Hacker Newsnew | past | comments | ask | show | jobs | submit | walrus01's commentslogin

Grace Hopper is the Nvidia product code name for the chip, much like how Intel cpus were named after rivers, etc

https://www.google.com/search?client=firefox-b-m&q=grace%20h...


It's worth mentioning that the 'culture' you describe is also something that significantly aided and abetted various real estate scams and bubble related activity. Vancouver has all sort of shady shit going on in real estate.


I was hoping for a full text dump of the SMART data from the drives.


If CSPRNG encrypts /dev/urandom, encrypting the data using a binary 256 bit AES cmd to update entropy pool would double contain the data, which is writing /dev/random to /dev/nvme0n1p1.


Everything except independent two way satellite (geostationary VSAT, Oneweb, O3B, Starlink, and Iridium). Which is very costly and rare for regular people to use, and requires a foreign method of USD/CAD/EUR/GBP billing.


What happens if your last name is Cummings and your home address is in Penistone, South Yorkshire, England?

Or perhaps in the quaint fishing town of Dildo, Newfoundland.


Don’t forget about Scunthorpe, Lincolnshire, England!



Yes, there's already Ukrainian fpv flown quadcopters which are optimized to intercept, as a munition, common flying wing camera surveillance platforms. I've seen probably 20 or 30 different videos now taken from the view of the quadcopter, with detonator contact wires sticking out the front, diving into the rear of a large Russian flying wing UAV.


> How do improvised bases offer protection, especially in a world where radar on satellites sees through clouds and certain vegetation?

If operating from an airfield that has been improvised out of a straight stretch of highway, the grouping of vehicles that contain all of the necessary ground support equipment and munitions resupply can be disguised to resemble an ordinary civilian cargo box truck, or tractor trailer combo.

Unless the attacking force is willing to begin with the resources needed, and repercussions of airstriking everything that looks like a civilian cargo truck moving in the region, it would be extremely difficult to eliminate the group of vehicle and men that compromise the ground support equipment element. Particularly when you might have multiple groups of such roaming randomly around an area.


The Swedish airforce doesn't have a "grouping of vehicles".

They are all parked individually at separate locations kilometers away from the road landing strip.

When the plane comes in for landing, they (3-5 pickup trucks and a tiny tanker) all scramble and meet up when the plane touches down. Refuel and rearm in 10 minutes, drive away again.

I've seen this done with my own eyes, it's very impressive.


From an infosec perspective here part of the problem is the many employers' corporation policy on work from home laptops. These laptops were either rigged with one of two things:

A) remote desktop software such as anydesk

Or

B) a kvm over IP device providing a virtual video, keyboard and mouse session to a remote user over html5/tls1.3

If it's option (b), unless this laptop farm operator had in their possession some special DPRK provided unit that identifies its USB manufacturer ID and device ID as something innocuous, this is a problem.

People are not using sufficiently tight endpoint security policies and logging to identify USB devices that identify themselves as kvm over IP bridges. Or just permit listing a certain set of allowed external USB keyboards and mice (company provided).


Its probably B.

And it doesn't have to be some special fancy device. Lots of open source KVM platforms out there let you choose whatever device ID appears for your keyboard and mouse. Here's how to make your PiKVM show up as whatever monitor, keyboard, mouse, cdrom, flash drive, whatever you want.

https://docs.pikvm.org/id/

Unless you're not allowing anyone to use any kind of external monitor and you're not letting anyone use pretty generic and common external keyboard and mice your endpoint software is going to be pretty useless. Even if you give them a mouse and keyboard, all they have to do is tell the remote attackers "its a Logitech MK200 keyboard and mouse" and they can make the PiKVM look like a MK200 keyboard and mouse. Same if you try to limit it to only some specific monitor. EDID data can be easily faked, there's no cryptographic validation of USB device IDs or monitor EDID data at all.


You can bypass (b) pretty easily with a raspberry pi pico identifying as keyboard and mouse.

Change device id to the whitelisted ones.

Then use a hdmi to usb video capture and grab frames from that on the same pico.

That's something very easy to do.

quick cost is 14E, a pico (7E) plus usb to uvc (~7E)


> I wish this article went into more details on what the "National Information Network" is.

It's AS12880, the state owned telecom company which all ISPs are obligated to be downstream of. It operates Iran's international links to other global scale ISPs via Turkey and other paths.

https://www.peeringdb.com/asn/12880

https://bgp.he.net/AS12880

And its also government run counterpart, the "TIC"

https://bgp.he.net/AS49666#_asinfo

https://www.google.com/search?client=firefox-b-d&q=AS12880+i...


I agree on this. Using the pvwatts calculator for a very rough estimate of cumulative kWh produced per *month*, a theoretical 380W panel on top of a car that is in perfect sunshine from sunrise to sunset, never shaded or obstructed, on a car in the sunny climate of San Diego CA will produce the following:

61 kWh per month in the best month of the year (August)

39 kWh per month in the worst month of the year (December)

As you can see from this, the kWh per day is quite minuscule, not enough to charge a car to go any appreciable distance.


I believe that solar panels were an option on the Maybach 62S, and they would run the ventilation fan while you were parked so you wouldn't return to a hot car after going to the store.

Like everyone else has said - there just isn't enough area on the top surfaces of a car to do any noticeable charging.


If you were to theoretically have a perfect 400W PV panel on top of a car, and left in direct sunlight, it might be enough to run a medium sized peltier/TEC cooling unit to somewhat cool down the car while you leave it parked. Or a very small heat pump. Would definitely add a lot of extra cost in manufacturing and complexity.


Or just keep the car fan running and use the existing AC system (in ventilation mode, no compressor) to keep the car just as hot as outside (instead of much hotter). If you have some spare power maybe even run the AC when the key gets back in range.


Using "270Wh/mile" from another comment,

(61kWh/month) / (270Wh/mile) / (31day/month) = 7.3mile/day =~ 11.7km/day

(39kWh/month) / (270Wh/mile) / (31day/month) = 4.7mile/day =~ 7.5km/day

My conmute is like 3 or 7 miles (4 or 11 km), depending on where I have to go.

Anyway, I expect that a rooftop installation is much more efficient.


The rough estimate calculation for the theoretical 39 to 61 kWh per month are for a perfectly mounted, south facing, 15 degree tilted PV panel such as might be on the roof of a warehouse, or in a field somewhere. With no buildings or trees or shade obstructions around it. And perfectly exposed to sunlight from the moment of sunrise all the way to sunset. That's the 'default' assumptions built into pvwatts for calculating a fixed installation PV site.

On an actual car that parks under trees, in parking garages, beside buildings in the shade, etc, the actual production would be much less. Not to mention the panel would be 'flat' on the roof and rarely if ever angled facing south, unless you happened to park on a hill with the roof of the car angled south...

It's also not possible to say that a theoretical 39kWh can be turned into so many miles at 270Wh/mile because it's not a perfectly efficient system, I'd guess at least 15-20% would be lost to heat in charging the battery and DC-DC conversion.


60kWh may be enough for occasional short trips.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: