
Riders are not permanently affixed to a bike, so I’m struggling to see how a tuned mass damper could actually be tuned in this case. The very act of lifting off the saddle would briefly change the required tuning, and it’s illogical to tune to just the bike’s resonant frequency when the rider would change that value.
If this were touted as a simple “mass damper”, that might be alright. Though static mass dampers – and tuned mass dampers that are improperly tuned – can exacerbate oscillations under the wrong circumstances.
For more about tuned mass dampers, Practical Engineering just released a video on Nebula available now (and free on YT soon) about liquid mass dampers, which is a type of tuned mass damper.
Setting aside the cryptographic merits (and concerns) of designing your own encryption, can you explain how a URL redirector requiring a key would provide plausible deniability?
The very fact that a key is required – and that there’s an option for adding decoy targets – means that any adversary could guess with reasonable certainty that the sender or recipient of such an obfuscated link does in-fact have something to hide.
And this isn’t something like with encrypted messaging apps where the payload needs to be saved offline and brute-forced later. Rather, an adversary would simply start sniffing the recipient’s network immediately after seeing the obfuscated link pass by in plain text. What their traffic logs would show is the subsequent connection to the real link, and even if that’s something protected with HTTPS – perhaps https://ddosecrets.com/ – then the game is up because the adversary can correctly deduce the destination from only the IP address, without breaking TLS/SSL.
This is almost akin to why encrypted email doesn’t substantially protect the sender: all it takes is someone to do a non-encryted reply-all and the entire email thread is sent in plain text. Use PGP or GPG to encrypt attachments to email if you must, or just use Signal which Just Works ™ for messaging. We need not reinvent the wheel when it’s already been built. But for learning, that’s fine. Just don’t use it in production or ask others to trust it.