Kata1yst avatar

Kata1yst

@Kata1yst@kbin.social
Kata1yst,
Kata1yst avatar

Marmot Tungsten is on sale and is generally well regarded.

The half dome is great too.

The Alps Zephyr is criminally underrated in my opinion, and it's normal price is very low.

Kata1yst,
Kata1yst avatar

A double boiler, sometimes called a "hot water bath".

Basically a container with what you're cooking inside over the top of a pot of heated water.

It heats things up evenly and gently.

Kata1yst,
Kata1yst avatar

In the baking world that is absolutely true. But it's sometimes used more broadly in my experience, idk.

Kata1yst,
Kata1yst avatar

2009 era was also when Intel leveraged their position in the compiler market to cripple all non-Intel processors. Nearly every benchmarking tool used that complier and put an enormous handicap on AMD processors by locking them to either no SSE or, later, back to SSE2.

My friends all thought I was crazy for buying AMD, but accusations had started circulating about the complier heavily favoring Intel at least as early as 2005, and they were finally ordered to stop in 2010 by the FTC... Though of course they have been caught cheating in several other ways since.

Everyone has this picture in their heads of AMD being the scrappy underdog and Intel being the professional choice, but Intel hasn't really worn the crown since the release of Athlon. Except during Bulldozer/Piledriver, but who can blame AMD for trying something crazy after 10 years of frustration?

Kata1yst, (edited )
Kata1yst avatar

Nope! And most hydrogen is fossil fuel (methane) derived and horribly energy inefficient. At this point it's green washing at best.

Edit: adding data:
Steam-Methane Reforming (SMR) accounts for about 95% of all hydrogen production on earth. It uses a huge amount of heat, water, and methane to produce hydrogen.

https://en.m.wikipedia.org/wiki/File:SMR%2BWGS-1.png

For inputs:

  • 6.2MWh of Heat
  • 2.2 tons of Methane
  • 4.9 tons of pure water

The outputs are:

  • 6 tons of CO2
  • 1.1 tons of H2

The overall energy in vs energy out is at most 85% efficient. https://www.sciencedirect.com/science/article/abs/pii/S0016236122001867

Hydrolysis, the main competing method, and the one most touted by hydrogen backers, accounts for about 4% of hydrogen production.
This method takes in only pure water and electricity, but it's efficiency is abysmal at some 52%. In every case, a modern kinetic, thermal, or chemical battery will exceed this efficiency.

Other methods are being looked into, but it's thermodynamically impossible for the resulting H2 to produce more energy than it takes to create the H2. So at best today we could use H2 as a crappy battery, one that takes a lot of methane to create.

Kata1yst,
Kata1yst avatar

When it's a documented scientific process and it's scaled up and used in the real world to displace the other methods, I'll be ready to acknowledge hydrogen as a valid part of energy infrastructure.

Kata1yst,
Kata1yst avatar

It’s a tough pivot to make, but what else are fans of the genre gonna play hahahah

Sins of a Solar Empire 1

And hey, we get to hope Sins 2 remains great.

Kata1yst,
Kata1yst avatar

Dishonor on you! Dishonor on your cow!

Kata1yst,
Kata1yst avatar

Agree to disagree. I like the USPS Canoo, and that micro bus just looks silly to my eyes.

Kata1yst,
Kata1yst avatar

I mean, that's precisely the ideal case and goal of many tariffs.

Kata1yst,
Kata1yst avatar

On a server, it allows you to track who initiates which root season session. It also greatly minimizes the attack surface from a security perspective to have admin privileged accounts unable to be remotely connected to.

Kata1yst,
Kata1yst avatar

Wouldn’t separate SSH keys achieve the same?

Separate ssh keys for the user and the admin? Yeah, see point 2, admins should not be remotely accessible.

Really? How, exactly? Break the ssh key authentication? And wouldn’t that apply to all accounts equally?

Keys aren't perfect security. They can easily be mishandled, sometimes getting published to GitHub, copied to USB drives which can easily be lost, etc.

Further, there have been attacks against SSH that let malicious actors connect remotely to any session, or take over existing sessions. By not allowing remote access on privileged accounts, you minimize risk.

