Off-and-on trying out an account over at @[email protected] due to scraping bots bogging down lemmy.today to the point of near-unusability.

  • 59 Posts
  • 1.5K Comments
Joined 2 years ago
cake
Cake day: October 4th, 2023

help-circle
  • New York City is a port city. It has an effectively infinite supply of salt water, which you can use for evaporative cooling, albeit with some extra complications.

    EDIT: Hell, you can use the waste energy from an evaporative cooler to drive a distiller to generate fresh water from some of the evaporated salt water, if you want. Microsoft is doing that combined datacenter-nuclear-power-plant thing. IIRC, if I’m not combining two different cases of an AI datacenter using full output of a power plant, they have the entire output of a nuclear power plant never touching the grid (and thus avoiding any transmission cost overhead and as a bonus, avoiding regulatory requirements attached to transmission and distribution from power generation):

    https://arstechnica.com/ai/2024/09/re-opened-three-mile-island-will-power-ai-data-centers-under-new-deal/

    Re-opened Three Mile Island will power AI data centers under new deal

    Microsoft would claim all of the nuclear plant’s power generation for at least 20 years.

    From past reading, desalination from reverse osmosis has wound up being somewhat cheaper than via using distillation, but combined generation-distillation using waste heat is a thing. IIRC Spain has some company that does combined generation-distillation facilities.

    And in a case like that, you have the waste heat from generation and the waste heat from use all in one spot, so you’ve got a lot of water vapor to condense.

    EDIT2: Yeah, apparently distillation used to be ahead for desalination, but reverse osmosis processes improved, and currently hold the lead:

    https://www.sciencedirect.com/science/article/pii/S1359431124026292

    As desalination is a process of removing dissolved solids such as salts and minerals from water, there are two main types of technology commonly used in the industry: thermal-based and membrane-based [22]. The thermal-based desalination processes, such as multi-stage flash distillation (MSF) and multiple-effect distillation (MED) were once predominantly used in the water sector until membrane-based desalination technology, such as reverse osmosis (RO), matured and offered lower operating costs [23]. Hence, RO is the most used desalination process today, producing between 61 % and 69 % of the total global desalinated water, followed by MSF (between 17 % and 26 %) and MED (between 7 % and 8 %) [9], [16], [19], [20], [24].


  • tal@lemmy.todaytoSelfhosted@lemmy.worldSftp client gor android?
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    2 days ago

    If you can use Termux, you can use the command-line lftp, which supports SFTP; I use this on Linux, so I’m familiar with it.

    $ pkg install lftp
    $ lftp sftp://foo.com
    

    I also use rsync in Termux after being exasperated over the lack of a reasonable F-Droid graphical client for that.

    I wound up using some non-open-source graphical SCP or SFTP client out of the Google Play Store using Aurora Store’s anonymous login at one point, which worked but wasn’t what I wanted to use.







  • The concern is going to be attacks by Iran. One of Iran’s points of leverage is that it sits astride important maritime trade routes, so it can threaten to generally dick up global maritime trade to try to influence countries, and it has done so in this case.

    https://en.wikipedia.org/wiki/Strait_of_Hormuz

    During 2023–2025, 20% of the world’s liquefied natural gas and 25% of seaborne oil trade passed through the strait annually. The strait had never been closed for extended time during Middle East conflicts (unlike the Straits of Tiran/Bab-el-Mandeb)[5] though Iran occasionally had threatened to close the strait,[6][7] and preparations to mine it have been undertaken.[8]

    On 28 February 2026, Iran’s Revolutionary Guards began issuing VHF transmissions stating that ship passages through the Strait of Hormuz were “not allowed”, amid the 2026 Israeli–United States strikes on Iran, including the assassination of Iran’s leader.[9]

    https://www.middleeastmonitor.com/20260301-iran-confirms-attack-on-oil-tanker-for-defying-orders-not-to-cross-strait-of-hormuz/

    Iran confirmed Sunday that it had attacked an oil tanker for defying orders not to cross the strategic Strait of Hormuz, Anadolu reports.

    https://www.usnews.com/news/world/articles/2026-03-05/more-tankers-come-under-attack-as-us-iran-conflict-spreads-in-the-region

    A Bahamas-flagged crude ​oil tanker was targeted by an Iranian remote-controlled boat laden with explosives while anchored near Iraq’s Khor al Zubair port, according to initial assessments. A second tanker at ‌anchor off Kuwait was taking on water and ‌spilling oil after a large explosion on its port side.

    Nine vessels have come under attack since the conflict broke out between the U.S., Israel and Iran on ⁠Saturday. Iran launched ⁠a wave of missiles at Israel early on Thursday and also sent drones into Azerbaijan, injuring ​four people.

