Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IR
Posts
0
Comments
316
Joined
2 yr. ago

  • Trying hundreds or thousands of hashes against the servers of random unconsenting people on the internet is beyond what I would be comfortable with. People have been prosecuted for less. It's not the same as a crawler where you try a few well known locations and follow links. You're trying to gain access to a system that somebody did not intend for you to have access to.

    These endpoints probably don't have protection because they were never designed to and it's hard to add it later. Theoretically, if the IDs are random that's probably good enough except that you wouldn't be able to revoke access once somebody had it. The IDs probably aren't random because at some point only the path is used. It's how software evolves. It's not on purpose that somebody may be able to guess the ID to gain access to it.

  • Some microprocessors in deep sleep mode can consume less than 100 microwatts, so I guess it could be possible with this version, but you'd need to charge for a long time. The power consumption of an active ESP32 can reach 700,000 microwatts.

  • 3V at 100 microwatts significantly limits its usefulness.

    They say they're planning to make a 1W version, which I assume will be either be much larger or have a much shorter lifespan. How does it work? Does it have a way to stop the reaction or does the 1W battery generate 1W of heat when there's no load attached?

  • I think in this case whether it's distribution or not would have to go to court. It's not intentended to be distribution. Depending on the judge and the lawyers it could be distribution or not distribution or the prosecution may have committed a crime in finding it.

  • If the server is using a standard path prefix and a standard file layout and is using standard file names it isn't that difficult to find the location of a media file and then from there it would be easier to find bore files, assuming the paths are consistent.

    But even for low entropy strings, long strings are difficult to brute force, and rainbow tables are useless for this use case.

  • There is no year 1 in our current calendar system either. The Gregorian Calendar begins in 1582. The Julian Calendar includes year 1, but changed in year 8, so 0001-01-01 is a slightly different day in the Gregorian Calendar, the Julian Calendar, and the old Julian Calendar. 2000 years after Julian Calendar 0001-01-01 is late December 2000.

    This has less meaning in China because China used its own calendar until 1911. People living in China 2000 years before 2001-01-01 would not have called it year 1.

  • The ones on Amazon are intended to run GPUs for crypto farms, but they're all brands you've never heard of with dubious claims and they've all got at least one review where either the device was defective or something was installed incorrectly and it caused damages.

  • The thought of Japan buying American cars is hilarious. American car companies only care about making oversized trucks and SUVs now. Even in America, if you buy a sedan you are most likely getting an import. In the most popular 25 sedan models in America according Kelly Blue Book, the top 5 are all Japanese and there are only 3 from American brands.

  • Why does that mean it's not signalgate? The name watergate comes from the luxury Watergate hotel in Washington DC where a crime was comitted. Having this conversation on Signal is unquestionably illegal, whether extra people were invited or not, and the scandal is because the conversation being on Signal, not because somebody may have been drunk.