=159390"/>
				<updated>2018-06-27T21:22:15Z</updated>
		
		<summary type="html">&lt;p&gt;WurmWoode: /* Table of possible CVE */ You missed the cheap shot at Shannon vs information (bit) content&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1957&lt;br /&gt;
| date      = February 19, 2018&lt;br /&gt;
| title     = 2018 CVE List&lt;br /&gt;
| image     = 2018_cve_list.png&lt;br /&gt;
| titletext = CVE-2018-?????: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
{{w|Common Vulnerabilities and Exposures|CVE}} (Common Vulnerabilities and Exposures) is a standardized format for assigning an identity to a cybersecurity vulnerability (similar to the way that astronomical bodies are assigned unique identifiers by committees). Giving vulnerabilities a unique identifier makes them easier to talk about and helps in keeping track of the progress made toward resolving them. The typical format of a CVE identifier is '''CVE-[YEAR]-[NUMBER]'''. For example, the CVE identifier for 2017's widespread {{w|Meltdown (security vulnerability)|Meltdown vulnerability}} is [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 CVE-2017-5754]. CVEs also contain a short description of the issue.&lt;br /&gt;
&lt;br /&gt;
In this comic (released in February 2018), Randall presents a number of spurious predicted CVEs for later in 2018. Each CVE identifier is given as &amp;quot;CVE-2018-?????&amp;quot;, reflecting the fact that they have not yet happened so we don't know exactly what their CVE identifier will be.&lt;br /&gt;
&lt;br /&gt;
==Table of possible CVE==&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%;&amp;quot; | Security Vulnerability&lt;br /&gt;
! style=&amp;quot;width: 70%;&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|Apple products crash when displaying certain {{w|Telugu language|Telugu}} or {{w|Bengali language|Bengali}} letter combinations.&lt;br /&gt;
|This refers to a real vulnerability in iOS and MacOS publicized a few days before the comic was released,&amp;lt;ref&amp;gt;https://techcrunch.com/2018/02/15/iphone-text-bomb-ios-mac-crash-apple/&amp;lt;/ref&amp;gt; as well as past similar iOS vulnerabilities&amp;lt;ref&amp;gt;https://thenextweb.com/apps/2017/01/18/iphone-ipad-apple-text-ios-bug/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.telegraph.co.uk/technology/2018/01/18/apple-text-bomb-can-crash-iphones-single-message/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can use a timing attack to extploit [''sic''] a race condition in {{w|Garbage collection (computer science)|garbage collection}} to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
|The reference to using a Timing Attack to exploit a race condition in garbage collection refers to Meltdown and Spectre CPU flaws that can be exploited in a cloud server like the ones in Wikipedia. {{w|Claude Shannon}} was an early and highly influential information scientist whose work underlies compression, encryption, security, and the theory behind how information is encoded into binary digits. &lt;br /&gt;
&lt;br /&gt;
This is not a security problem. However, since Shannon formulated how the amount of unique or actual information some entity contains is proportional to the number of bits required to encode it, retrieving only a few bits casts a dark perspective upon the significance of the Shannon article's content.&lt;br /&gt;
|-&lt;br /&gt;
|At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
|Cafés often offer free access to WiFi as a service to patrons, as a business strategy to encourage said patrons to remain in the building and buy more coffee. Some use a password, so that only patrons can use the WiFi, and may display the password on signage inside. Since anybody could go into the cafe to read the post-it, and then use the network from nearby, the ability to read it from outside is, at most, a trivial problem. For systems that are supposed to be secure, writing passwords in a visible place is a major security flaw. For instance, following the [[wikipedia:2018 Hawaii false missile alert|2018 Hawaii false missile alert]], the agency concerned received criticism for a press photo showing a password written on a sticky note attached to a monitor.&amp;lt;ref&amp;gt;http://uk.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1?r=US&amp;amp;IR=T&amp;lt;/ref&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
|A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
|Describes a common feature on news sites or social media sites like Facebook. The possibility for users to &amp;quot;inject&amp;quot; text into the page is by design. This is a humorous reference to the relatively common security vulnerability &amp;quot;[[Wikipedia:Cross-site_scripting|persistent cross-site scripting]]&amp;quot;, where input provided by a user, such as through a comment section, can result in dangerous content containing arbitrary HTML or JavaScript code being displayed to other users. &lt;br /&gt;
|-&lt;br /&gt;
|MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
|Some people pronounce &amp;quot;{{w|SQL}}&amp;quot; like &amp;quot;sequel&amp;quot;, after SQL's predecessor &amp;quot;SEQUEL (Structured English Query Language)&amp;quot;. The standard for SQL suggests that it should be pronounced as separate letters; however, the author of SQL pronounces it &amp;quot;sequel&amp;quot;, so the debate is persisting (with even more justification than arguments about how to pronounce &amp;quot;GIF&amp;quot;). MySQL is an open-source relational database management system. The latest generally available version (at the time of writing) is MySQL 5.7.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
