• 0 Posts
  • 41 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle
  • The idea of “posthuman cyborgs” is so fanciful, that I don’t think you are connected enough to reality to even make an accurate judgement on “the possible.”

    We have the technology TODAY, RIGHT NOW to go to mars and make it back. There is no over-arching reason to do such a thing, but there are also no significant technological barriers preventing us from doing it. Human Cyborgs are 100% impossible today, and there are a myriad number of things preventing that kind of development. For example, we cannot today, keep a brain alive for any significant time, outside of it’s existing organic support body. Individual neurons? Sure, but a system of neurons at any comparable complexity as even a simple mouse brain? Nope. On the other-hand we have actually kept people alive in space for over a year, and we only need around 2years to get to mars and back. We also have the capability to send things to mars and bring them back, so combining those two things, and there ya go.
















  • Energy density has been the number one most important factor since humans started using metal. Wood is good enough to smelt bronze, and with some refinement can get your iron, but not good enough for steel. Steel requires coal, and with some refinement steel is what our world is built on.

    Fossil fuels allow cars, planes and more efficient trains and boats. Unless we somehow start utilizing uranium and transuranics electric airplanes are for grifters. Uranium and it’s derivatives are the only thing we have harnessed that even approaches the energy density of fossil fuels.


  • PowerCrazy@lemmy.mltoLinux@lemmy.mlSSH as a sudo replacement
    link
    fedilink
    English
    arrow-up
    26
    ·
    edit-2
    3 months ago

    Seems novel. But from a security aspect, if OpenSSH has security vulnerability that allows an unauthenticated user to login, via whatever means, once you are in the system as a non-privileged user, you are now free to use the same vulnerability to get root.

    Basically this exercise is like using two locks that have the same key to open them. If the same key opens them, then a weakness in one, is now a weakness in the other so why bother with two identical locks?




  • PowerCrazy@lemmy.mltoTechnology@lemmy.mlGaming laptops are being left behind
    link
    fedilink
    English
    arrow-up
    19
    arrow-down
    10
    ·
    3 months ago

    Gaming laptops have always been an extremely expensive but less capable desktop. Their portability is laughable, and pointless. Their battery life is non-existent, and if you can’t easilly move them, and you also have to plug them in all the time, then what does a laptop give you?

    Not to mention their bad keyboards, bad speakers, a touchpad? and compromised screen. Not only should they be left behind, they shouldn’t have existed in the first place.