Skip to content

SpaceX's Starship blows up ahead of 10th test flight

Technology
165 110 4.2k
  • 774 Stimmen
    145 Beiträge
    0 Aufrufe
    saik0shinigami@lemmy.saik0.comS
    Forgive me for not covering 100% of this advanced topic in my 3 paragraphs on Lemmy... Nuance gets long, and most people have attention spans of a squirrel. maybe it’s hard to distinguish between google services, but if you play some online game, chat over whatsapp or signal, or have a voip call, that’s an entirely different story. Already covered as That leaves just the raw connection analysis… Where specifics can't be divined... but other details might. these can probably be told apart by DNS requests Addressed already with DNS by default is often plaintext. You can setup your device to use DoH or other encrypted versions of DNS. when having a voip call, through a service that supports peer to peer calls (most do, and it’s default on), an observer may even be able to deduct something about who you are speaking with, like what general area they live at. Actually this is quite unlikely. ASNs are not as structured as you think. It takes an external database that specifically tracks DHCP'd ISP addresses. Case in point, when I moved to my new house... Google maps though I was a good 60 miles away from where I was... it was after repeated access to google maps and other service for about a month before maps started getting accurate with where I'm accessing their service from. And that point is covered with It would take a bunch of external additional data to actually tie you to anything directly, eg server logs or other sources… which usually means more than one party is already working together against you. At that point you’ve got bigger issues usually. then what if you have apps that try to establish connections to services at home. If you purposefully steer your car off the road... of course you're going to crash. If you're going to expose non-encrypted things onto the internet... At that point you’ve got bigger issues usually. I would suspect the untrusted wifi to NOT be the leading thing you'd want to care about in this situation. But even then... I would start making reasonable assumptions such as you're likely on a DHCP connection without static addressing... your site and resources will rotate IPs every once in a while. Makes tracking you even harder. with HTTPS you leak your internal domain names because of TLS SNI. Encrypted SNI (ESNI) / Encrypted Client Hello (ECH) exists... Cloudflare for example supports ECH, and they transit a LOT of data. But once again... would be outside of the scope of discussion here. Yes... an ISP can make an educated guess of where you're likely to be going... and maybe even make a reasonable guess of what you could doing... But certainly not the details of it. And this all ignores the fact that a random coffee shop isn't going to do full packet inspection to get this data to begin with. It's not worth it for them. They gain very little from collecting meta data without some bigger company backing them to do so... Which falls under It would take a bunch of external additional data to actually tie you to anything directly, eg server logs or other sources… which usually means more than one party is already working together against you. At that point you’ve got bigger issues usually. Edit: Typo that changed meaning. Fixed.
  • Japan using generative AI less than other countries

    Technology technology
    95
    378 Stimmen
    95 Beiträge
    1k Aufrufe
    deflated0ne@lemmy.worldD
    That show was so fuckin stupid. But also weirdly wholesome. Nary a jot of creep shit for the whole run. I was genuinely surprised.
  • Ready-made stem cell therapies for pets could be coming

    Technology technology
    1
    1
    27 Stimmen
    1 Beiträge
    19 Aufrufe
    Niemand hat geantwortet
  • A Tech-Backed Influencer Wants to Replace Teachers With AI

    Technology technology
    32
    1
    114 Stimmen
    32 Beiträge
    257 Aufrufe
    sturgist@lemmy.caS
    Heck yeah! Gotta watch that again, thank you kind stranger!
  • 815 Stimmen
    199 Beiträge
    4k Aufrufe
    Z
    It's clear you don't really understand the wider context and how historically hard these tasks have been. I've been doing this for a decade and the fact that these foundational models can be pretrained on unrelated things then jump that generalization gap so easily (within reason) is amazing. You just see the end result of corporate uses in the news, but this technology is used in every aspect of science and life in general (source: I do this for many important applications).
  • 558 Stimmen
    99 Beiträge
    2k Aufrufe
    N
    In this year of 2025? No. But it still is basically setting oneself for failure from the perspective of Graphene, IMO. Like, the strongest protection in the world (assuming Graphene even is, which is quite a tall order statement) is useless if it only works on the mornings of a Tuesday that falls in a prime number day that has a blue moon and where there are no ATP tennis matches going on. Everyone else is, like, living in the real world, and the uniqueness of your scenario is going to go down the drain once your users get presented with a $5 wrench, or even cheaper: a waterboard. Because cops, let alone ICE, are not going to stop to ask you if they can make you more comfortable with your privacy being violated.
  • 18 Stimmen
    18 Beiträge
    147 Aufrufe
    freebooter69@lemmy.caF
    The US courts gave corporations person-hood, AI just around the corner.
  • 248 Stimmen
    232 Beiträge
    2k Aufrufe
    U
    Repair technicians see by far the most of seagate drives