|{{w|Privilege escalation}} refers to any illegitimate means by which a system user gains greater access than they are supposed to have, and most hackers will seek to achieve this if they can. The most highly-sought privilege is that of the root user, which allows complete access to an entire system.&lt;br /&gt;
&lt;br /&gt;
This CVE, however, presents the reverse situation: that a flaw can allow a root user to ''de-escalate'' to a less privileged user. This would have no obvious benefit, since anything the user could do in the new mode, they could have done before anyway. In any case, the root user can always de-escalate manually if they so choose, as they have complete control.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
|This is a reference to a common problem of modern gadgets catching fire (usually related to flaws in lithium-ion batteries), as well as to Apple products crashing when attempting to display certain character sequences. Diacritics are the accents found on letters in some languages (eg. č, ģ ķ, ļ, ņ, š, ž). These would not normally be found on emojis.&lt;br /&gt;
|-&lt;br /&gt;
|An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
|This probably refers to the movie {{w|Air Bud}}, about a dog playing basketball. This has been a common theme in xkcd comics: see [[115: Meerkat]], [[1439: Rack Unit]], [[1819: Sweet 16]], [[1552: Rulebook]].&lt;br /&gt;
In 2017, it was discovered that an oversight in the constitution of the state of Kansas may [http://www.kansascity.com/news/politics-government/article175956836.html permit a dog to be governor]. Shortly before this comic published, the Secretary of State's office ruled that [http://dfw.cbslocal.com/2018/02/13/dog-kansas-governor/ it could not].&lt;br /&gt;
|-&lt;br /&gt;
|Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer [''sic''] in Missouri that no one's checked on in a while.&lt;br /&gt;
|{{w|Haskell (programming language)|Haskell}} is a functional programming language. Functional programming is characterized by using functions that don't have side effects (can't change things which would be accessible in other parts of the program), as in [[1312: Haskell]]. The joke here is discovering that it does indeed have side-effects, but for some unknown (and highly absurd) reason they only manifest on a specific computer in a nondescript location, but no one has noticed.&lt;br /&gt;
|-&lt;br /&gt;
|Nobody really knows how hypervisors work.&lt;br /&gt;
|[[wikipedia:Hypervisor|&amp;quot;Hypervisors&amp;quot;]] are a tool for computer virtualization. Virtualization is complex to implement, as it requires a computer to completely simulate another computer, with its own unique hardware and software. Many IT professionals and businesses rely heavily on various forms of virtualization, but most of the individual employees would be hard-pressed to explain how it works. Programs running on other virtual computers, or on the real computer, may be able to access information on a virtual computer in ways which would not be possible with a single real computer. Consequently, understanding how the hypervisor works is important to assessing the security of a virtual server. Meltdown and Spectre are related to this.&lt;br /&gt;
|-&lt;br /&gt;
|Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
|This joke is about arcane systems that are running Linux in exceedingly rare situations, meaning that reproducing errors would be incredibly difficult or inconvenient, and would only affect a very tiny user base (if any at all). {{w|IBM System/390 ES/9000 Enterprise Systems Architecture ESA family|System/390}} is an IBM mainframe introduced almost 30 years before this comic, which has a version of Linux. UTC+14 is a time zone used only on some islands in the Pacific Ocean (Primarily [[Wikipedia:Line_Islands|the Line Islands]]) and is also the earliest time zone on earth. Even if all of these absurd conditions were met, the resulting vulnerability would still be relatively benign: simply changing a user's preferred clock display format. Other xkcd comics make references to such obscure computer-time issues relating to time zones and time conversions, and how many programmers find these issues frustrating or even traumatizing. &lt;br /&gt;
|-&lt;br /&gt;
|x86 has way too many instructions.&lt;br /&gt;
|The x86 architecture (used in many Intel and AMD processors) is very complicated. Processors typically implement such a complex architecture using programs (microcode) run on a set of hidden, proprietary processors. The details of these hidden machines and errors in the microcode can result in security vulnerabilities, such as Meltdown, where the physical machine does not match the conceptual machine.&lt;br /&gt;
&lt;br /&gt;
A more complicated instruction set is more complex to implement.{{Citation needed}} The x86 architecture is considered &amp;quot;CISC&amp;quot; (a &amp;quot;{{w|Complex instruction set computer}}&amp;quot;), having many instructions originally provided to make programming by a human simpler; other examples include the 68000 series used in the first {{w|Apple Macintosh}}. In the 1980s, this design philosophy was countered by the &amp;quot;RISC&amp;quot; (&amp;quot;{{w|Reduced instruction set computer}}&amp;quot;) design movement - based on the observation that computer programs were increasingly generated by compilers (which only used a few instructions) rather than directly by people, and that the chip area dedicated to extra instructions could be better dedicated to, for example, cache. Examples of RISC style designs include {{w|SPARC}}, {{w|MIPS}}, {{w|PowerPC}} (used by Apple in later Macintoshes) and the {{w|ARM architecture|ARM}} chips common in mobile phones. Historically, there was considerable discussion about the merits of each approach. At one time the Mac and Windows PC were on different sides; owners of other competing systems such as the Archimedes and Amiga had similar arguments on usenet in the early 1990s. This &amp;quot;issue&amp;quot; may be posted by someone who still recalls these debates. Technically, the extra instructions do slightly complicate the task of validating correct chip behaviour and complicate the tool chains that manage software, which could be seen as a minor security risk. However, the 64-bit architecture introduced by {{w|AMD}}, and since adopted by {{w|Intel}}, does rationalise things somewhat, and all recent x86 chips break down instructions into RISC-like micro-operations, so the complication from a hardware perspective is localised. Recent security issues, such as the speculative cache load issue in Meltdown and Spectre, depend more on details of implementation, rather than instruction set, and have been exhibited both by x86 (CISC) and ARM (RISC) processors.&lt;br /&gt;
&lt;br /&gt;
This explanation has way too many words.&lt;br /&gt;
|-&lt;br /&gt;
|NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
|NumPy is the fundamental package for scientific computing with the programming language Python. ''O''(log ''n'') is [[wikipedia:Big_O_notation#Infinite_asymptotics|Big O notation]] meaning that the time it takes for a computer algorithm to run is in the order of log ''n'', for an input of size ''n''. ''O''(log ''n'') is very fast and is more usual for a search algorithm. Prime factorization currently is ''O''(''2''&amp;lt;sup&amp;gt;''n''&amp;lt;/sup&amp;gt;n)). If something can find the prime factors of a number this quickly, especially a [[wikipedia:semiprime|semiprime]] with two large factors, it will enable attacks to break many crypto functions used in internet security. However, prime numbers have only a single factor, and &amp;quot;factoring primes&amp;quot; quickly is a simpler problem, that of [[wikipedia:Primality test|proving that a number is in fact a prime]]. &lt;br /&gt;
|-&lt;br /&gt;
|Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
|Another joke on the first CVE and [[wikipedia:I before E except after C|a common English writing rule of thumb]], which fails almost as often as it succeeds. Possibly a jab at Apple's image, portraying their software as unable to handle improper grammar or spelling.&lt;br /&gt;
|-&lt;br /&gt;
|Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
|Skylake x86 chips are a line of microprocessors made by Intel. Some processors are soldered directly to a system board or daughter board, while others are attached to boards that plug into the system board by means of a socket (pins or connectors that make physical contact with receptacles or connectors on a system board). Some sockets, especially older ones, require force to insert or remove, and often require the use of a flat blade screwdriver or a specialized tool, but most modern ones use ZIF (Zero Insertion Force) techniques, often involving a lever or similar to tighten or loosen the friction/tightness of the contacts. No screwdriver is needed in this case. However, any processor ''can'' be forcefully removed from its socket with a screwdriver.{{Citation needed}}&lt;br /&gt;
|-&lt;br /&gt;
|Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
|{{w|Linus Torvalds}} is the {{w|benevolent dictator for life}} of the Linux kernel codebase. Normally it is hard to make changes because he has the last word, and because the kernel is replicated in all Linux installations. Linus made the news in January 2018 when, having looked at one of Intel's proposed fixes for the Spectre and Meltdown vulnerabilities, he declared &amp;quot;the patches are COMPLETE AND UTTER GARBAGE&amp;quot;.&amp;lt;ref&amp;gt;https://techcrunch.com/2018/01/22/linus-torvalds-declares-intel-fix-for-meltdown-spectre-complete-and-utter-garbage/&amp;lt;/ref&amp;gt; Presumably, it may be found that he may be successfully bribed to be less blunt and/or less critical of vulnerability fixes that are complete and/or utter garbage. If this were the case, this would be a severe critical vulnerability to all Linux servers and machines.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
|The point of an attack is to make someone else's machine perform actions against the owner's will. Anyone can make their own machine execute any code if they have root access and the necessary tools, but this would usually not be described as an attack, except in the case of a locked-down appliance, such as a video game console, a John Deere tractor, or pay TV decoder.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
|This could refer to a CVE vulnerability of JPG files where JavaScript embedded within the image file is executed by some application. In this case, though, the code is visible on the image instead of invisibly encoded within the image file. The code is also only executed if the image contains a photo of a baby in a saddle riding a dog. It's unclear whether the photo would be a digital photo, a printed photo (i.e. as taken using a digital camera), or maybe both. This &amp;quot;bug&amp;quot; would not only require the device to figure out specifically what the photo contains image-wise (something that's REALLY HARD for computers to do reliably), but would also require OCR (optical character recognition) code to convert the text superimposed on the photo into executable code. In other words, it's hard to believe in 2018 that such a bug could exist. Maybe in the future when such things are more routine...? As an example, OCR used to be hard to do reliably, but now it's a lot more routine and built into a lot of devices.&lt;br /&gt;
