There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

askscience

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

davidgro , in After seeing the photo of a hammerhead skull today: Can someone tell me what evolutionary pressure caused it? What is the advantage of the hammerhead skull shape?

Link to post with photo?

thebestaquaman OP ,

I’m on mobile now, so a bit more effort to link, but it’s on c/mildlyinteresting

davidgro ,

Someone else got it. Thank you

bradx3 ,
Razorwire666 , in After seeing the photo of a hammerhead skull today: Can someone tell me what evolutionary pressure caused it? What is the advantage of the hammerhead skull shape?

I believe it’s to spread out the electical sensors they use to detect prey in the sand/mud on the ocean floor.

thebestaquaman OP ,

That doesn’t sound unreasonable. I didn’t know the main diet of hammerheads was found on the ocean floor?

Edit: So according to the article linked by @TokenBoomer you’re partially right, apparently it also makes them more agile, which I guess is good if you’re trying to snatch things as they pop off the ocean floor.

Razorwire666 , in After seeing the photo of a hammerhead skull today: Can someone tell me what evolutionary pressure caused it? What is the advantage of the hammerhead skull shape?

I believe it’s to spread out the electical sensors they use to detect prey in the sand/mud on the ocean floor.

TokenBoomer , in After seeing the photo of a hammerhead skull today: Can someone tell me what evolutionary pressure caused it? What is the advantage of the hammerhead skull shape?

Not a scientist, but I think it was because their main diet is the nail fish./s

thebestaquaman OP ,

When all you have is a hammer…

TokenBoomer ,

Found an answer.

cecilkorik , in Why is technetium so weird?
@cecilkorik@lemmy.ca avatar

Just like there are “islands” of relative stability predicted, there are also some islands of instability where the geometry just won’t line up correctly no matter how you arrange it. Think of an atomic nucleus like a soccer ball – A soccer ball has a specific number of pentagons and hexagons that fit together (almost) perfectly. You can’t make any such shape with hexagons alone. If you have even one too many or one too few, it might still make a mostly spherical shape, but no matter what you do it will have a weird wrinkle, flap, or gap somewhere, and that’s the kind of thing that will cause instability, it won’t balance correctly, it won’t fly true, and if the flaw is big enough eventually the inconsistency will tear it apart.

The patterns of various numbers of two dimensional shapes that can form a seamless sphere is not intuitive or obvious at a glance and the math required to compute it is reasonably complex, but the result is straightforward. Some combinations of shapes work easily for this. Others only work in very specific arrangements. And some simply won’t work at all. The same sort of idea seems to apply to atoms, although we can’t say we completely understand all the nuances of the forces at play, the principles and outcomes are easy to measure. This is of course still an area of significant research and study, because it is important and has implications and potentially applications ranging from deeply obscure astrophysics and cosmology questions to very potent energy technologies that could change our society. But no matter what we discover, our observations of the outcomes are quite consistent and very repeatable, and the atomic patterns that we call Technetium simply don’t stay together very long.

Lots of stuff about patterns that tile or do not tile into regular shapes does not make much intuitive sense, just like prime numbers and irrational numbers do not follow any obvious pattern we can predict, and indeed modern cryptography is dependent on the fact that prime numbers do not follow any particular pattern. Patterns that look like they should be trivial to fit together do not, like intuition might suggest that the square root of 2 should be at least a rational number if not a natural one. And things that look impossible to tile can snap together seamlessly when placed with some careful attention and planning. Technetium is like one of those mathematical or geometrical patterns that looks like it should be trivial but no matter what you do the pieces just will not fit together into any useful shape. At least not for very long.

Some further reading on patterns like Aperiodic Tiling might also be of interest. Lots of fun stuff down such rabbit holes.

AA5B , in if something happened to the black hole at the center of our galaxy, could we know about that problem before it affected us?

Yes, let me lawyer the question ….

We could know about it in only 26,000 years due to the speed of light and gravity waves. However I’m not sure how it would affect us at all …

  • Perhaps there’s a burst of particles going less than the speed of light. We would know about it before those particles got here.
  • Perhaps you mean the disappearance of the strong gravity well at the center might affect us: I imagine any changes to the structure of the galaxy or it’s movement would take much much much longer to affect us
mpa92643 , in Why is technetium so weird?

The short answer is that it’s ultimately down to the number 43 (the number of protons technetium has) and the number of neutrons that could potentially form stable isotopes being atomically weird numbers.

The picture below shows relative stabilities of isotopes of different elements. N represents the number of neutrons, Z represents the number of protons. As a starting rule, moving above or below the N=Z line (creating an excess of protons or an excess of neutrons) tends to decrease overall stability.

https://lemmy.world/pictrs/image/42cd70d5-7547-40ed-a43f-230d074a1fbc.png

You can see for lower atomic numbers, the most stable isotopes closely follow N=Z because protons and neutrons “balance” each other in the nucleus. But as you increase the atomic number (and therefore the number of protons), the protons begin to repel each other more strongly, which means additional neutrons are needed to make the nucleus stable. This is why the “line of stability” (the line of dark red “stable” elements) increases above the N=Z line as you increase the atomic number. Deviation from this line means an atom is less “beta stable” (and therefore more likely to beta-decay).

