Areldyb [he/him]

  • 0 Posts
  • 7 Comments
Joined 3 years ago
cake
Cake day: June 19th, 2023

help-circle
  • The article talks a little about it. It’s more of an unwind+rewind cycle:

    The pull from this force then rotates the ground-based drum at a high speed.

    This rotation then generates electricity that can be stored in a battery system for deployment wherever and whenever it is needed.

    After 45 seconds, the kites are levelled up so that the pull from the wind is momentarily minimised.

    This enables the tether to be wound back in, using only a fraction of the electricity generated when it was being spun out.

    The result is a net gain in renewable power at the simple cost of flying a kite.

    Then the cycle is repeated, again and again, potentially for hours on end.

    It makes sense to me. I hope it catches on!






  • If your router isn’t even a Linksys router, then it’s most likely a false positive result and can be safely ignored. If you want to be extra sure, you could attempt to actually exploit the vulnerability with routersploit and see whether you get anywhere.

    In general, the fix for a vulnerability in an end-user network device is some combination of “update the firmware” and “disable the vulnerable feature”.