Hacker News new | past | comments | ask | show | jobs | submit | temp0826's comments login

Been living in the Yucatan the last couple of years. The Mayans believe that cenotes are gateways to the underworld, so it's kinda on point. When people are having bad luck (injuries etc) and there is one nearby, they will pray and make offerings to the spirits that inhabit them. And if that doesn't work they will fire guns into them to scare them away.

I think it was the ancient Greeks(?) that walked while learning the epic poems in order to recite them by recalling their journey, using the associations made on the path they took. I think the method of loci[0] is similar except using purely imagined locations/details ("memory palace").

[0] https://en.wikipedia.org/wiki/Method_of_loci


Shoutout to the excellent podcast The Memory Palace

It's historic stories told well, nothing to do with memory palaces


In India, there is an ancient art called 'avadhAnam'[1][2], where questioners pose various questions to the performer. This performer has to answer questions partially in a verse form, and this can go on for days, if 1000 people are involved. These people have to recite these 1000 verses after everything is over. Performer should not use pen, paper or any recording. These guys memorize many Indian texts that contain verses.

[1] https://en.wikipedia.org/wiki/Avadhanam

[2] https://sampadanandamishra.medium.com/my-journey-with-avadha...


This is probably the minimum you should do. I remember a time when IPMI on (some?) Supermicro boards was really really insecure. From the IPMI client, you could set the encryption mode to "0" ("null encryption" or something, I dunno it's been years)- setting it allowed you to bypass the password completely. Assume if you can touch the IPMI, the system is yours.


IPMI is still a festering cesspool no matter which vendor. Assume that layer 3 access to the IPMI grants you unrestricted persistent code execution on the managed system and design for with it in mind.

Restrict access as tightly as possible. If you only need to power up/down/reset the system and access the serial console most IPMI implementations expose that via SSH. A small SSH proxy that exposes only those features would be a good investment. e.g. `ssh bastion [status|up|down|cycle|reset|console] <server>`. You could probably write it in <100 lines as SSH forced command. Deploy the SSH client to a different VRF (aka network namespace/vnet jail/rdomain) than the SSH server to make it harder to leak traffic from the bastion.


That was Dell iDRAC boards had a bug, where while they asked for a password, they would accept ANY password.

IPMI is like typical IoT, a rarely updated full system with often questionable code quality.

Private VLANs and separate interfaces on dedicated ports is not out of line.

Often shared interfaces with vlan isolation depends on the IPMI honoring that isolation.

By Private VLANs I am talking about RFC 5517 style, a switch level feature where IPMI cannot reach other IPMI interfaces.


Used to work ops at AWS. I don't know if it's still the case but it required VERY HIGH management approval to actually flip any lights on their "status page" (likely it was referenced in some way for SLAs and refunding customers).


That is an excellent illustration to Goodhart's law. We're going to have this avesome status page, but since if we update it the clients would notice the system is down, we're going to put a lot of barriers to putting the actual status on that page.

Also probably a class action suit lurking somewhere in there eventually.


I'd like to imagine this as an early step towards omnidirectional point-to-point links blasting through the planet at each other to replace the need for switching/routing.



The key line there carrying a lot of weight is “…but only if intended for human consumption.”

Market it as “for research only” and that law does not apply.


That is indeed the catch-all to which I refer, yes. From my comment:

> [...] but sellers get around that by saying the substance is for research purposes only and not for human consumption; then you simply consume it anyway.


Fentanyl is schedule 2 (it has recognized medical uses).


Ah good catch, I originally had heroin in my comment and edited it to fent.


There is a pinned post on r/LSD of a chart showing advertised doses vs actual doses, it's a pretty crummy state of things in the wild.


NASA had a mission called AIM (Aeronomy of Ice in the Mesosphere) that observed noctilucent clouds, but it looks like the satellite stopped sending data in March of last year?

https://aim.hamptonu.edu/


It was a bit stronger than just affecting hair-

http://amasci.com/weird/unusual/e-wall.html


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: