Editing 2556: Turing Complete
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 8: | Line 8: | ||
==Explanation== | ==Explanation== | ||
− | + | {{incomplete|Created by a NATION-STATE THAT CAN RUN DOOM, AND CRYSIS - Please change this comment when editing this page. Do NOT delete this tag too soon.}} | |
− | + | A {{w|Turing machine}} is a theoretical form of computer (as an idealised thought exercise) that has an infinite tape of symbols and can act upon and change these values as it moves up and down this tape according to specific deterministic rules. | |
− | + | This very simple machine can be shown to do every computational task that what we think of as a "computer" can do, given the right setup and enough time. Something that is {{w|Turing complete}} is able to act as a Turing machine, though generally with the limitation of having a finite tape, and this means it is also able to do basically every computational task. | |
− | + | While many pieces of hardware and software are supposed to be Turing complete (even Excel, as previously pointed out in [[2453: Excel Lambda]]), this comic implies that this was not what it was designed for. Whatever [[Ponytail]] has been referring to is not shown, but it seems to be an anecdote about how something seemingly too simple and/or specialised to exhibit such a computational equivalence has been discovered to actually be that capable. | |
− | + | With complex processors now installed in many household items, including large kitchen appliances like dishwashers, the possibility is raised that someone has 'hacked' such a device to do the same computational work as an actual games console. Alternatively, if hackers working on behalf of a foreign government have discovered an undetected exploit in a nation's cyber-defenses, the fact that a piece of infrastructure accessible to outsiders is Turing-complete (and could thus potentially be used to execute arbitrary code) may come as a very unpleasant surprise to the nation being attacked. | |
− | The {{w|FORCEDENTRY|ForcedEntry}} exploit is a way that was | + | The {{w|FORCEDENTRY|ForcedEntry}} exploit is a way that was discovered to allow {{w|PDF}} files to force malware onto various devices. In particular, the exploit [https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html involves constructing a simplistic virtual CPU] within one of the PDF renderer's decompression functions out of individual logic operations on pixels in an overflowed output buffer. In the title-text it is suggested that this mechanism can be used for what might be more legal and practical purposes, although this might be up to some interpretation depending upon who has the right (and permission) to do what. |
− | |||
− | In the title-text it is suggested that this mechanism can be used for what might be more legal and practical purposes, although this might be up to some interpretation depending upon who has the right (and permission) to do what. | ||
A {{w|Solution stack|tech stack}} is one shorthand way of describing the way an integrated grouping of communicating software packages provides everything from the deepest data handling (even as low-level as an operating system itself) to the user interface. All of these will normally be on a computer (or possibly many of them, whether locally or distributed worldwide) and if a sufficiently functional surrogate system is capable of emulating this (computing what the original computer(s) would do) then it can be considered to effectively ''be'' the same stack of technology and duplicate or replace the originals. | A {{w|Solution stack|tech stack}} is one shorthand way of describing the way an integrated grouping of communicating software packages provides everything from the deepest data handling (even as low-level as an operating system itself) to the user interface. All of these will normally be on a computer (or possibly many of them, whether locally or distributed worldwide) and if a sufficiently functional surrogate system is capable of emulating this (computing what the original computer(s) would do) then it can be considered to effectively ''be'' the same stack of technology and duplicate or replace the originals. | ||
==Transcript== | ==Transcript== | ||
− | :[Ponytail | + | {{incomplete transcript|Do NOT delete this tag too soon.}} |
− | :Ponytail: ...Now, it turns out this is actually Turing-Complete... | + | :[Ponytail and Cueball are standing next to each other] |
+ | :Ponytail:...Now, it turns out this is actually Turing-Complete... | ||
:[Caption below the panel:] | :[Caption below the panel:] | ||
− | :This phrase either means someone spent six months getting | + | :This phrase either means someone spent six months getting their dishwasher to play Mario or you are under attack by a nation-state. |
− | |||
{{comic discussion}} | {{comic discussion}} | ||