Sal

joined 4 years ago
MODERATOR OF
[–] Sal@mander.xyz 1 points 2 weeks ago

Since my work involves sensors, I set up a continuous testing setup on a raspberry pi and got its IP whitelisted. I ssh into it when something is annoying to do in the Windows laptop.

[–] Sal@mander.xyz 4 points 2 weeks ago

I'm surviving, and definetly not the fittest.

[–] Sal@mander.xyz 8 points 3 weeks ago

I think that the TinyTapeout concept is super cool (https://tinytapeout.com/). In the past, it was not really feasible to design and manufacture a semiconductor device as a hobbyist... Unless maybe an extremely wealthy one.

Now, we have open source design tools, open process design kit, and the ability but small part of a manufactured wafer.

There are also now multi-project wafer runs for photonic chips at reasonable prices for startup/academia. I think these developments are pretty cool.

[–] Sal@mander.xyz 2 points 3 weeks ago

Thanks a lot for the examples! I have been looking through these, and, as far as I can tell:

  1. In SSL stripping, the site would appear to your client as HTTP, not HTTPS. If that's the case, I think SSL stripping is blocked when using 'HTTPS-Only' mode
  2. For DNS spoofing, the visited site would show up as insecure because they would not be able to generate a valid certificate for the target website

I still have not had the chance to look into leaky metadata. But, generally, I think metadata issues can in part be addressed by not generating much metadata.

Probably the biggest vulnerability is the captive portal. There is no way to verify you’re connecting to an official Starbucks router. I think that when connecting to a public router it is wise to assume that it is malicious.

9
submitted 3 weeks ago* (last edited 3 weeks ago) by Sal@mander.xyz to c/tropical_plants@mander.xyz
 

I think it is a Tillandsia. Possible Tillandsia fasciculata, from a tree in Yucatan.

Camera: Nikon D7500

Lens: SIGMA 105mm

[–] Sal@mander.xyz 3 points 3 weeks ago (2 children)

I'm curious about an example that comes to your mind as you say this. In your view, what is a privacy risk associated with public WiFi use that is not easily mitigated?

[–] Sal@mander.xyz 2 points 1 month ago (4 children)

Cool! Unfortunately it is not visible out of my window, and just saw this right as I am going to sleep... I imagine I would need to travel at least to the edge of the city to maaaybe get to see it, right? Or are these views really possible from within a city?

[–] Sal@mander.xyz 4 points 1 month ago (1 children)

Wow! Never seen this one before. It's amazing!

[–] Sal@mander.xyz 3 points 1 month ago

868 MHz is right

For dBi and directionality, it depends on terrain and goals. In MeshCore you can ask the signal to follow specific router paths, and so you may or may not want an omnidirectional antenna depending on how you want the signal to travel.

Most common antennas that you will find use wither SMA or N connectors. For outdoor use, N connectors are allegedly better in terms of water resistance. If you are making your own enclosure, you can find both SMA-IPEX and N-IPEX connectors with an O-ring which prevent water from entering the hole through which the connector threads come out. The inside of the enclosure is protected equally well for SMA and N, it is just the connector portion which remains exposed, so over months/years the connector may corrode and N-type may last longer. The Heltec T114 is probably shipped out with an SMA-IPEX cable with no O-ring.

I use this one: N-type connector, 8 dBi, omidirectional:

https://nl.aliexpress.com/item/1005007463706065.html

[–] Sal@mander.xyz 0 points 2 months ago
32
submitted 2 months ago* (last edited 2 months ago) by Sal@mander.xyz to c/entomology@mander.xyz
 

Found this Saddleback Caterpillar (Acharia stimulea) in Yucatan, Mexico.

The hairs are allegedly capable of injecting venom with effects that can range from irritation and nausea all the way to severe reactions in rare circumstances. I did not test.

In this image you can see the actual head and eyes protruding from underneath its saddleback costume.

A more common view of this caterpillar is from its back side, where you can see its pretend "scary big eyes" that it uses to scare off some predators.

