There is a lot of love in my group from years of MtG for drafting games, so 7 Wonders and Dune Imperium are consistent favorites. When we have the time, we'll do Twilight Imperium. We've enjoyed all three Nemesis games. We are currently also really enjoying Spirit Island. We've completed Gloomhaven: Jaws of the Lion and put in some serious time with regular Gloomhave as well. As LotR fans, we've also enjoyed the LotR LCG and War of the Ring.
A Technology Connections video recently changed my opinion on this. The land required to power the entire U.S. would be less than the farmland we currently use for ethanol production.
Alec presented it well- but we don't even need to take his word for it.
The Department of Energy has all the data available, so do a dozen different other private and public institutions. It didn't click for me till I ran some napkin math.
Per the article, the issue is with recalled batteries that are going to take 18-24 months to be replaced that won't allow the bus to charge pas 75% or below 41 degrees and because of the risk of fire and lack of suitable fire mitigation equipment, can no longer be charged in garages. Not seeing any mention of an issue with the underlying technology.
It's a double whammy, because at cold temperatures the total capacity of the battery is reduced, and now they're only using 75% of that.
Also, recalls in lithium cobalt batteries are much, much more common than they are with other battery technologies, which is an issue inherent to the specific technology used for those batteries.
Google is hardly betting on it; they are exploring the feasibility of it and are frank about the engineering challenges:
> significant engineering challenges remain, such as thermal management, high-bandwidth ground communications, and on-orbit system reliability.[1]
why do you think this changes what i said? I know it has constraints but the fact is that Google is serious about it. Enough to publicly speak about it many times and invest enormous amounts of R&D.
You are saying they are "hardly betting on it". This is grossly false and I wonder why you would write that? Its clearly a serious bet, with lots of people working on it.
> Google CEO Sundar Pichai says we’re just a decade away from a new normal of extraterrestrial data centers
Its surely a high risk bet but that's how Google has been operating for a while. But why would you say they are hardly betting on it?
As a counter question: do you think Google is not serious about it?
I never said Google wasn't serious; I said they are hardly betting on it relative to their other capital expenditures. Google rightfully describes this as a "moonshot." To date, the only public hardware commitment is two prototype satellites in 2027 for a feasibility study. Compared to the billions pouring into Waymo, DeepMind, and terrestrial data centers, this doesn't yet qualify as an "enormous" financial bet, even if the engineering intent is serious.
Not even a little; doesn’t pass napkin math. It doesn’t solve any problems while adding a litany of new ones: massive radiators for heat rejection, radiation hardening, and enormous launch + repair costs (assuming repairs are even possible). The idea exists to separate investors from their money; the product is the funding round.
I haven't done the actual math and I might be a few orders of magnitude off but shouldn't electrical resistance drop quite significantly in space, too? (Of course there's the other issue that information processing is an inherently dissipative process because entropy etc.)
How would electrical resistance drop in space? If you're thinking "because it's cold" that's actually the biggest issue. The vacuum means you can't dispose of heat easily, so you need giant radiators, which are expensive, heavy, etc.
there's no repair involved. imagine a series of throwaway satellites on an orbit that essentially leaves them close enough together for effective mesh networking, and probably on an orbit that slowly takes them away from earth.
the compute is used for training, not inference. the redundancy and mesh networking means that if any of them die, it is no big deal.
and an orbit that takes them away from earth means they avoid cluttering up earth's orbital field.
It sounds like you're describing Google's proposal, which I believe is at least feasible (though likely uneconomic) unlike, say, Starcloud's. I don't think you are correct about the orbit, though; Google's proposal lists the satellites at 650 km, which would give them approximately 20 years in orbit without boosts. They list estimated life at 5 years given radiation concerns, so they almost certainly would purposely deorbit them earlier.
Based on the comments in the thread, I sense I will be in the minority, but for most consumers this is a reasonable default. Broadly speaking, the threat model most users are concerned with doesn't account for their government. The previous default is no encryption at rest, which doesn't protect from the most common threats, like theft or tampering. With BitLocker on, a new risk for users is created: loss of access to their data because they don't have their recovery key. You are never forced to keep your recovery keys in Microsoft's servers and it's not a default for corporate users.
It's certainly a reasonable default. People lose or have their laptops stolen much more often than they get targeted by their governments.
Though that doesn't mean Microsoft couldn't implement a way of storing these keys so that they can't be accessed by Microsoft. Still better than nothing though.
I'll always remember - when I was first learning about it, one of the interesting counter-arguments to ignoring privacy was "what if the Nazis come back, would you want them to have your data?". I suppose there's some debate these days, but hostile governments seem a lot closer than they were 10-15 years ago.
Will this make people care? Probably not, but you never know.
Even in the best of times. Why widen your attack surface unnecessarily? Do you tell people your passwords and PINs at parties?
What governments and corporations (and plenty of bad actors in the FOSS world) have done is make this the default; made it easy to mindlessly hand people your privacy without even knowing. Opt-out, if you know the setting exists, and can find it.
For password hashing, only short-output or broken hash functions have practical collision concerns. The odds of any random collision with a 256-bit hash, and not with a specific hash, is 50% at 2^128 inputs. Salting is a defense against precomputation attacks like rainbow tables and masking password reuse. Attackers crack password dumps by trying known password combinations, previously compromised passwords, brute force up to a certain length, etc. and using the hashing algorithm to compare the output.
You can check against the API with just the first characters of your hashed password (SHA-1 or NTLM), for example: https://api.pwnedpasswords.com/range/21BD1 or you can download the entire dataset.
It's not a database, it's just files. And they are hosted by Cloudflare so they can cope with a lot of downloads.
I think he should make the files smaller my removing the second half of the hashes, i.e. reduce it from 40 hex digits to 20. This increases the change of a false positive (i.e. I enter my password, it says it was compromised but it wasn't, it just has the same hash as one that did) from 1 in 10^48 to 1 in 10^24 (per password), but that's still a huge number. (There's less than 10^10 people in the world, they only have a few passwords each). This will approximately halve the download, maybe more because the first half of each hash is more compressible (when sorted) the second half is totally random.
> You are being purposefully obtuse here. HIBP is a very, very well established site with a long history of operating in good faith.
Allowing people to query and someone downloading the entire dataset is normally considered abuse, so being blocked is the expectation here. You're so dense you're bending light around you.
I remember when I was searching the file for some passwords my friends and family use, it took me a while to work out that number too. There are some passwords that many people seem to independently come up with and think must be reasonably secure. I suppose they are to the most basic of attacks.
Specifically, it leaks a kernel address inside a security-sensitive structure, which is supposed to be unpredictable / unknowable because the layout of kernel memory is randomized.
If you have another exploit that will write bytes under the attacker’s control to an attacker-supplied kernel address, you will be able to do the Windows equivalent of escalate to root.
reply