• 1 Post
  • 40 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle

  • cynar@lemmy.worldtoSelfhosted@lemmy.worldServer for a boat
    link
    fedilink
    English
    arrow-up
    17
    ·
    3 months ago

    Your best bet might be to use a laptop as the basis. They are already designed with power efficiency in mind, and you won’t need an external screen and keyboard for local problem solving.

    I would also consider having a raspberry pi 3 or similar as a companion. Services that must be up all the time run on the pi (e.g. network admin). The main computer only gets kicked out of sleep mode when required. The pi 3 needs less power than the newer pis, while still having enough computing power to not lag unless pushed hard.

    I definitely agree with SSDs. HDDs don’t do well when rotated when running. Boats are less than a stable platform.




  • It’s not too bad. Relativity says that no frame of reference is special.

    • On earth, a second looks like a second, but a second on the moon looks too quick.

    • On the moon, the second looks like a second, but a second on earth looks too slow.

    Both are actually correct. The simplest solution is to declare 1 to be the base reference. In this case, the earth second. Any lunar colonies will just have to accept that their second is slightly longer than they think it should be.

    If it helps, the difference is tiny. A second is 6.5x10^-10 seconds longer. This works out to 56 microseconds per 24 hours. It won’t affect much for a long time. About the only thing affected would be a lunar GPS.



  • An encryption scheme is only as strong as its weakest link. In academic terms, only the algorithm really matters. In the real world however, implementation is as important.

    The human element is an element that has to be considered. Rubber hose cryptanalysis is a tongue and cheek way of acknowledging that. It also matters since some algorithms are better at assisting here. E.g. 1 time key Vs passwords.


  • The purpose is to access the data. This is a bypass attack, rather than a mathematical one. It helps to remember that encryption is rarely used in the abstract. It is used as part of real world security.

    There are actually methods to defend against it. The most effective is a “duress key”. This is the key you give up under duress. It will decrypt an alternative version of the file/drive, as well as potentially triggering additional safeguards. The key point is the attacker won’t know if they have the real files, and there is nothing of interest, or dummy ones.


  • Hiding it would work. You just have to make sure you don’t miss any.

    As for the danger. There are levels of exposure. You could leak something damning, but that could be played off as a 1 off. You might also be sitting on a huge amount of paperwork that proves it’s endemic. That paperwork might also expose others who wanted things changed, but don’t want to be outed. In this case, an initial leak can test the waters. The additional info can be rolled out, if it’s needed, or the results justified.

    E.g. Initial leak proves they did something nasty. The additional info massively backs it up, but also implicates a VP in its gathering. You might not want to show that hand until later, either to protect them, or to gather more info on their reaction.


  • One of the less mentioned aspects is that a dead man switch should be difficult, if not impossible to detect and neutralise. If you are to the level of being unalived, you’re likely also a target for significant directed hacking. Such a dead man switch should be as resistant as possible to this. A simple email could let them detect and disable your dead man switch.


  • I personally make use of the sonoff pow smart plugs, with Tasmota firmware. Though any Tasmota compatible smart plug with power readings will work.

    The key thing is that with Tasmota, you can properly calibrate the readings. I have a friend with a high quality power meter. I used that to calibrate my smart plugs, they seem to track within a few % of the expensive one, once calibrated.

    Depending on if you have access to an expensive meter or not, this will either be the best bet, or completely useless to you. Your local Hackspace might also be a good option for getting your hands on an expensive meter for an evening.


  • The issue is that we used to have both irc and forums. Discord has taken on the role of both in 1. Unfortunately, that means that it also needs the remote search capabilities of a forum to not screw over the community, long term.

    It’s amazing the number of times a 3+ year old discussion on either a forum, or Reddit has bailed me out of a hole. Everything like that on discord is cut off, unless you know it exists.



  • One of the funnier ones is that the matrix actually did hacking right. It was also so quick you don’t notice it.

    When Trinity hacks into the power station, it’s legit. She checks the software version, which shows an out of date version. She then uses a known flaw in that version to reset the password.

    It’s the only bit of actual hacking in the movie. They obviously knew that geeks would be checking it frame by frame, so they actually did their homework on it.