Here are some other viewpoints:

[–] Sal@mander.xyz 5 points 3 months ago

It depends. In my experience: in an academic laboratory I have been able to use common sense.

For example, gloves go on when working with strong acids/bases. The statement:

gloves apparently only give researchers a false sense of security that can dull the sense of touch and prevent you from recognizing chemical exposure

Does not apply as much when you are working with such corrosive agents, because you really should never be in a position where spilling 4 M HCl into your hands would go unnoticed.

When working with large quantitites of oils, even if non-hazardous, gloves go on and they will probably get oil in them.

When working with cell cultures, the goal is often to not contaminate the cultures. Some people prefer to wash their hands thoroughly and not use gloves, and they have been working at it for many years and they seem to do just fine. It's a risk mitigation strategy - if the cultures have antibiotics and fungicides, risk is already not too high.

In an industry setting it is different. Companies often comply with specific standards and health and safety regulations. While the individual can use common sense, the people in charge of ascertaining compliance (sometimes 'EHS', Environment, health and safety personnel) aren't necessarily chemists themselves, nor should they need to be aware of the identity of the transparent liquid in the flask that you are holding. So, generic rules are often set in place not only because of their practical utility but also to simplify enforcement. In some cases external auditors can come in (announced or not) and verify compliance - this, again is much simpler when the rule is 'lab coat behind yellow line, gloves always on when touching a container with a liquid' than having to interview each person to understand what they were touching without gloves and to understand their philosophy of why they chose to do so.

[–] Sal@mander.xyz 2 points 3 months ago (1 children)

I have experienced issues both over tor and over clearnet. The tor front-end exists on its own server, but it connects to the mander server. So, the server that hosts the front-end via Tor will see the exit node connecting to it, and then the mander server gets the requests via that Tor server. Ultimately some bandwidth is used for both servers because the data travels from mander, to the tor front-end, and then to the exit node. There is also another server that hosts and serves the images.

What I see is not a bandwidth problem, though. It seems like the database queries are the bottleneck. There is a limited number of connections to the database, and some of the queries are complex and use a lot of CPU. It is the intense searching through the database what appears to throttle the website.

 

As my collection of small components grows, it is becoming... messy. And it is not even large yet, I have only done a handful of hobby projects.

Recently I had the realization that I can make use of Chinese 'Sample Books' to keep the smaller reel components well organized. I have ordered 0402, 0603, the 0805, and two empty books to use these as the basis of my organization:

What made me originally select the strategy of keeping the original packaging that the components came and stuffing them into project-specific bags is the labeling. My first attempt at organization was to to use small storage boxes for sorting, but when I tried to keep single labeled components per box I ran out of boxes very quickly... When I mix multiple components in a box (like different photodiodes, for example), then it is difficult to label them separately without using too much space.

I am curious about what methods others use for keeping a component library organized and easy to search.

 

Abstract

Although artificial intelligence enables productivity gains from delegating tasks to machines, it may facilitate the delegation of unethical behaviour. This risk is highly relevant amid the rapid rise of ‘agentic’ artificial intelligence systems. Here we demonstrate this risk by having human principals instruct machine agents to perform tasks with incentives to cheat. Requests for cheating increased when principals could induce machine dishonesty without telling the machine precisely what to do, through supervised learning or high-level goal setting. These effects held whether delegation was voluntary or mandatory. We also examined delegation via natural language to large language models. Although the cheating requests by principals were not always higher for machine agents than for human agents, compliance diverged sharply: machines were far more likely than human agents to carry out fully unethical instructions. This compliance could be curbed, but usually not eliminated, with the injection of prohibitive, task-specific guardrails. Our results highlight ethical risks in the context of increasingly accessible and powerful machine delegation, and suggest design and policy strategies to mitigate them.

 

This brainstorm is motivated by two recent discussions:

When is it time to switch away from youtube?

Lemmy community feedback: Should we fetch and combine comments from cross-posts on the post screen? · Issue #3415 · LemmyNet/lemmy-ui


The conversations about YouTube alternatives and PeerTube’s limitations made me test the current state of Lemmy <--> PeerTube federation.

