√𝛂𝛋𝛆

  • 2 Posts
  • 55 Comments
Joined 9 months ago
cake
Cake day: July 5th, 2025

help-circle




  • I do the shaky thing too, but I think it is just psychological tbh. At calorie crash levels of no blood sugar during extreme endurance sports, it is totally different. It is like someone straps lead weights all over your body. Everything feels heavy and nearly impossible to move.

    There is probably some kind of dynamic regarding different types of sugar in the system that cause the shakiness.

    Your brain ONLY works on sugars. So calorie crashing, like hitting the wall, is when your body has to start cannibalizing your own muscles for sugar to fuel the brain. I’ve never been anywhere near that level except on a bike after 4+ hours and 60+ miles. You feel like a puddle, and joints are like bending copper wire. There is no shakiness in that state.




  • Anyone can detect any transmitted radio signals. The ARRL books explain how. I’m too lazy to go look at my copy to photograph the section of the physical book in my room. The frequency licensing is totally irrelevant here. That will just be changed and noise will get broadcast over the band. If you keep trying to transmit, someone will find you. You are literally creating a beacon in all directions that points at you. Everyone will be listening, but one by one there will be no one to listen to. This is standard stuff. Every military unit has radio counter measures. You are very limited in real output power already. The big boys will blow you away because they have no such restrictions. It is one of the reasons why there are power limits. Now if you can hide something useful and encrypted near the noise floor, that is one real possibility, but in this age of software defined radio, you are still going to get caught.




  • Meshtastic is still radio just the same. It is a transmitter and will get triangulated, but that is irrelevant to what I said. What I am talking about is how all radio devices you actually use are easily logged. Cell towers are one way, but the device is easy to log more locally. For instance most big retail stores are logging people in the door and their movements. Heck, it has been a few years since the papers about how people can be tracked based on changes and response times within WiFi coverage using standard consumer hardware. It would not surprise me if this is used by some now. The air tags nonsense, that is the same type of thing. The real reason you do not have removable batteries in mobile devices is so that you cannot turn them off. They are never fully off. That is how stuff like air tags still work. Stuff like Intel’s ME, AMD’s PSP, and ARM’s TrustZone are the systems that are used. It is a whole extra operating system running in the background on your hardware. These have a lower root level access to everything on your hardware. It is trivial to log signals from all mobile devices that pass a given point. It may still require some coordination to correlate cellular and video manually but I highly doubt that. In all likelihood, the current generation of hardware is already collecting this data. Look at all the stories of people getting caught a few days after crimes. That was unheard of 2 decades ago. Now it is practically a given. If you are in public and transmitting radio signals now, you are fucked. We would all need to dress up as Tusken Raiders to have any chance at anonymity now.








  • You are better ordering from neither. Amazon group batches their inventory. Their “sellers” appearance is just a price fixing scam. There is no way to trace the stuff Amazon sources to any specific seller. So everything from them is sketchy. The same applies with eBay. Most people are legitimate, but there is no effective way to tell who is or is not legitimate.

    There are two ways of looking at this. One, assuming you will install Graphene, the way Graphene uses the Trusted Protection Module TPM chip is to not trust any unregistered code. So a person will not be able to do much to the device to compromise it as far as I am aware. This is conventional type attacks. The second way is more abstract of what is technically possible but improbable and probably never happens in the wild. For instance, one unlikely aspect to be attacked may involve the modem. I am not certain what the Pixel’s actual architecture involves between the SoC and peripherals. Often, the modem on mobile devices is another sophisticated microcontroller. This is capable and entirely independent compute device. The OS is interfacing with some kind of API, but is not privy to what is actually running on this hardware. If it was eavesdropping and communicating over cellular or WiFi, you would not know about it. These devices are undocumented and proprietary hardware too. The orphan kernel scam used to artificially depreciate hardware is based on the proprietary undocumented SoC and modem.


  • Bikes are anonymous, especially road. No one is watching or paying attention… Part of the problem too, but still. I’ve been through some shit on a bike, but honestly still recommend it 10/10. The odds of you encountering some political refugee with a third grade education and a four page long driving record are nearly zero. You will never learn an area like you will on a bike. I have been all over Orange county and have ridden a lot of Los Angeles, Riverside, and San Diego, all from just starting from home. I know places on a different level than most people, like I know the bike trails, back roads, fire routes, parks, military bases, and all the way down to connections that are not intended like through golf courses, sidewalks and stuff. I know of a bunch of eclectic pastry shops too because I would make them destinations to push up my miles. Like, today I’m going to hit up a Persian place in Tustin, then a French shop in Huntington Beach before heading home for an 80 mile day. It takes awhile to build up that kind of strength, but only around a year. It is the ultimate freedom.