• 0 Posts
  • 113 Comments
Joined 1 year ago
cake
Cake day: June 8th, 2023

help-circle

  • How much (metal, refined, produced on earth) wire would you say is required to produce an air (actually vacuum, but we know air core really well so there’s math for them) core electromagnet which can generate a field capable of deflecting solar wind over the area of its pv array? In order to maintain that field strength, how much current is required? Can it be supplied by a pv array equal in area to the effective field area? How many of those are needed to cover the area of mars?

    That’s-a lotta metal!

    Also speaking as a person who deals with e-waste daily, it’s both by volume and mass composed of petroleum products. Fiberglass is reenforced plastic. Ics are 90% plastic by volume. Discrete components are made of petroleum distillates in a lot of cases and encased in them in even more cases!

    Even if you only considered the boards as the e-waste and not the plastic cases and bodies themselves, those dont exist in a vacuum like our hypothetical electromagnets, a reduction in printer boards means fewer printers which are almost completely just plastic.


  • The scale of what you just described is really goofy.

    It’s also a very delicate shield against a very serious problem.

    I don’t think it’s feasible to protect a mars-diameter disc of massive magnets from damage by either normal objects traveling through the area or from some human engineered attack.

    If you’re imagining the capacity to create such an emplacement, don’t you imagine that such phenomenal effort and wealth of resources would be better spent solving some terrestrial problem?

    There’s a real difference between e-waste, which is mostly byproducts of the petroleum refining process with electronic components smeared liberally on, many of which rely on petroleum byproducts themselves and electromagnets, which are, at the scale you’re discussing, massive chunks of metals refined, shaped and organized into configurations that will create magnetic fields when dc is present.

    I have a hard time imagining a level of focus required to bridge that gap.









  • Yeah only use doh on router, expect per device security otherwise.

    I don’t use nextdns so I don’t know. Some mullvad stuff (like their http proxy!) is only functional when you’re using their vpn, but the doh server works fine without it.

    DNS over https makes a connection with the dns server using the encrypted https protocol. That means that when I want to go to hanksbuttplugemoprium.com my isp doesn’t see the request because it’s encrypted. Normally those requests get passed up the chain in plaintext and that’s a Big Problem.

    Like I said, I don’t know about nextdns, but it seems like it’s built around using dns level blocking.

    The problem with blocking stuff through dns at the router level (like pihole and nextdns and if you’re not careful with what you choose, mullvads doh) is that you might end up stopping normal legitimate internet use. I stopped using pihole and later uhh the one with home in the name for that reason. Shit didn’t work and people wouldn’t tell me when it happened so I couldn’t whitelist stuff.

    If you’re worried about your isp seeing dns requests and cataloging them, selling them or just blocking them and reporting you to the authorities, set up dns over https at the router level.

    What are you trying to accomplish?


  • You can pay for mullvad month to month by sending them five bucks and a piece of paper with your special number written on it in an envelope.

    Might make it more affordable.

    There is one thing you should probably change post haste (see what I did there?): get you one of those polarized privacy screen protectors and stop using biometrics. At least in the us biometrics aren’t protected by laws against unlawful search and compelled speech.


  • bloodfart@lemmy.mltoPrivacy@lemmy.mlHelp setting up Wi-Fi router
    link
    fedilink
    arrow-up
    2
    arrow-down
    3
    ·
    10 days ago

    Brand doesn’t matter. They’re all equally bad.

    There’s two passwords to change: your routers administrator password and your WiFi password.

    There’s mainly one setting to disable, but it’s often broken up into many across several parts of the device’s configuration page: wan administration or access to anything under any circumstances.

    The smart starting point with dns is: dns over https. It’s probably all you need so don’t worry about pihole or other stuff. You mentioned mullvad. Use theirs.

    These recommendations will provide a good baseline for security that doesn’t break the places you want to go on the internet. You could do more on the client side like use a vpn from your computer or configure your browser to use encrypted client hello and never store cookies or cache.


  • Buy unlocked. It’ll cost more and you won’t have the option of doing the carrier/manufacturers no interest payment system, but that’s what it costs to actually not be locked into a particular carrier for the foreseeable future.

    My actual advice about phone choice is to learn the unjailbroken ios way of doing things because what you’re asking for in your post knocks out a lot of the more specific things people recommend on android devices and pushes you to smaller or not privacy focused roms.

    You’re not auditing the code so you need the most eyes on it that you can get so running smaller or less privacy oriented software becomes more of an issue.

    If you haven’t already, make a threat model and see if/how that changes your requirements and desires.


  • You’re correctly assessing the situation but the conclusion you reach is wrong. Here’s how:

    As another person said, just tack on no ethical consumption under capitalism and you’re golden. Soon you’ll be crunching through critiques of Goldman and speaking in ways that make normal ppl make the brotha eww face. But the big difference between just doing my job and just following orders is degrees of separation and situation.

    Even though people in positions you describe at companies you’re talking about ought to be able to understand the connection between their work and the immiseration of all humanity, it’s very easy to imagine someone who through choice or ignorance doesn’t see that connection. Our higher education programs have been removing humanities and arts in favor of stem associated education and ideas like effective altruism are renewing the randian tradition. Further, the work of many people in engineering is partial and atomized. Who wouldn’t want to put in the time designing a hermetically sealed self oiling piston that never needs maintenance over a million cycles? Who wouldn’t refuse that job when shown the patent drawing in which it’s a crucial component of a captive bolt gun against a human head?

    The situation itself can’t be undersold. Soldiers (and hired workers!) on trial for war crimes couldn’t claim they were just following orders because they saw directly what their labor wrought. There was no degree of separation. Our expectations for that closeness to atrocity are different than when there’s a few veils between us and the subject. We expect people to get a different job, to defect, to sabotage, to kill their COs.




  • Why are you doing this?

    If you don’t know why you are trying to get personally identifying information off the internet then you can’t evaluate weather you should trust the third party you’re considering contracting the job to.

    If you don’t know why you’re trying to get personally identifying information off the internet then you can’t even evaluate advice people give you about it.