    The escalation comes after a motion to halt the U.S. attacks was blocked in Washington and as the son of Iran’s slain supreme leader emerged as a frontrunner to succeed him, suggesting Tehran was not about to buckle under the pressure.

    Around 200 ships, including oil and liquefied natural gas tankers as well as cargo ships, remained at anchor ​in open waters off the coast of major Gulf producers, according to Reuters estimates based on ship-tracking data from the MarineTraffic platform.

    Hundreds of ⁠other vessels ⁠remained outside the Strait of Hormuz ⁠unable to reach ports, shipping ​data showed. The waterway is a key artery for around a fifth of the world’s oil and LNG supply.

    President Donald Trump offered U.S. ​Navy escorts and insurance in a bid ⁠to restart shipping flows and curtail energy prices. Insurance market Lloyd’s of London said on Thursday it is engaging with the U.S. government on a plan.

    My own personal guess is that saying “Chinese owner” or something like that on AIS isn’t going to have much impact, since whatever assessment Iran is doing before going after a ship probably is a little deeper than a quick skim of whatever AIS says, but I suppose that if you’re on a ship and plan to do a run through, you do whatever you can.








  • It wouldn’t be effective, because it’s trivial to bypass. There are many ways one can do a DNS lookup elsewhere and get access to the response, as the information isn’t considered secret. Once you’ve done that, you can reach a host. And any Computer A participating in a DDoS such that Comptuer B can see the traffic from the DDoS has already resolved the domain name anyway.

    It’s sometimes been used as a low-effort way for a network administrator to try to block Web browser users on that network from getting access to content, but it’s a really ineffective mechanism even for that. The only reason that I think it ever showed up is because it’s very easy to deploy in that role. Browsers often use DNS-over-HTTP to an outside server today rather than DNS, so it won’t even affect users of browsers doing that at all.

    In general, if I can go to a website like this:

    https://mxtoolbox.com/DNSLookup.aspx

    And plonk in a hostname to get an IP address, I can then tell my system about that mapping so that it will never go to DNS again. On Linux and most Unixy systems, an easy way to do this would be in /etc/hosts:

    5.78.97.5 lemmy.today
    

    On Windows systems, the hosts file typically lives at C:\\Windows\system32\drivers\etc\hosts

    EDIT: Oh, maybe I misunderstood. You don’t mean as a mechanism to block Computer A from reaching Computer B itself, but just as just a transport mechanism to hand information to routers? Like, have some way to trigger a router to do a DNS lookup for a given IP, the way we do a PTR lookup today to resolve an IP address to a hostname, but obtain blacklist information?

    That’s a thought. I haven’t spent a lot of time on DNSSec, but it must have infrastructure to securely distribute information.

    DNS is public — I don’t know if that would be problematic or not, to expose to the Internet at large the list of blacklists going to a given host. It would mean that it could be easier to troubleshoot problems, since if I can’t reach host X, I can check to see whether it’s because that host has requested that my traffic be blacklisted.




  • I’m not sure I agree with this theory, but you might find it interesting. The idea is that there’s periods of something like 10 to 40 years where things swing liberal, then conservative, then back to liberal.

    https://en.wikipedia.org/wiki/Cyclical_theory

    United States cycles

    These are cycles first identified in the United States or are specific to United States politics.

    Schlesingers’ liberal-conservative cycle

    Historians Arthur M. Schlesinger Sr., Arthur M. Schlesinger Jr. and others have proposed that the United States has an alternation of national moods and tendencies between liberalism and conservatism.[2][3] Each phase has characteristic features, and each phase is self-limiting, eventually generating the other phase. This alternation has repeated itself several times over the history of the United States.

    The Schlesingers proposed that their cycles are “self-generating”, meaning that each kind of phase generates the other kind of phase. This process then repeats, causing cycles. Arthur Schlesinger Jr. speculated on possible reasons for these transitions. He speculated that since liberal phases involve bursts of reform effort, such bursts can be exhausting, and the body politic thus needs the rest of a conservative phase. He also speculated that conservative phases accumulate unsolved social problems, problems that require the efforts of a liberal phase to solve them. He additionally speculated on generational effects, since most of the liberal-conservative phase pairs are roughly 30 years long, roughly the length of a human generation. The Schlesingers’ identified phases end in a conservative period. In a foreword written in 1999, Schlesinger Jr. speculated about why it has lasted unusually long, instead of ending in the early 1990s, from how long previous conservative periods typically lasted. One of his speculations was the continuing Computer Revolution, as disruptive as the earlier Industrial Revolution had been. Another of them was wanting a long rest after major national traumas. The 1860s Civil War and Reconstruction preceded the unusually-long Gilded Age, and the strife of the 1960s likewise preceded the recent unusually-long conservative period.[3]