JATtho
@JATtho@lemmy.world
- Comment on IQ Test 3 months ago:
Reading this legend never gets old. 😂
- Comment on Login in from /dev/null 3 months ago:
I was going talk about /dev/null accounts (i.e. the accounts you have long long have forgotten you created) and steer the discussion on this. (But no, psytrance is much more interesting. /s)
- Comment on Login in from /dev/null 3 months ago:
I have already lifted off the ground and exited reality, so it’s knock your self out
- Comment on Login in from /dev/null 3 months ago:
The ektoplazm.com is still up, though with archive mode and a rate-limit. Please clone it. One day I’ll start a process that I’ll not regret, while I/you can.
I have a puny 30GiB slice of it, and it’s the best thing that I have. All for free. Non-pirated.
- Submitted 3 months ago to [deleted] | 7 comments
- Comment on Why we don't have 128-bit CPUs 4 months ago:
Even the newest “64-bit” cpus are really just 48-bit (or 36-bit on low end) or if bleeding edge 56-bit physical adressing processors. This is the maximum amount of virtual memory a process can have access to. You could memory map all your hard disks an still have room to map more physical memory to VMA.
- Comment on To all you outside of the US... 4 months ago:
A dum question: if both candidates are unable to function, then what happens? (Trump for his crimes, Biden for getting dementia…)
Meanwhile in Finland: the Finnish version of “build the wall”:
Parliament’s Administrative Committee will not resume its discussion of the Refoulement Act until after the weekend. The committee is still so far behind schedule that it could not complete its work today. The debate on the bill continued during the committee meeting, which started at 5 p.m. but ended quickly. Peltokangas says there was no drama at the meeting. https://yle.fi/uutiset/lyhyesti/74-20097017
The bill needs 5/6 parliamentary approval and politicians are already sweating over it because it touches too many international treaties + constitution. Debate is mostly: is it ready yet? is it ready yet? is it ready yet? (While the committees checking the bill are getting more uneasy by the bill’s content…)
- Comment on Cubic millimetre of brain mapped in spectacular detail 5 months ago:
But it’s the spaghetti cabling that makes it work and highly robust.
- Comment on rollin' coal 6 months ago:
Especially now that they’ve started releasing tritiated water into the ocean for the next 20-50 years or whatever the fuck the plan is supposed to be.
the tritiated water is no-more concentrated than what other power plants around the world release. (the latter may be surprising to know) In addition, tritium has a half-life of only 12.3 years and is diluted in a literal sea, which is an extremely good radiation shield.
- Comment on [deleted] 6 months ago:
So, now they are slowing (or immediately and forever, I don’t know the time span) injecting propaganda into their clone of wikipedia and they are simultaneously thus admiting they are doing it. (to brainwash the russian citizens)
So lettme repeat: FUCK PUTIN, and stuff your rubber clones in your ass. (which there are many of)
- Comment on Why It Was Almost Impossible to Make the Blue LED 8 months ago:
Gamma rays have so much energy that they are basically emitted only by nuclear processes, as far as I know.
- Comment on Why It Was Almost Impossible to Make the Blue LED 8 months ago:
Maybe not in a flashlight, but the scientific industry would be very pleased with them. Sterilize water and all surfaces in a second? Flash with 200nm light.
- Comment on Why It Was Almost Impossible to Make the Blue LED 8 months ago:
This was an yet another glorious episode from veritasium.
I hope we get well past UVC LEDs. (i.e., shorter wavelengths) UV LEDs are already available. Unfortunately, this progress will stop before X-ray light. With +1 KeV energy, you pretty much must blast off the electrons from the atoms to emit X-rays, which an x-ray tube already does. Or by peeling off a piece of scotch tape.
- Comment on Loaf Bird 10 months ago:
NO.
I watched YT channel that had rescue toucans and they belong to the wild. Every 5mins the owner reminds (and I believed he was/is a good owner) of this fact.
Funniest thing was the velociraptor mode and pure chaos. Saddest thing was seeing them die to health complications, despite the good care.
- Comment on Kaspersky/Securelist researchers detail zero-click iPhone exploit involving four distinct zero-day vulnerabilities, including undocumented hardware features in iPhone chips 10 months ago:
The attack is spread via iMessage. A vulnerable device merely needs to receive a bad message with PDF attachment. --> A Remote code execution. No user interaction.
Yikes. Indeed.
The attack entry point is via bad TrueType font + PDF attachment that only needs to processed once. Once a process touches that, the attack vector begins and exploits are chained until they get kernel mode access. After getting kernel mode access all hope is lost, the attacker owns the device.
Only sliver of hope is that fixing the attack entry point blocks the current attack. And that bug is:
This attachment exploits the remote code execution vulnerability CVE-2023-41990 in the undocumented, Apple-only ADJUST TrueType font instruction. This instruction had existed since the early nineties before a patch removed it.
But unless all the CVEs are patched, it is just matter of time a new attack entry point is found.
- Comment on Kaspersky/Securelist researchers detail zero-click iPhone exploit involving four distinct zero-day vulnerabilities, including undocumented hardware features in iPhone chips 10 months ago:
Shorter version: Operating systems set up hardware locks and protections to confine processes, and once set up, they cannot be undone. (the hardware + OS denies modifications to the security policy)
- Attacker broke out from the app sandbox. (attacker can run code in the infected process)
- Broke out of the process. (gained root access; attacker can run anything)
- Broke into the kernel space (gained 100% control over the hardware)
- Corrupted some kernel memory via a damm magic MMIO accesses nobody knows (hardware vulnerable)
- Bypassed protections that kernel set up earlier such that it cannot accidentally modify itself.
- Finally broke the kernel via hardware exploit thus the attacker got rootkit level access.
Getting arbitrary code execution and root access is one thing, but breaking out from the damm kernel configured hardware protections is insane.
They basically managed to flip a “read-only” switch to “modify-as-much-as-you-like”. The infected device at this point is broken beyond repair, as the firmware(s) may have been tampered with. End result is a terrestrial spy brick.
- Comment on The first EV with a lithium-free sodium battery hits the road in January 10 months ago:
Any new battery technology news needs to be taken with grain of salt. They are highly likely over-hyped and the actually realized products will have more problems than the current established tech initially.
- Comment on IBM demonstrates useful Quantum computing within 133-qubit Heron, announces entry into Quantum-centric supercomputing era 10 months ago:
“traveling salesman problem quantum annealing” produces results on arXiv.org, so the math heads are hard at work. :)
- Comment on IBM demonstrates useful Quantum computing within 133-qubit Heron, announces entry into Quantum-centric supercomputing era 10 months ago:
Quantum computing is going to make it possible to solve problems that normal computers simply cannot do.
Most of these are optimizing problems like “compute the best solution to traveling salesman” or “find a molecule that binds to this receptor”.
On normal computers solving such problems “perfectly” takes^exponential^ amount of computing time vs. the size of the problem.
Quantum computers are going to chop down that exponential thing a little, so we can see the results before the sun burns out. The reason QCs are theoretically able to do this is that each added qubit improves the machines performance exponentially.
However, the qubit state is so fragile that we need hundreds of them to make a single “stable” logical qubit that can do operations repeatedly. What the quantum computer uses as qubit (photons, super-conducting wire) is irrelevant as long as the system can do useful work.
Because of the fragility, the results are gathered using thousands of runs on the quantum machine and measured statistically.
We are not quite there yet to solve any useful sized problems.