aaaaaaaarrrrrgh
aaaaaaaarrrrrgh t1_jecos9u wrote
Reply to Russian secret service seizes Wall Street Journal journalist who wrote about Wagner Group by 9lobaldude
Putin visits a school and asks a child: "What's your hobby?"
"I collect newspapers", says the child. "And yours?"
"Almost the same, my dear. I collect newspaper writers."
aaaaaaaarrrrrgh t1_je8r8ji wrote
Reply to ELI5: When a third party app says they offer "end to end encryption," what does that mean? by [deleted]
Any even remotely competently written software will encrypt data when it's sent over the Internet.
A chat app that is not end to end encrypted (E2EE) will encrypt the connection between the app and the server. The server will decrypt the message, then encrypt it again for the recipient, and as a result, it will be able to read it.
If the chat app is end to end encrypted, your phone will first encrypt the message so that only the recipient's phone can read it. Then it will send it to the server (the connection to the server will typically still be encrypted one more time). Now the server can see that you're sending a message and to whom, but it can't see the content.
The hard part is doing it right and making sure you're actually encrypting it to the right recipient. Encryption is usually done with public key encryption systems. A recipient generates two keys, public and private, and gives the public key to everyone. You can use the public key to encrypt a message so it can only be read using the corresponding private key.
But how do you know which public key belongs to the recipient? Usually, you ask the server. The server could instead send you its own public key (pretending that it's the public key of the recipient). Your phone would now encrypt the message using that key. The server could decrypt it, read it, then encrypt it with the recipient's key.
For this reason, apps like Signal let you verify your contact's "safety number" which is the fingerprint of both your and their public keys (if you look closely, one half of your safety number is the same for all your contacts - that's your public key fingerprint!)
By checking this, e.g. if you meet in person, you can be sure that the attack I described above ("man-in-the-middle") is not happening. Some e2ee apps don't do this. This still means the server has to actively mess with the data rather than just reading it, but it's far from perfect.
Even e2ee is no guarantee: for example, a malicious server could send you a software update that just uploads your message history.
WhatsApp and signal use the same encryption, but a) WhatsApp doesn't warn you by default when your contact's key changes (because people lose their phones/reinstall all the time and it confuses people), b) WhatApp pushes really aggressively to back up your chats to the cloud, and once either you or your contact do that, the (already decrypted) messages are backed up to apple/google... (there is some other encryption involved but if someone gets the data from Apple/Google, and a key from Facebook, they can read those backups).
aaaaaaaarrrrrgh t1_j689kkh wrote
Reply to comment by missthingxxx in ELI5: How is caesium-137 used in mining operations? by kitsunesan1029
Wouldn't they just drive the route with a Geiger counter and see where it goes crazy?
https://www.reuters.com/world/asia-pacific/search-underway-radioactive-capsule-missing-australia-2023-01-28/ for context btw
aaaaaaaarrrrrgh t1_j2fmh41 wrote
Reply to comment by nem_erdekel in Switzerland faces record-breaking, balmy New Year's Eve and Day by BezugssystemCH1903
No worries, that's not a problem. People usually don't have air conditioning in Switzerland and Germany.
(The "not a problem" is sarcasm... the power bill won't suck but people will be forced to suffer in the best case and die in the worst case.)
aaaaaaaarrrrrgh t1_j2edgf7 wrote
Reply to ELI5: How web crawlers and other engines don’t constantly get infected with viruses? by Officialsparxx
a) zero day exploits really aren't that common anymore - most viruses require a human to manually start them, just visiting a web site and clicking links won't do it
b) most crawlers aren't actually "looking" at most of the content, so they'd just move around the virus without actually being affected by it
c) any exploit would likely be targeted against common browsers - the environment of the crawler would be different and the exploit/virus likely wouldn't work there, unless specifically targeting the crawler (and targeting the crawler is hard, because unlike the browser, it's not public so you can't easily test your attack)
d) if the operators have any common sense, the crawlers running inside a sandbox, so exploiting the crawler does nothing and the sandbox will be automatically destroyed and recreated from a clean version on a regular basis
e) targeting crawlers specifically would be a dangerous game: due to the sandboxing it's not too valuable, but you're exposing your (valuable) zero day to an environment that could be tightly monitored. If you get caught, your zero day will be fixed and become worthless.
aaaaaaaarrrrrgh t1_j2d9dtc wrote
Reply to comment by AllergicToStabWounds in ELI5: How did we realise the mind is in the brain? by theembryo
Aka: "Poke it with a stick and see what happens".
