99.999999999999% chance the lava lamp inside your computer is broken.
This is probably due to sub standard random numbers. UUIDs are unique. If you manage to duplicate one your doing it badly.
An opportunity to share one of my favourite StackOverflow questions of all time!
It’s well worth reading through the answers and the comments, but here’s a little sampler platter:
This will run for a lot more than hours. Assuming it loops at 1 GHz (which it won’t - it will be a lot slower than that), it will run for 10790283070806014188970 years. Which is about 83 billion times longer than the age of the universe.
damn - so maybe serveral threads generating guids is a better idea?
4 threads on a quad core processor would make it run in 20 billion times the age of the universe - so yeah, that would help a lot.
Perhaps run 20 billion threads and you will end it by the time the universe doubles its age.
What? I can’t set
/proc/sys/kernel/threads-maxto 20 billion‽
Gotta send a bug report to the Linux kernel.
Only 5.4 hours before you hit a UUID collision. That’s insane
This is how we find out that crypto.randomUUID is not cryptographically secure
Aren’t UUIDs designed to prevent collisions, rather than be cryptographycally secure? Not that it’s doing a great job here :D
Edit: Nvm, that was guid.
GUID and UUID are two names of the same thing. One is Globally Unique and one is Universally Unique. I think they mean not cryptographically secure as in not truly random if it’s generating duplicates.
Against a apecific one too. Usually you’d check for duplicates against all previous uuids
That would indeed be way (quadratically) more likely but we don’t count the number of attempts but measure run time, and since comparisons (even with optimizations like insertion sort) take time, the speed difference between the two methods will be “just” a few orders of magnitude.
As long as you don’t run out of memory, you can actually insert and lookup in O(1) time for a known space of values (that we have). Therefore we do get the quadratic speedup, that when dealing with bits of keysize or entropy means cutting it in half.
Checking to get a specific uuid takes 128bit, so 2128 draws of a uuid. Putting all previous uuids into a table we expect a collision in 64bit, so 264. We also need about that much storage to contain the table, so some tens of exabytes.
This is the fucker who put us on the worst timeline! Get their ass!
Either this is faked for the meme or something is very very wrong.
I’m leaning heavily towards faked for the meme.
If you actually were trying to get collisions, you’d save all previously generated ids and check all of them for a match with the newest one.
Not only would this increase the chance of a collision (not enough that it should matter, but still), but it would more closely approximate a real use case - if you use UUIDs you’re not just in trouble if two consecutive ids are identical, it’s usually a problem if any two ids are.
But the presented snippet is simpler and shorter and is close enough to what a naive test might look like, so it’s well suited to getting the joke across.The only way I could imagine this not being fake is if it was achieved in a noncompliant Js implementation. Which seems highly unlikely given the screenshot looks like the Chrome console.
If it was random once, why shouldn’t it be on the 163rd repetition?
Please tell this is fake. I want to be ignorant about this.
If this is reproducible without chicanery, I’m terrified
Without chicanery? Yes
Without luck? No
I think this is beyond luck. This is astronomical. It’s orders of magnitude beyond what is lucky for our entire civilization to have produced in it’s entire existence
I’d put it down to a shit library or pseudorandomness before something happening that’s so lucky it functionally should never happen.
Agreed. Most likely a bad implementation.
For example, if the browser does time fuzzing, this could make the UUID less random.
is this cryptomining? /s
crypto - as in cryptography, not cryptocurrency - is just the library he’s using to generate the 128-bit random UUID. The snippet is interesting because he matched the original UUID in just over 5 hours. You’d expect to need more than 10^38 guesses to pick the same number again, which, even at 1 guess every microsecond, means something like 10^22 years.
Sorry, I forgot to add the
/s.But thank you for the calculations, it’s actually interesting :) I was thinking about that myself, but didn’t bother to do the math.
I thought its reminiscent of cryptomining as it also consist of guessing an arbitrary number just for fun.
Internet sarcasm is hard, and lemmy has a very general audience :) I’m always happy when someone gives me an excuse to do the math I was already curious about - it’s often not worth it, for just my own curiosity, but even a sarcastic or disingenuous prompt reminds me that there’s other casually curious people out there.
I wanted to downvote you for failing to pick up on the sarcasm, but then you went and did all that math that I was too lazy to do and I ended up upvoting you instead. Damn you!
I don’t understand
Insanely unlikely giant random number matches other insanely giant random number
console.time()jots down the current time, if you do that twice and put stuff in the middle you get two times and the difference between them is how long that stuff took to doconsole.timeEnd()uses the last execution ofconsole.time()as the starting point to work out how long the stuff took to doconst originalUUID = crypto.randomUUID()generates a Universally Unique IDentifier, which can be thought of as a very large very random number, by use of a pseudorandom number generatorwhile(stuff)evaluates the stuff for truthiness (1 + 2 = 5 would be false, 50 < 200 would be true, ‘my username starts with the letter k’ would be true) it’s typically followed by a ‘block’ of code, that is lines beginning with{and ending with}, but we don’t see that here, which means we can readwhile(stuff)as “keep checking ifstuffis true in an endless loop, and only continue to the next line if one of the checks ends up beingfalse”the
stuffhere is creating another random UUID, and checking to see if it’s the same random number as the first one generated.functions like this are so incredibly random that chancing upon two executions creating the same number should be practically impossible. staggeringly impossible. If so this code should never complete, as that
whilecheck would be endless, never finding a matchthe image suggests that one such match was found in about 19 million milliseconds (a bit over 5 hours). this is probably faked, because the absurd unlikelihood of the same number being generated in so much as a single human lifetime, let alone a day, is laughable
the imagine is faked or something is terribly wrong with their pseudorandom number generator
Oh wow thank you
But you can’t say that it’s fake or broken just because it’s unprobable, unless there’s supposed to be some additional safe guards to prevent the same random value from repeating within a certain distance from itself.
The function first generated a random UUID. This is a long string of random characters, used in many software systems to uniquely fingerprint things, transactions for example. In theory, you can have millions of seperate systems, each generating UUIDs all the time without ever having to worry about a collision (a collision is one or more systems generating the same UUID, therefore it being not unique anymore)
The second line then runs UUID generation again, trying to generate an identical UUID to the one it already made. Tis is absurd because even a dmsupercomputer trying to generate identical UUIDs would take longer than the lifespan of the universe.
The console line shows that a matching UUID was apparently found after some amount of time, which shouldn’t be possible, implying some fuckery with the random number generator.
I wish I was a good enough coder to understand what’s going on, too. I bet it’s funny as hell.
They’re basically trying to find the time to create duplicate UUIDs. UUIDs are randomly generated and assumed to be so unique and actually random across… well, everything, that no one even checks if they’re actually unique. They suggested they found one in 5 hours. The only maybe possible way I could think of to do this legitimately is to use some ridiculously powerful computer and still get very lucky.
Ah! And this is why I don’t really care that much about long passwords or things of that nature. If the attack is brute force, it could still get lucky and guess it in 5 hours just like this UUID thing!
The chance to get lucky and pick a long, random password is still ridiculously small. The chance to pick admin123 is ridiculously large. You see the difference?
I know how I’m heating my office this winter











