• 0 Posts
  • 54 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle

  • cynar@lemmy.worldtoSelfhosted@lemmy.worldServer for a boat
    link
    fedilink
    English
    arrow-up
    17
    ·
    19 days ago

    Your best bet might be to use a laptop as the basis. They are already designed with power efficiency in mind, and you won’t need an external screen and keyboard for local problem solving.

    I would also consider having a raspberry pi 3 or similar as a companion. Services that must be up all the time run on the pi (e.g. network admin). The main computer only gets kicked out of sleep mode when required. The pi 3 needs less power than the newer pis, while still having enough computing power to not lag unless pushed hard.

    I definitely agree with SSDs. HDDs don’t do well when rotated when running. Boats are less than a stable platform.


  • In short, Facebook are incentivised to increase conflict and hate, it improves user engagement. They have also leveraged their large user base to boost numbers in threads significantly. Threads is already a cess pip of bigotry and hate.

    Federating with them would be like connecting your house’s drinking water pipe with the sewage pipe of an industrial pig farm. It would pollute our community to the point of destruction.

    They might try and control this initially. Unfortunately, it would almost certainly be part of an embrace, extend, extinguish attempt. ( https://en.m.wikipedia.org/wiki/Embrace,_extend,_and_extinguish ). They play nice till they have control of enough communities, then they stop the controls, to increase profits.




  • It’s not too bad. Relativity says that no frame of reference is special.

    • On earth, a second looks like a second, but a second on the moon looks too quick.

    • On the moon, the second looks like a second, but a second on earth looks too slow.

    Both are actually correct. The simplest solution is to declare 1 to be the base reference. In this case, the earth second. Any lunar colonies will just have to accept that their second is slightly longer than they think it should be.

    If it helps, the difference is tiny. A second is 6.5x10^-10 seconds longer. This works out to 56 microseconds per 24 hours. It won’t affect much for a long time. About the only thing affected would be a lunar GPS.



  • An encryption scheme is only as strong as its weakest link. In academic terms, only the algorithm really matters. In the real world however, implementation is as important.

    The human element is an element that has to be considered. Rubber hose cryptanalysis is a tongue and cheek way of acknowledging that. It also matters since some algorithms are better at assisting here. E.g. 1 time key Vs passwords.


  • The purpose is to access the data. This is a bypass attack, rather than a mathematical one. It helps to remember that encryption is rarely used in the abstract. It is used as part of real world security.

    There are actually methods to defend against it. The most effective is a “duress key”. This is the key you give up under duress. It will decrypt an alternative version of the file/drive, as well as potentially triggering additional safeguards. The key point is the attacker won’t know if they have the real files, and there is nothing of interest, or dummy ones.



  • Hiding it would work. You just have to make sure you don’t miss any.

    As for the danger. There are levels of exposure. You could leak something damning, but that could be played off as a 1 off. You might also be sitting on a huge amount of paperwork that proves it’s endemic. That paperwork might also expose others who wanted things changed, but don’t want to be outed. In this case, an initial leak can test the waters. The additional info can be rolled out, if it’s needed, or the results justified.

    E.g. Initial leak proves they did something nasty. The additional info massively backs it up, but also implicates a VP in its gathering. You might not want to show that hand until later, either to protect them, or to gather more info on their reaction.


  • One of the less mentioned aspects is that a dead man switch should be difficult, if not impossible to detect and neutralise. If you are to the level of being unalived, you’re likely also a target for significant directed hacking. Such a dead man switch should be as resistant as possible to this. A simple email could let them detect and disable your dead man switch.


  • I personally make use of the sonoff pow smart plugs, with Tasmota firmware. Though any Tasmota compatible smart plug with power readings will work.

    The key thing is that with Tasmota, you can properly calibrate the readings. I have a friend with a high quality power meter. I used that to calibrate my smart plugs, they seem to track within a few % of the expensive one, once calibrated.

    Depending on if you have access to an expensive meter or not, this will either be the best bet, or completely useless to you. Your local Hackspace might also be a good option for getting your hands on an expensive meter for an evening.




  • Depending on the target, vaccines can allow the immune system to eliminate it before it can start multiplying significantly. For things like measles etc, this effect is strong enough to provide effective immunity. Whether vaccines can stop infections depends a lot on how you define infection. They won’t magically stop the virus being able to enter your body. They can stop them from establishing themselves and stop you becoming infectious to others.

    Unfortunately, the coronavirus family viruses are particularly slippery. Even our primary immunity from infection is often short lived. COVID is ridiculously good at both hiding from the immune system, and spreading to new hosts. The vaccine provides significant protection, but isn’t effective enough to provide complete immunity.