Thanks, that’s a bit more meat. Should probably look for their publications.
Thanks, that’s a bit more meat. Should probably look for their publications.
Paywalled.
Latest Nature explains it was not superconductivity.
Thanks, good info. Never had any problems with pfsense or opnsense with Intel server NICs personally. Other than being fried.
I had no problems communicating a higher limit. They are not AWS but you can get 100s of instances.
The Haber-Bosch approach to breaking the nitrogen triple bond takes a lot of energy in terms of high pressure and temperature which is not present in the product, hence wasted. Ammonia is a fertilizer either as gas or as ammonium nitrate, and too precious to burn.
Another random fact: half of the combustion enthalpy present in liquid hydrogen has been spent on its liquification.
Haber-Bosch for fertilizer, Fischer-Tropsch for synfuel.
But, really, we need something with mild conditions and preferably something directly electrosynthesis driven. Large potential for improvement in both.
Happily, I’m abnormal that way. I also dabble in PV DIY. Building houses from scratch, no. Servicing a modern car is also not worth it. Sadly, no open source EVs yet available.
HA for personal MTA is way overkill, just run a second instance with higher MX record value. Antispam is a given, backups are snapshots, maintenance is just system updates. Of course, you could just run an appliance which does it all for you. I’d say it’s way easier than in 1990s.
Email in the 1990s and email in 2020s is the same if you’re running your own MTA.
You just use https. There are extensions like HTTPSEverywhere, but they potentially add bits to your fingerprint. DuckDuckGo also offers their search interface as a hidden service, perhaps worth bookmarking.
Hetzner has been doing it for a while.
The more interesting approach is synmethanol, particularly via electrosynthesis. Only half of energy density of gasoline, and suitable for fuel cells, including DMFCs.
TLAs, LEOs and criminals are both Tor end users and have an interest in attacking Tor users.
Everybody has the resources to run Tor relays and even exits, though the latter can become a massive legal nuisance. Servers are cheap. Read the Tor mailing list archives.
As to ‘mostly used by hackers and pedos’, please provide the evidence. Factual one, not non-sequiturs based on faulty assumptions.
I typically don’t have the time to watch videos but I did in this case. It’s not wrong. The question is: what is your threat model?
First, Tor is not designed to protect you from a global passive adversary nevermind an active one. Global network probes can be used to identify individual sessions by traffic timing correlations. Locating hidden services is quite easy that way, since they’re sitting ducks. It is fairly easy to remotely compromise hidden service marketplaces for TLA players and/or use physical access to hardware and/or operators to make them cooperate with LEOs.
If you are trying to avoid ISP level snooping and blocking, advertisers, Google and national scale actors then Tor is the right tool to use. And by all means, do run your own relays to help the network. The more relays we have, the harder the attack.
I’ve been using it since the early days and ran relays and exits. It’s good for anonymity against your ISP, advertisers and lesser adversaries than being targeted by TLAs. Can be a bit slow. Make sure to use encryption to protect against bad exit nodes.
Evidence for your claims, please.
VPN tunnels don’t magically become transparent when packets pass UK fiber and routers. And legislation doesn’t translate well into which software people are allowed to run, for endpoints in UK. They can try to become North Korea of course, good luck with that.
Lineage OS user. Don’t care.