• 0 Posts
  • 51 Comments
Joined 2 years ago
cake
Cake day: August 2nd, 2023

help-circle



  • I didn’t say it was impossible, I said it was hard. Bigger radiators absorb more heat when exposed to the sun. One of the problems becomes keeping the solar panels exposed to sunlight while keeping the radiators out of it. Putting them behind the solar panels might work, but they have to be smaller than the solar panels and any energy the solar panels don’t convert to electricity will be re-radiated as heat and picked up by the radiators, requiring a larger size. You could put them on the 'back" side of the spacecraft, but that limits the size. As mentioned in another comment, you could position the spacecraft in geostationary orbit on the terminator, but then reaction mass requirements for station keeping and data signal latency go way up. It’s a problem that has been worked around by people much smarter than me, but a lot of work went into figuring it out.


  • Space isn’t cold, it’s nothing. It’s a vacuum and vacuum is terrible at heat transfer by convection. It’s why thermos bottles have a vacuum layer to prevent heat transfer. You can try to lose some heat by radiant cooling, but that’s slow and if you’re using solar for power then any radiators become heat sinks picking up more heat from the sun. Then there’s conduction, and again, there’s really nowhere to conduct any heat to, what with the large distance between objects and the vacuum and all. Thermal management in space is kind of a hard problem.













  • A layered defense is always best. Nothing is 100%, but knowing your threat model will help define how far you have to go and how many layers you want in the way. Defending against State level actors looks different than swatting the constant low effort bot traffic. You’re right, if a bad actor gets root on your machine, all security is forfeit. The goal is to minimize that possibility by keeping applications and packages updated and only allowing necessary connections to the machine. You mentioned wireguard or tail scale. Set that up first. Then set up the host firewall to only allow outbound traffic onto the VPN to the required ports and endpoints on the LAN. If the VPS isn’t hosting any public facing services, disable all traffic except the VPN connection from and to the public Internet both on the cloud provider’s firewall and the host firewall. If it is hosting publicly accessible services then use tools like fail2ban and crowdsec to identify and block problem IPs.