Skip to content

We Should Immediately Nationalize SpaceX and Starlink

Technology
496 196 1.9k
  • 586 Stimmen
    100 Beiträge
    426 Aufrufe
    B
    No, LCOE is an aggregated sum of all the cash flows, with the proper discount rates applied based on when that cash flow happens, complete with the cost of borrowing (that is, interest) and the changes in prices (that is, inflation). The rates charged to the ratepayers (approved by state PUCs) are going to go up over time, with inflation, but the effect of that on the overall economics will also be blunted by the time value of money and the interest paid on the up-front costs in the meantime. When you have to pay up front for the construction of a power plant, you have to pay interest on those borrowed funds for the entire life cycle, so that steadily increasing prices over time is part of the overall cost modeling.
  • 83 Stimmen
    24 Beiträge
    113 Aufrufe
    C
    I love how they put up the English name after the first outcry of "where do I send the ambulance again" fears.
  • Converting An E-Paper Photo Frame Into Weather Map

    Technology technology
    2
    1
    113 Stimmen
    2 Beiträge
    21 Aufrufe
    indibrony@lemmy.worldI
    Looks like East Anglia has basically disappeared. At least nothing of value was lost
  • 4 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • The Army’s Newest Recruits: Tech Execs From Meta, OpenAI and More

    Technology technology
    9
    26 Stimmen
    9 Beiträge
    54 Aufrufe
    D
    How much you want to bet they will immediately leverage for their profits before military.
  • 8 Stimmen
    3 Beiträge
    26 Aufrufe
    B
    [image: 8978adf5-b473-470c-9f21-62a31e2fbc77.gif]
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • Lapsus$: GTA 6 hacker sentenced to life in hospital prison

    Technology technology
    2
    1
    0 Stimmen
    2 Beiträge
    24 Aufrufe
    A
    From Aurealisa perspective, the leak may have been a momentary distraction, but it had serious consequences for the person behind it. Hopefully, this serves as a lesson to other potential hackers.