Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SL
Posts
1
Comments
270
Joined
2 yr. ago

  • Teeth cannot produce enamel. Enamel is not a living tissue and it was produced by cells outside of the tooth in a coral-like manner. In order to grow a new tooth, you need it to be fully surrounded by specialized living tissue for the whole growth cycle.

    PS: I honestly expected something like this to come out of bioelectric computation research, but progress seems slower there. Or rather knowledge and techniques in other fields is reaching critical mass, giving us these advances.

  • I'm not sure if you're calling Putin a stupid man that is easily manipulated or incompetent.

    They are parroting Russian propaganda. The one where “the west” is stipid, cunning, strong, and rotting all at the same time.

  • Permanently Deleted

    Jump
  • Genocide is not a numbers competition. Fucking get lost with that narrative.

    Convention on the Prevention and Punishment of the Crime of Genocide is literally four pages long, with barely 30% fill. It takes less than 10 minutes to read it fully. It takes one minute to get to the part that you directly contradict.

  • If you use HTTPS, the attacker can still see what websites you connect to, they just can't see what you are sending or receiving. So basically they can steal your browsing history, which defeats the purpose of a commercial VPN for many users.

    This is blatantly false. They can see IP addresses and ports of you connect to from IP packets, and hostnames from TLS negotiation phase (and DNS requests if you don’t use custom DNS settings). HTTP data is fully encrypted when using HTTPS.

    If exposing hostnames and IP addresses is dangerous, chances are that establishing a VPN connection is as dangerous.

  • Control of the DHCP server in the victim’s network is required for the attack to work.

    This is not a VPN vulnerability, but a lower level networking setup manipulation that negates naive VPN setups by instructing your OS to send traffic outside of VPN tunnel.

    In conclusion, if your VPN setup doesn’t include routing guards or an indirection layer, ISP controlled routers and public WiFis will make you drop out of the tunnel now that there’s a simple video instruction out there.

  • I mean, Schwarzschild radius shows that for a medium of constant density (and on a large scale, Universe is fairly uniform) there is an upper limit of a radius of a ball comprised of said medium above which it will form an event horizon.

    https://en.wikipedia.org/wiki/Schwarzschild_radius#Calculating_the_maximum_volume_and_radius_possible_given_a_density_before_a_black_hole_forms

    Which means that an infinite universe of non-zero density is either a bloody paradox (spend a minute deciding where exactly event horizons should form and whether there will be gaps), or our understanding of gravity and spacetime breaks on ginormous scales just as it does on micro ones.

    PS: I have seen no physicists talk about this, so there’s a good chance that there’s a simple resolution to the problem and I’m just stupid.