very_well_lost

joined 1 year ago
[–] very_well_lost@lemmy.world 3 points 1 hour ago

This may come as a crazy shock to you, but, hear me out... You can just say stuff sometimes, for fun, without being super serious.

Not everything has to be a thesis, it's also okay to just shoot the shit.

[–] very_well_lost@lemmy.world 3 points 2 hours ago (3 children)

You could say exactly the same thing about anyone who believe this rumor.

[–] very_well_lost@lemmy.world 12 points 3 hours ago (6 children)

I don't think this rumor is true, but the idea of Trump hearing it and getting pissed amuses me so much that I hope it spreads like COVID.

[–] very_well_lost@lemmy.world 4 points 19 hours ago (1 children)

This honestly wouldn't surprise me.

Musk has the ear of the president, and it's not like Trump gives a shit about space. He'll rubber stamp whatever Elon wants when it comes to the launch industry, and I didn't think I have to explain to anyone why cancelling SLS would be good for SpaceX's bottom line.

Frankly, I think 50/50 odds are way too generous. More like 80/20 in favor of SLS being scraped and access to space being fully privatized for a generation.

[–] very_well_lost@lemmy.world 1 points 20 hours ago

It would be funny if his awkward loyalty purge was the thing that ending up kicking off that "deep state coup" he's been raving about for all these years. Self-fulfilling prophecy would be a fitting end for that human cheese burger.

[–] very_well_lost@lemmy.world 6 points 20 hours ago

that Harris, who took Biden's positions wholesale

Except for the instances where she moved further to the right, like on capital gains tax.

[–] very_well_lost@lemmy.world 0 points 21 hours ago

Sadly, yeah... D:

[–] very_well_lost@lemmy.world 10 points 22 hours ago (2 children)

To paraphrase Donald Rumsfeld:

You don't run for president with the voters you want, you run for president with the voters you have.

Stupid or not, these are the voters we have, and Democrats need to learn how to reach at least some of them if they ever want to win another election.

[–] very_well_lost@lemmy.world 18 points 23 hours ago

Hear fucking hear.

[–] very_well_lost@lemmy.world 5 points 1 day ago (1 children)

That's true, but Trump's team is already lobbying the incoming majority leader to call an intentional recess so he can ram through all the appointments he wants without any Senate oversight.

Whether or not that happens remains to be seen, but I wouldn't bet money on the new majority leader standing up to Trump on day one, right after he was elected with a significant mandate and handed full control of the legislative branch to Republicans. More likely, Thune will fold to whatever Trump demands until the the political winds begin to shift and Republicans need to start playing defense for the midterms. At that point we might start to see the Senate push back on Trump's agenda if his approval ratings have gotten are low enough and the Dems have gotten their act together enough to run some decent congressional campaigns.

[–] very_well_lost@lemmy.world 9 points 1 day ago (3 children)

Some Senate Republicans are signaling that they won't vote for him, and it wouldn't surprise me all that much if 4 Rs defect to block his confirmation.

Of course, Trump can and will still force him through as a recess appointment (fitting, giving Gaetz' track record on consent) which will secure him as AG at least until the midterms when the balance of power in the Senate will inevitably shift again.

[–] very_well_lost@lemmy.world 10 points 2 days ago

I saw one the other day painted neon yellow. Believe it or not, it actually seemed like an improvement.

 

A new investigation with NASA’s James Webb Space Telescope into K2-18 b, an exoplanet 8.6 times as massive as Earth, has revealed the presence of carbon-bearing molecules including methane and carbon dioxide. Webb’s discovery adds to recent studies suggesting that K2-18 b could be a Hycean exoplanet, one which has the potential to possess a hydrogen-rich atmosphere and a water ocean-covered surface.

 

Scientists have been working on models of planet formation since before we knew exoplanets existed. Originally guided by the properties of the planets in our Solar System, these models turned out to be remarkably good at also accounting for exoplanets without an equivalent in our Solar System, like super Earths and hot Neptunes. Add in the ability of planets to move around thanks to gravitational interactions, and the properties of exoplanets could usually be accounted for.

Today, a large international team of researchers is announcing the discovery of something our models can't explain. It's roughly Neptune's size but four times more massive. Its density—well above that of iron—is compatible with either the entire planet being almost entirely solid or it having an ocean deep enough to drown entire planets. While the people who discovered it offer a couple of theories for its formation, neither is especially likely.

 

In their jiggles and shakes, red giant stars encode a record of the magnetic fields near their cores.

 

Hundreds of Internet-exposed devices inside solar farms remain unpatched against a critical and actively exploited vulnerability that makes it easy for remote attackers to disrupt operations or gain a foothold inside the facilities.

The devices, sold by Osaka, Japan-based Contec under the brand name SolarView, help people inside solar facilities monitor the amount of power they generate, store, and distribute. Contec says that roughly 30,000 power stations have introduced the devices, which come in various packages based on the size of the operation and the type of equipment it uses.

Searches on Shodan indicate that more than 600 of them are reachable on the open Internet. As problematic as that configuration is, researchers from security firm VulnCheck said Wednesday, more than two-thirds of them have yet to install an update that patches CVE-2022-29303, the tracking designation for a vulnerability with a severity rating of 9.8 out of 10. The flaw stems from the failure to neutralize potentially malicious elements included in user-supplied input, leading to remote attacks that execute malicious commands.

Security firm Palo Alto Networks said last month the flaw was under active exploit by an operator of Mirai, an open source botnet consisting of routers and other so-called Internet of Things devices. The compromise of these devices could cause facilities that use them to lose visibility into their operations, which could result in serious consequences depending on where the vulnerable devices are used.

“The fact that a number of these systems are Internet facing and that the public exploits have been available long enough to get rolled into a Mirai-variant is not a good situation,” VulnCheck researcher Jacob Baines wrote. “As always, organizations should be mindful of which systems appear in their public IP space and track public exploits for systems that they rely on.”

Baines said that the same devices vulnerable to CVE-2022-29303 were also vulnerable to CVE-2023-23333, a newer command-injection vulnerability that also has a severity rating of 9.8. Although there are no known reports of it being actively exploited, exploit code has been publicly available since February.

Incorrect descriptions for both vulnerabilities are one factor involved in the patch failures, Baines said. Both vulnerabilities indicate that SolarView versions 8.00 and 8.10 are patched against CVE-2022-29303 and CVE-2023-293333. In fact, the researcher said, only 8.10 is patched against the threats.

Palo Alto Networks said the exploit activity for CVE-2022-29303 is part of a broad campaign that exploited 22 vulnerabilities in a range of IoT devices in an attempt to spread a Marai variant. The attacks started in March and attempted to use the exploits to install a shell interface that allows devices to be controlled remotely. Once exploited, a device downloads and executes the bot clients that are written for various Linux architectures.

There are indications that the vulnerability was possibly being targeted even earlier. Exploit code has been available since May 2022. This video from the same month shows an attacker searching Shodan for a vulnerable SolarView system and then using the exploit against it.

While there are no indications that attackers are actively exploiting CVE-2023-23333, there are multiple exploits on GitHub.

There’s no guidance on the Contec website about either vulnerability and company representatives didn’t immediately respond to emailed questions. Any organization using one of the affected devices should update as soon as possible. Organizations should also check to see if their devices are exposed to the Internet and, if so, change their configurations to ensure the devices are reachable only on internal networks.

view more: next ›