• 0 Posts
  • 57 Comments
Joined 1 year ago
cake
Cake day: July 31st, 2023

help-circle
  • Hello.

    As someone who’s in the space and has been around Qcomm and their deals before.

    It won’t happen.

    They will flirt like you can’t imagine, they will propose, make offers, etc.

    But closing the deal? No.

    They are very smart, and Intel is too big for them to dismantle and exploit with value.

    Their interest is not in Intel belonging to them, but in a large, Intel shaped hole in the market that they can attack, and their discussions are more likely about Intel’s roadmaps so they can understand how they could best exploit Intel’s fall.

    They are unlikely to even hire some of Intel’s spoils, maybe a few strategic VPs, but… they’re just smart and ruthless and Intel is the dregs and bloated nowl.

    The only way they’d do it is if the government sweetened it such that Intel was basically free, and they could fire as many as they want in a reasonable period, basically letting them own Intel without any cost at all. That is possible depending on how desperate the government is to prevent their fall, but I don’t think anyone can make the right promises in time.



  • I can buy all of it, near perfect heating, but 2% for their forced air circulation combined with turbine and generation losses? Seems too good to be true.

    Chatgpt (because we’re all lazy) :

    Total Thermal to Electrical Efficiency

    The overall thermal-to-electrical efficiency of a power plant, often referred to as plant efficiency, is the product of the steam turbine efficiency and the generator efficiency. Typical overall efficiencies for fossil-fuel-based steam turbine power plants (e.g., coal, natural gas) range from 33% to 40%.

    In more advanced configurations like combined cycle power plants, which recover waste heat from the steam turbine exhaust to generate additional electricity, efficiencies can reach 50% to 60%.

    Calculation Example:

    If the steam turbine has an efficiency of 40%, and the generator has an efficiency of 98%, the total thermal-to-electrical efficiency would be:

    \text{Total Efficiency} = 0.40 \times 0.98 = 0.392 \text{ or } 39.2%

    So, for every 100 units of thermal energy input, 39.2 units are converted into electrical energy.

    And that’s if you’re just heating the water before it hits the turbine, including the air circulation and basic entropy (there’s a limit to how much you can pull out via heat differential), it seems like it should go down from there.








  • 2 things:

    1. This seems to be a specific attack for their IM protocol if the entry node was compromised, and could be placed nearby the client. To make this much easier, you’d want to compromise both the entry and exit nodes (in this case exit node is TOR native, so it’s more like internal node).

    This has never been unknown, this is one of the fundamental attack vectors against TOR, the IM protocol seemed to make correlation easier due to its real time nature.

    They added a protection layer called Vanguard, to ensure the internal exit nodes were fixed to reduce the likelihood that you could track a circuit with a small number of compromised internal exit nodes. This seems like it would help due to reducing likelihood of sampling.

    1. TOR has always been vulnerable, the issue is the resources needed are large, and specifically, the more competition for compromising nodes the more secure it is. Basically now the NSA is probably able to compromise most connections, and they wouldn’t announce this and risk their intelligence advantage unless there was an extremely valuable reason. They definitely wouldn’t do so because a drug dealer was trying to make a sale. Telling normal law enforcement basically ends their advantage, so they won’t.

    Other state actors might try, but they’re not in the same league in terms of resources, IIRC there are a LOT of exit nodes in Virginia.

    tl;dr - The protocol is mostly safe, it doesn’t matter if people try to compromise it, the nature of TOR means multiple parties trying to compromise nodes make the network more secure as each faction hides a portion of data from the others, and only by sharing can the network be truly broken. Good luck with that.









  • Have nginx for all my reverse proxies, it wasn’t trivial, but I used it for a lot of other things so it’s fine.

    I back it up manually to encrypted json, it’s not the right way, but I never had much of a proper backup system, other than zfs snapshots and occasionally mirroring to another zfs pool.

    It’s not a lot of extra work once you have the rest of your apps running, it’s fairly low maintenance and mostly just works, but again I haven’t bothered with backups really.

    Edit: Running most if not all my services on freebsd as jails, that might have made it easier.