They are not. Turbine engines require much higher quality manufacturing and tolerances and operate at much higher speeds and pressures. There is more to it than the perceived number of moving parts.
At the application layer you would not see the reordered bytes. However on the network you have IP beneath both UDP and TCP and network hardware is normally free to slice and reorder those IP packages however it wants.
It's not. Routers are expected to be allowed to slice IPv4 packets above 576 bytes. They can't slice IPv6 and they can't slice TCP.
However, malicious middleboxes insert themselves into your TCP connections, terminating a separate TCP connection on each side of the spyware and therefore completely rewriting TCP segment boundaries.
In less common scenarios, the same may be done by non malicious middleboxes - but it's almost always malicious ones. The party that attacked xmpp.is/jabber.ru terminated not only TCP but also TLS and issued itself a Let's Encrypt certificate.
Katee Sackhoff did an interview with Ron Moore on her podcast, and one of the topics they discussed was how they would write the "technobabble" in Star Trek (and BSG). Moore said they would write the script and just say things like "they tech the tech with the tech until it techs" and then fill in the actual technobabble words later!
My go to analogy is that conservatives will underfund the assembly of a car, deliver a car that only has two wheels that are both the wrong size, and then say "See? Cars will never work!"
I think it is amazing that in a country as "exceptional" as the US, the answer to "Why can't we provide affordable and accessible healthcare to everyone?" is "We are going deport liberal scum like you".
Mars isn't happening, at least not on his watch.
reply