There are certain “magic” numbers of protons and neutrons that are more stable than others because they comprise a full shell. These occur at 2, 8, 20, 28, 50, 82, and 126. This means nuclei that have (or are very close to) one of these numbers of protons, or neutrons, or protons + neutrons, are inherently more stable. If you look at the other stable isotopes on the graph, you would expect a stable isotope of technetium would need around 55 neutrons to follow the line of stability.

As it turns out, the combinations of 43 protons and 55 (± a few) neutrons just can’t form a stable enough configuration to not beta-decay.

troyunrau , in Why is technetium so weird?
@troyunrau@lemmy.ca avatar

You need to socialize the isotopes with other atoms when they’re young. Otherwise they don’t learn to behave normally. Like dogs. Trust me, I’m a scientician.

Num10ck , in if something happened to the black hole at the center of our galaxy, could we know about that problem before it affected us?

i guess if you had some super crazy distant probe observing the black home and it’s memory bits were quantum entangled with a receiver device near us, we might know instantly-ish? but would need to wait millions of years for that probe to be placed to begin with and hope the systems don’t corrode or corrupt or fail in those millions of years. and what would you do with the info? tell everyone?

Kyle ,

I thought FTL communication is just a fun typical science fiction understanding of quantum entanglement.

I thought we would still have to know what is going on at the probe via another means to know or decode the message sent by the entangled particles to their counterparts on Earth.

Kind of like putting two letters in two envelopes but we don’t know what colour they are, just that they will always be opposite colours. Even the person arranging them doesn’t know which colour they are. We don’t know if a red letter is sent to London or a green one is sent to LA or what colour they’ll be at all. But when we open the letter in London and see that it’s the red one we know the other one in LA is green.

So no matter where or when the person with the red letter is, they’ll always know the other person has the green one once they open the letter. But no information has been mysteriously transported across space and time, just the correlation between the two has been discovered.

TauZero ,

This is correct. FTL communication using any form of quantum entanglement is provably mathematically impossible by the no-communication theorem. Most common sci-fi trope though.

portifornia , in if something happened to the black hole at the center of our galaxy, could we know about that problem before it affected us?

No, as both gravitational and em waves travel at the speed of light, the “we’re all screwed” things we could ever observe would only ever be slowed-down/distorted (by things that could even do such a thing like a black hole) as they approach us.

So it’d be a happy little surprise (short of worm-holes or tachyons existing), on year 26,000.

That’s not too say life as we know it would end immediately. We might make it generations before the real chaos affected us on earth. On a smaller scale, if the sun blipped out of existence, sure, we’re 💯 doomed and we’d know it after 8.3 minutes, but some of us might make it a solid week before all life on earth was expunged 😅.

ghostface , in if something happened to the black hole at the center of our galaxy, could we know about that problem before it affected us?

I can not answer this question, but I suspect, that actual answer is yes and no. Due to the swpc they relay solar storm info to earth before it hits due to sensors.

Webwoupd need yo send probes out further yo.grab that data first

count_of_monte_carlo ,

Any data is sent at or below the speed of light. Solar storms are charged particles (mostly protons) being ejected from the sun and eventually hitting the earth’s magnetic field, causing disruptions in the field (and potentially cool auroras).

Since these storms are just particles traveling from the sun to the earth, they travel slower than light speed, so our distant sensors can warn us in advance at/near the speed of light. This won’t work if the sun were to instantly disappear or change color though, that information would travel at light speed and the probe signals would arrive at the same time.

jmp242 , in if something happened to the black hole at the center of our galaxy, could we know about that problem before it affected us?

I’m pretty sure there’s no way to know about it before … information can’t travel faster than the speed of light.

krayj OP ,

This is what I thought - I just wanted to make sure I hadn’t failed to consider something obvious. Am meeting up with some old friends who are science geeks next month and wanted to throw out the line “for all we know, the center of the galaxy exploded 25,999.9 years ago and we could all die tomorrow” and I didn’t want anyone coming back with “well actually…we would have detected that by now thanks to technology xyz that was in ivented in 20XX”.

clockwork_octopus ,

I totally misread your post as you were meeting up with some old friends who are science geckos and I wanted the story behind all of that, but then I read it again and was disappointed in the lack of geckos.

Enjoy your boring gecko-free meet up.

TauZero ,

If the black hole specifically disappeared, it would have no effect on us. The solar system would not even be launched on a 100 million year trajectory out of the galaxy, as galactic rotation is dependent on the masses of stellar and interstellar matter in the disk and dark matter in the halo. The supermassive galactic black holes, despite being supermassive, still only make up a tiny percentage of total galactic mass.

