Hacker Newsnew | past | comments | ask | show | jobs | submit | agmm's commentslogin

At the present, we don't have enough evidence to be concerned about low-power EM radiation. However, this does not rule out the possibility that in the future, we might find a causal link between that kind of radiation and adverse health outcomes. What we do know at the moment is that this type of radiation can heat tissues. What are the long-term biological consequences of that? We don't really know. My advice: try to minimize your exposure out of caution, but don't get too worried about it.


If you want caution on something WITH a causal link - don’t eat cooked food!


Just to be clear, I don't think that low-power EM radiation poses a health risk. I am just saying that if you are worried about it (like OP is) you can simply reduce your exposure to it. Doing so is relatively easy and has a minimal quality of life impact. As others have mentioned, low-power EM radiation in the frequency range used by cellphones is non-ionizing, so it can't cause cancer or severe health issues in the same way that ionizing radiation can.


My point is that if OP cares about those risks, they'd prioritize other higher risks first, and they'd run out of quality of life long before they got to this one.


I like to use `pbcopy` when exporting public keys to external services like GitHub.

`cat ~/.ssh/mykey.pub | pbcopy`


I love this tool too!

except one time I quickly typed

`cat ~/.ssh/mykey | pbcopy`

And sent it straight away to my coworker on Slack.

I then spent the rest of the day making a new private key and adding my new pubkey to all of the 1000+ servers I had root access to. I mean we had tools to help but it still wasn’t fun.

With great power/convenience comes the potential to do dumb things at lightning speeds!


If you literally have ssh root access to 1000+ servers, using certificates will be more secure and convenient than directly using public key.


put your private key in something like Secretive: https://github.com/maxgoedjen/secretive


Userify would have made that pretty painless (all it really seems to do is update the authorized_keys across all of your servers every minute or so)


also userify allows you to set up sudo access on some of the servers and not others, so that'd take care of the other root-access issue you have. (sudo also provides auditing/logging controls that are useful in a multi-user environment)


I might start naming my private key files ~/.ssh/keyname.PRIVATE after hearing that story...


That's not a bad idea. I've never actually made the same mistake, but I have caught it at the last moment and having tab complete not pick the private one first would help.


It would have avoided it! I was using tab and forgot to select .pub as you correctly surmised. I was a junior dev at the time and all the seniors got a good laugh out of it, and I use it as a cautionary tale about trying to be TOO overeager and efficient.


You can even simplify this further by feeding `pbcopy` the key directly using file redirection instead of a pipe:

`pbcopy < ~/.ssh/mykey.pub`

(I use this all the time myself!)


If π is a normal number, then it contains all possible sequences. However, it is currently unknown whether π is a normal number. I agree with you regarding the fact that this might not be a great compression algorithm, but it is certainly fun.


I became curious about this and went to the book to learn more. The system proposed in the book is capable of radiating around 2.2 x 10^-29 W by rotating a bar weighing 500 tonnes about 270 times per minute.

[1] Source: Kraus, J. D. (1988). Antennas (2nd ed., p. 769). Retrieved from https://ia802907.us.archive.org/8/items/KrausAntennas19882ed...


I just created a little tool to aid in the reverse engineering of the system that generates the URLs for each custom video segment. The filenames of each video are the result of hashing an "options" string plus a pepper value; this tool takes care of the hashing.

Tool: https://agmm.xyz/matrix


       .


I just tried to wipe that off my screen.


Go to the terminal an run "cat my-dream.cpp"


Yes, it is possible to use pf to do that. That is why I mention that it might be a good idea to use the script in conjunction with strict firewall rules.

The script is for disabling the WiFi per se.


A nice reminder


If you find this topic interesting, read "The Big Fat Surprise"


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: