• 0 Posts
  • 23 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle

  • cynar@lemmy.worldtoSelfhosted@lemmy.worldServer for a boat
    link
    fedilink
    English
    arrow-up
    17
    ·
    7 days ago

    Your best bet might be to use a laptop as the basis. They are already designed with power efficiency in mind, and you won’t need an external screen and keyboard for local problem solving.

    I would also consider having a raspberry pi 3 or similar as a companion. Services that must be up all the time run on the pi (e.g. network admin). The main computer only gets kicked out of sleep mode when required. The pi 3 needs less power than the newer pis, while still having enough computing power to not lag unless pushed hard.

    I definitely agree with SSDs. HDDs don’t do well when rotated when running. Boats are less than a stable platform.




  • It’s not too bad. Relativity says that no frame of reference is special.

    • On earth, a second looks like a second, but a second on the moon looks too quick.

    • On the moon, the second looks like a second, but a second on earth looks too slow.

    Both are actually correct. The simplest solution is to declare 1 to be the base reference. In this case, the earth second. Any lunar colonies will just have to accept that their second is slightly longer than they think it should be.

    If it helps, the difference is tiny. A second is 6.5x10^-10 seconds longer. This works out to 56 microseconds per 24 hours. It won’t affect much for a long time. About the only thing affected would be a lunar GPS.



  • An encryption scheme is only as strong as its weakest link. In academic terms, only the algorithm really matters. In the real world however, implementation is as important.

    The human element is an element that has to be considered. Rubber hose cryptanalysis is a tongue and cheek way of acknowledging that. It also matters since some algorithms are better at assisting here. E.g. 1 time key Vs passwords.


  • The purpose is to access the data. This is a bypass attack, rather than a mathematical one. It helps to remember that encryption is rarely used in the abstract. It is used as part of real world security.

    There are actually methods to defend against it. The most effective is a “duress key”. This is the key you give up under duress. It will decrypt an alternative version of the file/drive, as well as potentially triggering additional safeguards. The key point is the attacker won’t know if they have the real files, and there is nothing of interest, or dummy ones.


  • I personally make use of the sonoff pow smart plugs, with Tasmota firmware. Though any Tasmota compatible smart plug with power readings will work.

    The key thing is that with Tasmota, you can properly calibrate the readings. I have a friend with a high quality power meter. I used that to calibrate my smart plugs, they seem to track within a few % of the expensive one, once calibrated.

    Depending on if you have access to an expensive meter or not, this will either be the best bet, or completely useless to you. Your local Hackspace might also be a good option for getting your hands on an expensive meter for an evening.


  • cynar@lemmy.worldtolinuxmemes@lemmy.worldModern Linux workflow
    link
    fedilink
    English
    arrow-up
    44
    arrow-down
    1
    ·
    5 months ago

    The various “neurodiverse” communities seem to be meshing together more and more. A good chunk of them are autistic, or ADHD dominated interest groups, like FOSS, or various hobbies. It also includes the LGBT+ crowd.

    This mixing allows for a lot of cross pollination of ideas. The trans community hears a lot more about FOSS etc than “normals” and so are more likely to get involved. Conversely, the techies have more exposure to alternative lifestyles. Some, who would traditionally do all they could to fit in, now are willing to show off/become who they really are.

    The community meshing also helps by its supportive nature. Most NDs have experienced being the outsider to society. The nature of the cause is often very different, but the effects are similar. This makes the community particularly accepting of differences, as well as people experimenting with change.

    Basically, all the weirdos got together and realised “Apes together, Strong!”. We are now running with it more and more.



  • Unfortunately, it would likely be detrimental to my ongoing work situation.

    Though saying that, the BBC had a guy who would turn up to work dressed as a wizard (think harry potter style). He was the reason Teletext continued for so long. He was the last one left on the team. They retired Teletext the day after he retired himself.

    I’m still not sure I have the force of personality to not just look like an idiot try hard however. 🤷‍♂️




  • It won’t stop a direct shot, but it would help against ricochet and shrapnel.

    Back during the Napoleonic wars, silk underlayers were highly sought after. They could limit the damage a musket ball could do.

    A spider silk based cape could definitely help projectile damage, while still being able to billow. The challenge would be making it fire and heat proof as well.


  • Break away fasteners are a thing now. Line it with some Kevlar fibre and some good thermal insulation/fire resistance and you have an amazing utility device.

    In public, it billows behind you, making you look dashing and heroic. When the shit hits the fan, instant bullet resistant cover for civilians. A way to shield them from the heat of a fire, or a small explosion. You could even use it offensively to tangle or deceive an opponent!



  • One of the funnier ones is that the matrix actually did hacking right. It was also so quick you don’t notice it.

    When Trinity hacks into the power station, it’s legit. She checks the software version, which shows an out of date version. She then uses a known flaw in that version to reset the password.

    It’s the only bit of actual hacking in the movie. They obviously knew that geeks would be checking it frame by frame, so they actually did their homework on it.


  • Power supplies are better. The pi requires 5V minimum, with a decent amperage. Most chargers put out 5V exactly. Unfortunately, a lot of usb cables are light on copper. This causes a voltage drop. Your 5.00V charger might only deliver 4.5V to the pi. This causes under voltage issues. It can also cause brownouts.

    The pi chargers are designed to counter this. The cables have enough copper to not drop significant voltage. They also output 5.5V (top of the usb spec range), so can handle some drop. This makes them more stable in the long run.