Forcing a non privileged remote session to authenticate with a password establishes a second factor of security that is different from the first. This means a cracked password or a lost key is still not enough for a malicious actor to accomplish administrative privileges.

A key is something you have

A password is something you know

So, by not allowing remote privileged sessions, we're forcing a malicious actor to take one more non-trivial step before arriving at their goals. A step that will likely be fairly obvious in logs on a monitored machine.

Kata1yst,
Kata1yst avatar

I strongly disagree with your premise. Separating authentication and privilege escalation adds layers of security that are non-trivial and greatly enhance resilience. Many attacks are detected and stopped at privilege escalation, because it happens locally before a user can stop or delete the flow of logs.

If I get into your non-privileged account I can set up a program that acts like sudo

No you cannot. A non privileged user doesn't have the access necessary to run a program that can accomplish this.

And even if they do it’s too late anyway because I’ve just compromised root and locked everybody out and I’m in there shitting on the filesystems or whatever. Because root can do anything.

Once again, you didn't privilege escalate, because once you have a foothold (authentication) you don't have the necessary privileges, so you must perform reconnaissance to identify an exploitable vector to privilage escalate with. This can be any number of things, but it's always noisy and slow, usually easy to detect in logs. There is a reason the most sophisticated attacks against well protected targets are "low and slow".

And if I can’t break into your non-privileged account then I can’t break into a privileged account either.

You're ignoring my points given regarding the risks of compromised keys. If there are no admin keys, there are no remote admin sessions.

These artificial distinctions between “non-privileged” and “superuser” accounts need to stop. This is not good security, this is not zero trust. Either you don’t trust anybody and enforce explicit privilege escalation for specific things, or just accept that you’re using a “super” paradigm and once you’ve got access to that user all bets are off.

Spoken like someone who has never red teamed or purple teamed. Even admin accounts are untrusted, given only privileges specific to their role, and closely monitored. That doesn't mean they should have valid security measures thrown away.

Kata1yst,
Kata1yst avatar

That's called 'privilege escalation', and replacing system level calls with user level calls is closely watched for and guarded against with many different security measures including SELinux.

You've already outed yourself multiple times in this thread as someone who doesn't understand how security in the real world works. Take the L and try to learn from this. It's okay not to understand something. But it's very important to recognize when that happens and not claim to understand better than someone else.

As China and Iran hunt for dissidents in the US, the FBI is racing to counter the threat (apnews.com)

After a student leader of the historic Tiananmen Square protests entered a 2022 congressional race in New York, a Chinese intelligence operative wasted little time enlisting a private investigator to hunt for any mistresses or tax problems that could upend the candidate’s bid, prosecutors say....

Kata1yst,
Kata1yst avatar

Whataboutism? Really? That's the game we're playing?

Sure, okay, I'll bite.

Edward Snowden: He's a hero, no doubt in my mind. But from this perspective, no one has attacked him since his departure from the US. Formal requests have been made to extradite him and they've been turned down. Once on foreign soil the US respected Russian sovereignty.

Julian Assange: Okay personally I find Assange to be a piece of shit, but that aside, the extradition process has been followed legally.

Chelsea Manning: Broke the law. And while her initial imprisonment situation was absolutely concerning, it was legal. The legal process was followed, and the sentence given was far short of the maximum. Her sentence was commuted by a sitting president. No foreign governments were involved, so no sovereignty was violated.

Drake and Binny: Always were on US soil. No foreign involvement whatsoever. They were raided and Drake was changed with crimes. He received probation and community service. Once again, the legal process was followed and no foreign sovereignty violated.

Boeing Whistleblowers: What the fuck is this arguement? You think the US is happy one of it's biggest military manufacturers and transportation providers has serious quality issues? You think the US is taking action against the whistleblowers? Be serious.

Basically: you're saying the US charges people who violate the laws around information handling as criminals. Yes, that's true. Now, I personally am sympathetic to most of these cases. I assume you are too. Whistleblowers should be better protected, but at the same time some information, like the names and personal information of government assets abroad, reasonably should be protected. It's a delicate balance, and one I think the US could greatly improve.

However, these are not similar to the cases in question. The cases in question are actions by governments on foreign soil or against US citizens. This is an enormous violation of sovereignty, legality, and due process. That's the issue at hand.

Kata1yst,
Kata1yst avatar

They even literally have a section of the article that says they "see Fair Software as an alternative model to the free and open source software model", and they think it's superior because the "developers can profit".

Newsflash: the developers usually see fractions of those cents while most of the money goes to the management and shareholders of the company that employs them. Hmm, doesn't seem fair to me.

Also, developers can and do profit from FOSS in many ways, but the most popular models are with commercial support, SaaS offerings, and additional functionality (like providing a web interface, clustering manager or other external piece of the puzzle to solve the problem at scale in enterprise).

Like you said so succinctly: propaganda website to make rug pullers like Elastic and Hashicorp look better.

Kata1yst,
Kata1yst avatar

I host my own to avoid running into timeouts, fairly easy

Kata1yst,
Kata1yst avatar

https://www.reuters.com/business/aerospace-defense/glass-lewis-recommends-investors-vote-against-three-boeing-directors-2024-04-30/

The recommendation to shareholders from the independent advisor who proxies Boeing is to vote out several board members who are responsible for safety and QA. Crazy to see at a Fortune 100.

Kata1yst,
Kata1yst avatar

MRSA infection following hospital admittance for Pneumonia. That shit is serious and way more prevalent than people think, it's just that it usually kills people who are already terminally ill.

Unlikely to be an assassination. But not impossible. Either way, looks very bad.

Which RSS aggregator do you use? I cannot seem to find one that works for me.

I cannot stand google news any more, too much spam, clickbait and advertisement. So I decided to try to selfhost an RSS aggregator to make myself a news feed that I would be comfortable with. Being RSS such an “ancient” thing I thought there will be many mature systems, but I’m not sure that’s the case…...

Kata1yst,
Kata1yst avatar

I use FreshRSS. Can't say I love the interface, but with the open and standardized API, there are dozens of beautiful front ends to choose on any device.

Kata1yst,
Kata1yst avatar

Yes, this in particular is something they need to bring the hammer down on now before others see this as a valid strategy. After the first 10s penalty he was out of the points and obviously consciously decided that if he was out any way, more penalities wouldn't sting as much as his team bringing home another zero point weekend.

It was egregious and unsportsmanlike. And I say this as someone who generally likes KMag.

Kata1yst,
Kata1yst avatar

No no you don't understand. The evil corporate overlords abused their power to force a choice on a developer, even though that choice was objectively the right choice and the developer was throwing a tantrum.

This is truly awful. We must not let evil corporations, no matter their credentials, expertise, and decades of beneficial partnership with open source, tell immature and short sighted developers how to develop.

Kata1yst,
Kata1yst avatar

Accurate, but not bad, yes. It turns out standardized base systems and ABIs are important to an ecosystem.

Linux tried the disorganized free-for-all for two decades, and what we got was fragmented "Ubuntu admins", "debian admins", "redhat admins", "suse admins", and a whole shitload of duplicated effort in the packaging ecosystem, only for half the packages out there to be locked to Ubuntu or RHEL. So the corporate interests, and a fair number of the community efforts, centralized their problems and solutions into a small standardized suite in Mesa+Wayland+systemd+Pipewire+flatpak, etc

The result is a ton more interoperability, a truly open ecosystem where switching your distro doesn't mean hiring different people and using different software, and a lot more stability and maturity.

And hey, if a user or distro wants to do their own thing, they can make and own their niche, same as before. Nothing lost.

It's been kind of wild to watch over the past 15 years or so, makes me very hopeful for the next 15.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • tacticalgear
  • magazineikmin
  • modclub
  • khanakhh
  • InstantRegret
  • Youngstown
  • mdbf
  • slotface
  • thenastyranch
  • everett
  • osvaldo12
  • kavyap
  • rosin
  • megavids
  • DreamBathrooms
  • Durango
  • tester
  • ngwrru68w68
  • vwfavf
  • ethstaker
  • cisconetworking
  • GTA5RPClips
  • cubers
  • normalnudes
  • Leos
  • anitta
  • JUstTest
  • All magazines