Kata1yst

joined 2 years ago
[–] Kata1yst@kbin.social 2 points 1 year ago (1 children)

Marmot Tungsten is on sale and is generally well regarded.

The half dome is great too.

The Alps Zephyr is criminally underrated in my opinion, and it's normal price is very low.

[–] Kata1yst@kbin.social 22 points 1 year ago (7 children)

A double boiler, sometimes called a "hot water bath".

Basically a container with what you're cooking inside over the top of a pot of heated water.

It heats things up evenly and gently.

[–] Kata1yst@kbin.social 29 points 1 year ago* (last edited 1 year ago) (3 children)

2009 era was also when Intel leveraged their position in the compiler market to cripple all non-Intel processors. Nearly every benchmarking tool used that complier and put an enormous handicap on AMD processors by locking them to either no SSE or, later, back to SSE2.

My friends all thought I was crazy for buying AMD, but accusations had started circulating about the complier heavily favoring Intel at least as early as 2005, and they were finally ordered to stop in 2010 by the FTC... Though of course they have been caught cheating in several other ways since.

Everyone has this picture in their heads of AMD being the scrappy underdog and Intel being the professional choice, but Intel hasn't really worn the crown since the release of Athlon. Except during Bulldozer/Piledriver, but who can blame AMD for trying something crazy after 10 years of frustration?

[–] Kata1yst@kbin.social 1 points 1 year ago

When it's a documented scientific process and it's scaled up and used in the real world to displace the other methods, I'll be ready to acknowledge hydrogen as a valid part of energy infrastructure.

[–] Kata1yst@kbin.social 22 points 1 year ago* (last edited 1 year ago) (2 children)

Nope! And most hydrogen is fossil fuel (methane) derived and horribly energy inefficient. At this point it's green washing at best.

Edit: adding data:
Steam-Methane Reforming (SMR) accounts for about 95% of all hydrogen production on earth. It uses a huge amount of heat, water, and methane to produce hydrogen.

https://en.m.wikipedia.org/wiki/File:SMR%2BWGS-1.png

For inputs:

  • 6.2MWh of Heat
  • 2.2 tons of Methane
  • 4.9 tons of pure water

The outputs are:

  • 6 tons of CO2
  • 1.1 tons of H2

The overall energy in vs energy out is at most 85% efficient. https://www.sciencedirect.com/science/article/abs/pii/S0016236122001867

Hydrolysis, the main competing method, and the one most touted by hydrogen backers, accounts for about 4% of hydrogen production.
This method takes in only pure water and electricity, but it's efficiency is abysmal at some 52%. In every case, a modern kinetic, thermal, or chemical battery will exceed this efficiency.

Other methods are being looked into, but it's thermodynamically impossible for the resulting H2 to produce more energy than it takes to create the H2. So at best today we could use H2 as a crappy battery, one that takes a lot of methane to create.

[–] Kata1yst@kbin.social 12 points 1 year ago (1 children)

It’s a tough pivot to make, but what else are fans of the genre gonna play hahahah

Sins of a Solar Empire 1

And hey, we get to hope Sins 2 remains great.

[–] Kata1yst@kbin.social 30 points 1 year ago

Dishonor on you! Dishonor on your cow!

[–] Kata1yst@kbin.social 6 points 1 year ago (2 children)

Agree to disagree. I like the USPS Canoo, and that micro bus just looks silly to my eyes.

[–] Kata1yst@kbin.social 35 points 1 year ago (1 children)

I mean, that's precisely the ideal case and goal of many tariffs.

[–] Kata1yst@kbin.social 3 points 1 year ago (1 children)

That's called 'privilege escalation', and replacing system level calls with user level calls is closely watched for and guarded against with many different security measures including SELinux.

You've already outed yourself multiple times in this thread as someone who doesn't understand how security in the real world works. Take the L and try to learn from this. It's okay not to understand something. But it's very important to recognize when that happens and not claim to understand better than someone else.

[–] Kata1yst@kbin.social 4 points 1 year ago (3 children)

I strongly disagree with your premise. Separating authentication and privilege escalation adds layers of security that are non-trivial and greatly enhance resilience. Many attacks are detected and stopped at privilege escalation, because it happens locally before a user can stop or delete the flow of logs.

If I get into your non-privileged account I can set up a program that acts like sudo

No you cannot. A non privileged user doesn't have the access necessary to run a program that can accomplish this.

And even if they do it’s too late anyway because I’ve just compromised root and locked everybody out and I’m in there shitting on the filesystems or whatever. Because root can do anything.

Once again, you didn't privilege escalate, because once you have a foothold (authentication) you don't have the necessary privileges, so you must perform reconnaissance to identify an exploitable vector to privilage escalate with. This can be any number of things, but it's always noisy and slow, usually easy to detect in logs. There is a reason the most sophisticated attacks against well protected targets are "low and slow".

And if I can’t break into your non-privileged account then I can’t break into a privileged account either.

You're ignoring my points given regarding the risks of compromised keys. If there are no admin keys, there are no remote admin sessions.

These artificial distinctions between “non-privileged” and “superuser” accounts need to stop. This is not good security, this is not zero trust. Either you don’t trust anybody and enforce explicit privilege escalation for specific things, or just accept that you’re using a “super” paradigm and once you’ve got access to that user all bets are off.

Spoken like someone who has never red teamed or purple teamed. Even admin accounts are untrusted, given only privileges specific to their role, and closely monitored. That doesn't mean they should have valid security measures thrown away.

 

Streaming has ruined media preservation for an entire generation, and older games aren’t faring so well either. Piracy is the only way to save them.

 

French president’s remarks drew comparisons to authoritarian regimes — and the government is already trying to backpedal.

 

States will receive at least $100 million

 

TeleSign and Belgian parent did almost everything wrong, alleges Max Schrems

 

A Supreme Court ruling this week will make it harder for the Navajo Nation to get water from the Colorado River. No one disputes that century-old treaties give them a right to water flowing through their reservation. The court found that the federal government isn't responsible for securing that water for the 170,000 tribal members who live there. It's a win for Arizona, Nevada and California. They said requiring them to accommodate the Navajo Nation's needs would upend negotiations over water supplies for 40 million people and a $15 billion-a-year industry that grows most of the nation’s winter vegetables.

 

Meta Platforms Inc plans to end access to news on Facebook and Instagram for all users in Canada once a parliament-approved legislation requiring internet giants to pay news publishers comes into effect, the company said on Thursday.

 

Sen. Bernie Sanders, who chairs the HELP committee, wrote a letter to Amazon CEO Andy Jassy on Tuesday regarding the company's warehouse safety record.

 

European Union officials say there is a growing risk of mosquito-borne viral diseases such as dengue and chikungunya in Europe due to climate change. The European Center for Disease Prevention and Control said Thursday that because heat waves and flooding are becoming more frequent and severe, conditions are more favorable for invasive mosquito species. Ways to control mosquito populations include eliminating standing water where mosquitoes breed, using eco-friendly larvicides and promoting community awareness about mosquito control. The agency says personal protective measures include the use of mosquito bed nets, wearing clothes that cover most of the body and using mosquito repellent.

view more: ‹ prev next ›