Federation already works quite well: you can pull in PeerTube channels, subscribe, upvote, and comment from Lemmy.

But I did notice one thing. Take this Techlore video on PeerTube:

https://techlore.tv/w/9a7d20d2-4cc1-4911-8fd7-0794d8fe3bd9

-> On PeerTube: 6 upvotes, 4 comments

I pulled the video into my instance and was able to upvote it from there, so federated voting is working well: https://mander.xyz/post/37959974

I then noticed it had also been cross-posted to lemmy.world: https://lemmy.world/post/35205985

-> On lemmy.world: 37 upvotes, 9 comments

So the cross-post has significantly more engagement than the original video. This highlights a visibility issue: PeerTube creators may be getting more reach than they realize, but that engagement is fragmented across federated posts.


Brainstorm

Would it make sense to allow cross-posting of already-federated PeerTube content without breaking the link to the original object?

Upvotes/likes: These could be funneled back into the original PeerTube video, so creators get a true sense of their reach.

Comments: Less clear. Should all comments be merged into the video thread, or should they remain scoped to the Lemmy community they were posted in?

I don’t think this is “GitHub issue” ready, but it seems worth discussing.

15
submitted 5 months ago* (last edited 5 months ago) by Sal@mander.xyz to c/mander@mander.xyz
 

The instance was updated today to v0.19.13

The official release notes can be found here: https://mander.xyz/post/37685278

The more noticeable frontend changes are:

Frontend

Don’t show edit mark if comment was edited in less than 5 minutes by @jfaustino #3197

Increase bio max length to 1000 chars by @nutomic #3249

Change link from element.io to matrix.org by @nutomic #3250

Remove all caches (fixes #3195) by @Nutomic in #3248

Fixed ordering for search results by @Nutomic in #3219

Add search field to community sidebar by @Nutomic in #3217

Add checkbox for title only search by @Nutomic in #3220

175
The Pager (mander.xyz)
submitted 5 months ago* (last edited 5 months ago) by Sal@mander.xyz to c/privacy@lemmy.ml
 

I decided to purchase a one-way pager, a programmer, and a paging subscription to satisfy my curiosity about pagers.

In this post, I am explaining my thought process and describing some of what I have learned about how pagers work. This is especially relevant to the national paging network in the Netherlands, but hopefully others also find it interesting.

The cellular network

Cellphones give us the ability to reach others and to remain reachable regardless of our location if within a network's coverage. The network infrastructure is continuously evolving in ways that make it more efficient, secure, and reliable.

One way that the network becomes more efficient is by improving its device tracking abilities to reduce the amount of radio broadcasting resources needed to deliver data to the recipient. Security and reliability are improved by having two-way communication between the network and devices such that devices can be authenticated, data correctly encrypted, and message delivery confirmed.

A participant within this network must accept one or more of their device's unique identifiers (at the very least the IMSI, often also the IMEI) is associated with an approximate location.

Since I do not want to accept these terms, I do not carry a phone with a SIM card on me.

A burner phone and an emergency pre-paid SIM card gives me the opportunity to connect to the network in the case that I need to contact someone immediately.

However, this does not give the opportunity to others to reach me in the case that they need me or worry about me. This is not common, but there have been cases in which being reachable would have been good.

LoRa / Meshtastic

Last year I learned about LoRa radios and the Meshtastic network implementation. These devices allow one to send encrypted messages directly between devices. The range is decent, especially if there is a line-of-sight between devices. With Meshtastic it is possible to create a network of nodes that route messages, and to make use of tunnels over the internet to connect nodes that are very far apart.

So far, my favorite use-cases for Meshtastic are communicating with my partner as I approach an area to meet them, communication during festivals/events, and when travelling in a small town or camping.

It is a great tool in some contexts, but I cannot be reliably reached with it.

The Pager

I am currently living in the Netherlands and so what I say is most relevant to the Dutch paging network 'KPN Nationaal 3'. Messages are broadcast using POCSAG 1200 at 172.450 MHz. I know that the situation with paging networks vary across the world, with paging networks being no longer available in many countries, but I don't know the details. It may be that the system here is rather special and unique.

The paging network is considered a legacy broadcasting system. Messages to the network are broadcast by transmitters distributed across the full coverage range. The message that is broadcast contains the RIC (Receiver Identify Code) and the message in plain text.

Anyone with an SDR (Software Defined Radio) device can decode and log all of the unencrypted messages. Here is an example using SDRConnect + multimon-ng:

Using a programming interface, a user can select the RIC codes that they want their network-tuned pager to be responsive to. The pager will beep and display on the screen messages sent to that RIC. In my case, the seller of the pager assigned a new RIC from their pool to me and programmed the pager to listen to it.

A pager does not have a built-in transmitter, and so it does not reveal any information to the network.

A subscription to the paging network works the following way:

  • You get assigned your own 'RIC', which is publicly broadcast with every message
  • You get assigned a private number (0665xxxxxx)
  • While your subscription is active, you send an SMS or an e-mail to a specific address with your private number + message, and the network provider will broadcast it with the RIC as the recipient.

Then, anyone who knows your private number is able to reach a pager listening to your RIC. The public RIC is not enough information to request a message to be sent to you.

Registering to the network has a monthly cost (typical current pricing of 8 € - 20 €) depending on whether you want to be able to recieve text messages, numeric messages, or only make the pager beep. Your identity and banking information are known to the network provider. I was able to register as an individual without needing to provide any company information. I had to fill-in a short form and send it over e-mail with a photo of an ID to register.

So:

  • The network provider knows your identity
  • The service has a monthly cost
  • The unencrypted message content, when they are sent, and the recipient's RIC are public information
  • The network does not confirm delivery
  • Inefficient for the network (all transmitters broadcast every message)
  • Being a legacy system, the network may not remain alive for too long

But:

  • It is possible to reach you at all times without needing to broadcast your location to the network

The pager is a technology that I looked at early on when I started thinking about privacy and I quickly discarded the idea. Giving my identity to a network provider and broadcasting unencrypted messages publicly did not seem logical to me.

Today, I see the value of having a receive-only device that is supported by a network with national coverage. A paging message would contain only enough information for me to know how urgently I need to find a way to communicate - whether I need to activate the burner phone immediately, or whether I can spend some time to go find another way to communicate.

For me, it was a pleasant surprise to discover that this legacy system fills the specific gap of reachability without tracking.

I also recently became aware of the existence of paging networks that rely on volunteer HAM radio operators (like DAPNET), and would like to explore these systems in the future.

 

Abstract

The mid-infrared (MIR) photonics market is rapidly expanding, driven by advancements in fiber-based MIR devices, particularly fiber lasers. However, the lack of robust MIR optical fibers remains a critical barrier to further technological progress. In this work, we present the fabrication of gallate glasses containing tantalum oxide, as it stands, the most robust mid-infrared glasses capable of being easily shaped into large bulk components, fibers or tapers. By introducing up to 20 mol% of tantalum oxide in a gallate glass, we achieve a two-order-of-magnitude improvement in water corrosion resistance, while the nonlinear refractive index increases tenfold compared to silica. Optimal thermal stability is attained at 10 mol% of tantalum oxide, enabling the fabrication of tens-of-meter-long optical fibers. Crucially, the addition of tantalum oxide enhances the gallate glass properties without compromising thermomechanical performance. The potential of these tantalo-gallate glasses is further demonstrated through supercontinuum generation in a laser-inscribed waveguide and a tapered fiber, spanning from the visible to 4.5 μm. This work establishes our developed tantalo-gallate glasses as a compelling alternative for photonic applications seeking robust mid-infrared materials, with the potential to overcome the critical barriers currently limiting the advancement of fiber-based MIR technologies.