|-&lt;br /&gt;
|Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
|Flash has been an integral browser plugin for decades, but has fallen out of favor in the 2010s, and eventually discontinued because of its notoriously abysmal security record. All security experts advise against installing it. Preventing installation of Flash would make systems more secure, but most versions of Windows do not prevent Flash installation. The joke here relates to the difficulty of keeping Flash up to date, or even installed properly to begin with. A common user experience, which is the subject of numerous jokes and memes, is the constant nagging notification to install or update Flash in order for web pages to display properly. Many IT professionals will bemoan the trouble they have experienced in the workplace due to these notifications and problems related to them.&lt;br /&gt;
|-&lt;br /&gt;
|Turns out the cloud is just other people's computers.&lt;br /&gt;
|This refers to a meme that demands that &amp;quot;cloud&amp;quot; be replaced with &amp;quot;other people's computers&amp;quot; in all marketing presentation to CEOs and non-computer literate persons evaluating the security impact of using cloud services. Part of the humor here is that &amp;quot;the cloud&amp;quot; is, in actuality, simply a term for hosted services, or in other words computers being run by other people (typically businesses that specialize in this type of &amp;quot;Platform as a Service&amp;quot; or &amp;quot;PaaS&amp;quot; service model). Referring to &amp;quot;the cloud&amp;quot; as &amp;quot;other people's computers&amp;quot; is, at its core, entirely accurate, though it takes away the business jargon and simplifies the situation in such a way that it might cast doubt on the security, reliability, and general effectiveness of using &amp;quot;cloud&amp;quot; solutions.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in Mitre's CVE database allows arbitrary code insertion.[[779|[~~CLICK HERE FOR CHEAP VIAGRA~~]]]&lt;br /&gt;
|Mitre's CVE database is where all {{w|Common Vulnerabilities and Exposures|CVEs}} are stored. This log message forms the punchline of the comic, as it implies that all of the exaggerated error messages above might have been inserted by hackers exploiting the vulnerability. To pour salt in the wound, they then included in a typical spam link purporting to offer inexpensive {{w|Viagra|brand-name Sildenafil}}.&lt;br /&gt;
|-&lt;br /&gt;
|It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
|Appears in the title text. {{w|Bruce Schneier}} is security researcher and blogger. The &amp;quot;two kids in a trenchcoat&amp;quot; is a reference to the {{tvtropes|TotemPoleTrench|Totem Pole Trench}} trope. Shortly before this comic was posted, a [https://rare.us/rare-humor/two-kids-dressed-as-a-tall-man-to-get-into-black-panther-is-caught-on-video story went viral] in which two kids were photographed attempting this for real to get into a screening of ''Black Panther''.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A heading is centered above a list of 21 vulnerabilities]&lt;br /&gt;
:&amp;lt;big&amp;gt;Leaked list of major 2018 security vulnerabilities &amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:CVE-2018-????? Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
:CVE-2018-????? An attacker can use a timing attack to extploit a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
:CVE-2018-????? At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
:CVE-2018-????? A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
:CVE-2018-????? MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
:CVE-2018-????? A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
:CVE-2018-????? Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
:CVE-2018-????? An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
:CVE-2018-????? Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer in Missouri that no one's checked on in a while.&lt;br /&gt;
:CVE-2018-????? Nobody really knows how hypervisors work.&lt;br /&gt;
:CVE-2018-????? Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
:CVE-2018-????? x86 has way too many instructions.&lt;br /&gt;
:CVE-2018-????? NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
:CVE-2018-????? Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
:CVE-2018-????? Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
:CVE-2018-????? Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
:CVE-2018-????? An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
:CVE-2018-????? Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
:CVE-2018-????? Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
:CVE-2018-????? Turns out the cloud is just other people's computers.&lt;br /&gt;
:CVE-2018-????? A flaw in Mitre's CVE database allows arbitrary code insertion.&amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;[~~Click here for cheap viagra~~]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
&lt;br /&gt;
Randall has previously referenced diacritics in [[1647: Diacritics]].&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier was previously mentioned in the title texts of [[748: Worst-Case Scenario]] and [[1039: RuBisCO]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Charts]]&lt;br /&gt;
[[Category:Programming]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>WurmWoode</name></author>	</entry>

	</feed>