aaaaaaaarrrrrgh t1_j28hji4 wrote
Reply to comment by HungryExternal9373 in Kyiv residents told to head to air raid shelters as sirens wail across city by redcccp
It confirms that the often-repeated "they're running out of missiles" is questionable even based on Ukrainian data, as a specific example confirming what you said.
aaaaaaaarrrrrgh t1_j28arb1 wrote
Reply to comment by HungryExternal9373 in Kyiv residents told to head to air raid shelters as sirens wail across city by redcccp
I added up the numbers in the Ukrainian (!) claim about Russia's missile shortage and even ignoring the S-300 it added up to something like 1000 missiles (of different types).
aaaaaaaarrrrrgh t1_j1t60jm wrote
Reply to comment by AimHere in TIL the FDA’s Food Defect Action Levels Handbook details the acceptable levels of contaminants of food from sources such as maggots, thrips, insect fragments, “foreign matter”, mold, rodent hairs, and insect and mammalian feces. by anogre8me
I think once it's an official ingredient the limit goes away. See: sesame got listed as an allergen, so companies had to take measures to prevent cross contamination... or intentionally add and declare sesame. https://www.usnews.com/news/health-news/articles/2022-12-22/tough-new-labeling-law-for-sesame-prompts-companies-to-add-it-to-their-products
aaaaaaaarrrrrgh t1_j1li0be wrote
Reply to comment by kaiodan in what Pokémon battle is about to happen here? by MrWest120690
Both animals seem to be afraid of each other and posturing to scare the other off, so I expect this to end with them avoiding each other.
aaaaaaaarrrrrgh t1_iybobyd wrote
Reply to comment by Thalwegs in US bat species devastated by fungus now listed as endangered by zsreport
>The one without mosquitoes
Without all of them, yes.
Without the human biting ones, no. There have been studies. We can wipe those off the face of the earth just fine. The birds etc. can just eat the other mosquito species.
aaaaaaaarrrrrgh t1_iybny8a wrote
Good thing the bats are providing a host for the endangered fungus then!
/s
aaaaaaaarrrrrgh t1_iy4v0el wrote
Reply to comment by A40 in 'Landmark achievement': Rolls-Royce and easyJet hail successful hydrogen jet engine test by Wagamaga
>hydrogen locomotives
Electrification is easier and better
aaaaaaaarrrrrgh t1_iy3zu83 wrote
The record high, even when considering actual numbers, is likely still at or below Western steady-state numbers, but not for long.
aaaaaaaarrrrrgh t1_iuispbl wrote
"Hey Ukraine, I've got something itchy on my Transnistria, can you please scratch it?"
aaaaaaaarrrrrgh t1_iufqqsj wrote
Reply to comment by hblok in Fires from exploding e-bike batteries multiply in NYC — sometimes fatally by zsreport
Store and charge large batteries in places where they're less likely to hurt people if they catch fire. Not always possible, but as far as possible from people in a room without much flammable stuff and a solid door is a good start.
Also, don't fuck around with cheap noname stuff when it comes to batteries and chargers.
aaaaaaaarrrrrgh t1_iucqm2f wrote
Reply to ELI5: Morse code is made up of dots and dashes. How did telegraph operators keep from losing track of where one letter ended and another began? by copperdomebodhi
>so fast it's hard to tell
That's actually part of what makes it work so well. An experienced operator won't think in dots and dashes, just like you don't think of individual lines but whole letters when reading a written text.
aaaaaaaarrrrrgh t1_jegueko wrote
Reply to ELI5: How do large ships parked themselves at docks before invention of tug boats? by crenshawcrane
It is surprisingly easy to move even a relatively heavy ship just by pulling on ropes.
Distance is speed times time. Speed is acceleration times time. Acceleration is force divided by mass. A modest force (let's say 50 kg-force) applied to a large mass (let's say 100 metric tons) for a modest amount of time (let's say 20 seconds), is enough to accelerate the mass to a slow but sufficient speed - in this case, 10 centimeters per second, if you ignore all friction. Then wait a bit, and after 10 seconds, the boat/ship has moved a meter.
Of course, water is low friction, not no friction, so it'll take more force and you'll quickly reach a max speed, but it does work in practice.
This video shows a car doing that with a massive modern ship, but as you can imagine, you can do the same with a couple of strong men pulling on ropes.