 

Abstract

Understanding the radiative decay of exciton-polaritons is essential for achieving long-lived polaritons - a key prerequisite for enhancing nonlinear and quantum polaritonic effects. However, conventional wisdom - the coupled oscillator model - often oversimplifies polariton radiation as independent emissions from uncoupled excitonic and photonic resonances, overlooking the role of strong exciton-photon coupling in reshaping their radiative behavior. In this work, we present a theoretical framework that goes beyond the conventional coupled oscillator model by fully accounting for the collective and coherent nature of exciton-photon interactions. We demonstrate that these interactions can strongly suppress polariton radiation via destructive interference - both within the excitonic ensemble and between excitonic and photonic radiation channels - giving rise to polaritonic bound states in the continuum with infinitely long radiative lifetimes. Our approach offers a unified description of polariton radiative decay and establishes new design principles for engineering long-lived exciton-polaritons with tailored radiation properties, opening new avenues for nonlinear, topological, and quantum polaritonic applications. 
 

Abstract

Optical phase modulation is essential for a wide range of silicon photonic integrated circuits used in communication applications. In this study, an optical phase shifter utilizing photo-elastic effects is proposed, where mechanical stress is induced by electrostatic micro-electro-mechanical systems (MEMS) with actuators arranged in a comb drive configuration. The design incorporates suspended serpentine silicon nitride (SiN) optical waveguides. Through extensive numerical simulations, it is shown that the change in the effective refractive index (neff) of the optical waveguide is a function of the voltage applied to the electrostatic actuators and that such neff tuning can be achieved for a broad range of wavelengths. Implemented within one arm of an unbalanced Mach–Zehnder interferometer (MZI), the phase shifter achieves a phase change of π when the stressed optical path measures 4.7 mm, and the actuators are supplied with 80 V DC and consume almost no power. This results in a half-wave voltage-length product (VπL) of 37.6 V·cm. Comparative analysis with contemporary optical phase shifters highlights the proposed design’s superior power efficiency, compact footprint, and simplified fabrication process, making it a highly efficient component for reconfigurable MEMS-based silicon nitride photonic integrated circuits.

 

Abstract

Animals often sustain injuries, which are susceptible to lethal infections. In social insects, wound care behaviours have evolved to reduce these risks. But the limits of wound care behaviours remain unclear. Here we investigated the wound care behaviours of the ant Camponotus maculatus. Our findings show that amputation of legs infected with Pseudomonas aeruginosa significantly reduced mortality. However, nestmates do not differentiate between infected and sterile injuries, providing similar treatments regardless of infection. Even though we show that early amputation correlates with higher survival rates, nestmates amputate indiscriminately on legs with fresh or old wounds. Additionally, cuticular hydrocarbon profiles differed between ants with infected or sterile wounds only 24 hours post-injury, a timepoint when amputations are no longer effective. We propose that C. maculatus workers perform prophylactic amputations regardless of injury state or age. This is in sharp contrast to previous studies which showed clear capabilities to treat infected wounds differently in ants using antimicrobial compounds. This work therefore shows the limits of wound care behaviours in social insects, allowing us to better understand the evolutionary drivers of this unique behaviour.

 

Abstract

Established by the 1971 United Nations (UN) Convention on Psychotropic Substances, the prohibition of the recreational use of psychedelics (lysergic acid diethylamide [LSD], psilocybin, N,N-dimethyltryptamine [N,N-DMT], and mescaline) has two premises. First, recreational use poses a serious threat to public health because psychedelics are highly liable to addiction and abuse. Second, psychedelics have only limited scientific and medical uses. In this article, we raise the following questions: are these premises true such that prohibition is justified? If not, are decriminalization and legal regulation justified alternatives? Drawing on interdisciplinary research, we show that the premises of prohibition are false. Psychedelics are not highly liable to addiction or abuse, and so recreational use is not a serious threat to public health. Moreover, the uses of psychedelics exceed medical and scientific uses. Prohibition, we conclude, is therefore unjustified. We then show that decriminalization is based on the same false premises as prohibition, that legal regulation is based on weaker versions of these premises, and thus that both alternatives entail unjustified restrictions on recreational users. Finally, we present a fourth approach: communalization. This entails that all adults have the freedom to recreationally use psychedelics without restrictions and that communities provide harm reduction and benefit enhancement services to support this freedom.

For reference, you can find the 1971 UN document here: https://www.unodc.org/pdf/convention_1971_en.pdf

view more: next ›