If you want to wow your friends, tell them about false vacuum decay. We could have bubbles of true vacuum expanding out in space from multiple directions towards us at lightspeed, and no way of knowing about them, stopping them, or outrunning them. Any point in space could nucleate a new true vacuum bubble at any time, just like a given uranium atom could decay now or in 5 billion years or never. Even spookier, by principle of quantum immortality, the Earth could have been engulfed by vacuum bubbles many times before, and we are just the one tiny sliver of probability space where by luck alone we survived long enough to talk about it here and now.

Thankfully false vacuum is just an idea and there is currently no evidence that it is real.

WarmSoda ,

Many worlds is a fun idea, too. But also being regarded as not real for a while now. The cat in a poison box living or dying doesn’t mean it lives and dies.

I never heard about the false vacuum before, that’d be some good sci-fi

madcaesar ,

I was reading this clenching my butt, then got to the last line and unclenched.

Nomad ,

What about gravitational waves? Ligo can detect them and as they send ripples through spacetime they might be faster?

stoicmaverick , in How does a signing a post with a pgp key prove that you are actually the person behind the post?

I am probably at a similar experience level to OP and have wondered the following: is there a commonly used, or agreed upon repository for identity verification with PGP or similar? It would be a useful thing to use, the problem is that if you’re posting something to a public space, not everyone may have access to your public key for verification. Including the key in the message doesn’t seem like it would help much, since someone else could just generate two new keys and still claim to be you without any affiliation. Am I wrong about this? Thanks.

perviouslyiner , (edited )

Key signing parties used to be the thing to do at conferences - imagine a line of people, sheets of paper listing all their key fingerprints, and people showing ID to each other.

PastaGorgonzola ,

If this is some kind of messaging board, you’d probably put your public key in your profile (I assume that since OP is talking about the dark web that the posters there would rather not share their actual identity).

Let’s talk about Alice, Bob and Eve. Alice is an active poster on a dark web forum. She puts her public key on her profile and uses the corresponding private key to sign her messages. If Eve wants to pretend to be Alice, Eve can simply put her own public key on her profile and sign messages with her own private key. But Bob is smart. Rather than just looking at the profile of the poster and copying their key every time, Bob saved it in his key store and assigned it to Alice (possibly even marked it as trusted). When Bob sees a post by Eve, he’ll try to validate it. This validation might succeed (if Bob has access to Eve’s public key), but it will be clear that the message wasn’t signed by Alice’s key.

Of course, this all assumes that Bob has quite some knowledge of how this works and is vigilant enough to perform all these validations correctly.

As for the regular internet, there are some services where you can share your public key: keys.openpgp.org is one of these. Of course, as /u/[email protected] says, there’s still the matter of trust. You need to make sure that the public key you’re using is actually from the right person.

stoicmaverick ,

That’s exactly my point. The gold standard would be a key signing party, but given that humans don’t tend to talk to each other in meat space much these days, it’s more of a rare occurrence than it used to be. I don’t really know what the ideal solution would be that would be a good mix of trust, privacy, and ease of use though.

PastaGorgonzola , in How does a signing a post with a pgp key prove that you are actually the person behind the post?

What you are doing is exporting your key. Your public key is indeed something you can (and should) share as it enables others to verify that you are indeed who you claim to be (or more accurately, that you’re in control of the private key that’s linked to that public key). So while you should share your public key, your private key must remain private.

What these people on the dark web are doing is one step further: they sign their messages with their private key. This creates a cryptographic signature that’s different for each message (changing a single character in the message will generate a wildly different signature). Anyone with the public key can simply copy that message including the signature and validate it. If even a single character of the message was changed, the signature will not be valid. Thus ensuring others that the person who posted the message is indeed in control of the private key.

Signing is different from encrypting: while encryption renders your message totally unreadable to anyone without the correct key, signing doesn’t change the message itself. It simply appends a signature allowing others to check that the message wasn’t tampered with.

dohpaz42 , in How does a signing a post with a pgp key prove that you are actually the person behind the post?
@dohpaz42@lemmy.world avatar

The short answer is no. A bit longer of an answer is that with the public key, anybody can encrypt data. Only the owner(s) of the private key can decrypt the data. That is a key point: encrypted data by itself is meaningless. If you were to attempt to decrypt random data (or change one single character of valid encrypted data), you’d get literal garbage output. But, valid encrypted data and the corresponding private key can always unencrypt back into the original format.

This is why emphasis is always made to never share or expose your private key. Couple the private key with the always-available public key and you’ve got a man-in-the-middle (MitM) attack. This is where an attacker could decrypt the data with the private key, change it, re-encrypt it with the public key, and send it along to the destination without anybody knowing it was altered.

I hope this helps.

Fizz OP ,
@Fizz@lemmy.nz avatar

This and the other comments in the thread help a lot. It’s very cool technology

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • [email protected]
  • lifeLocal
  • goranko
  • All magazines