Skip to content

SpaceX's Starship blows up ahead of 10th test flight

Technology
165 110 4.2k
  • 355 Stimmen
    135 Beiträge
    58 Aufrufe
    S
    Storing power is expensive and many energy storage techniques require a lot of resources to produce. The more we move toward solar generation, the more we should plan on being opportunistic with energy when it is plentiful For example, electrolysis isn't the most efficient way to store power, but if energy is cheap, it may be better on net to do it opportunistically when there's excess energy and use that hydrogen for things like producing artificial butter (and perhaps fuel mobile equipment like forklifts and delivery trucks). Cows aren't particularly efficient at turning biomass into human food. There's a ton of waste in the process, and they need a lot of space. A factory doesn't need to sustain life of an organism, it just needs to turn one set of compounds into another. Maybe it's not there now, but getting it there will be a lot easier than genetically engineering a much better cow.
  • 44 Stimmen
    3 Beiträge
    49 Aufrufe
    I
    Next up: Dos Exploit found in all electric devices in the world! A hacker with physical access can cut the wires.
  • AMD warns of new Meltdown, Spectre-like bugs affecting CPUs

    Technology technology
    9
    1
    198 Stimmen
    9 Beiträge
    118 Aufrufe
    anyoldname3@lemmy.worldA
    This isn't really the same kind of bug. Those bugs made instructions emit the wrong answer, which is obviously really bad, and they're really rare. The bugs in the article make instructions take different amounts of time depending on what else the CPU has done recently, which isn't something anyone would notice except that by asking the kernel to do something and measuring the time to execute affected instructions, an attacker that only had usermode access could learn secrets that should only be available to the kernel.
  • 349 Stimmen
    72 Beiträge
    899 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • 6 Stimmen
    1 Beiträge
    19 Aufrufe
    Niemand hat geantwortet
  • 0 Stimmen
    1 Beiträge
    19 Aufrufe
    Niemand hat geantwortet
  • One-Click RCE in ASUS's Preinstalled Driver Software

    Technology technology
    9
    30 Stimmen
    9 Beiträge
    92 Aufrufe
    M
    Yeah, Lemmy has a VERY large Linux user base, which means Windows discussions tend to get mocked or dismissed. But the reality is that Windows is still the dominant OS for the vast majority of users, by leaps and bounds. Linux runs the world’s infrastructure, but Windows is what the average user boots up every day. “This exploit only works on the average user’s OS. And it only works if the user clicks the “yes” button to escalate permissions, which they have been conditioned to always do without question. Obviously this isn’t an exploit to worry about.”
  • The technology to end traffic deaths exists. Why aren’t we using it?

    Technology technology
    36
    43 Stimmen
    36 Beiträge
    376 Aufrufe
    M
    You’re seriously attempting to argue with me about whether or not transportation existed before cars?