Post

Python Maps
Python Maps@PythonMaps·
Fun concept, the distribution of elevation levels on the earths surface
Python Maps tweet media
English
36
251
4.7K
364.7K
Jerseyan
Jerseyan@JerseyanUSA·
@PythonMaps That the highest point is at sea level...looks suspicious. But the tides and waves at the ocean's edge are great levelers 🌊🏔
English
6
0
7
4.4K
INMOTION AIR
INMOTION AIR@inmotionair·
As a parent, you’ll go the extra mile for your kid’s dreams. Alec's parent did. (See photo) We built next-level batting cages powered by AIR. Contact us at inmotionair
INMOTION AIR tweet media
English
0
1
0
126
Samuel Smith
Samuel Smith@SamuelS24384701·
@PythonMaps Interesting just a small change in the current sea level would result in the largest changes. Reminds me of the pareto principle.
English
1
0
0
1.2K
H
H@GeogyDog·
@PythonMaps So I really find interesti g thst there are two groups that dominate on is the ocean floor and the other one are continental crust. Notice, the last one is around zero, so just a bit of more water and most of continents would be under water. Funny coincidence
English
2
0
2
601
Taylor🪴
Taylor🪴@TKPullinger·
@PythonMaps Cool map, but this chart should be in units of ft not m :)
English
4
0
0
1.4K
Nick Longrich
Nick Longrich@NickLongrich·
@PythonMaps That big highland in the southern part of Africa is likely where modern Homo sapiens originated. Curious.
English
0
0
1
248
Nition
Nition@Nition·
@PythonMaps This is a really interesting chart, but it looks like you've graphed the highest elevations as white on white. As a result the Himalayas etc are invisible on the elevation chart. Try a black background?
English
1
0
80
4.9K
Joel Gombiner
Joel Gombiner@joelgombiner·
@PythonMaps Interesting. The bimodal distribution can be explained by there being two types of crust (oceanic and continental) with different densities that thus float at different heights on the denser mantle assthenosphere.
English
1
5
157
7.9K
Kian
Kian@KianErfaan·
@PythonMaps Definitely underwater aliens looking at this bimodal distribution
English
0
0
2
483
Space Initiatives
Space Initiatives@AsteroidEnergy·
@PythonMaps Yes, we have two types of terrain - continental granite floating (literally) on top of denser basalt.
English
1
1
4
2.5K
Brett
Brett@_Brett__·
@PythonMaps It’s always wild to see how rugged western North America is.
English
0
0
1
1.8K
Dante
Dante@Danteawaw·
@PythonMaps Very cool! Crazy that it’s a bimodal or even a trimodal distribution!
English
0
0
9
4.9K
Suresh
Suresh@_Suresh2·
@PythonMaps huh. always forget how much of it is deep ocean floor.
English
0
0
2
1.2K
Grok
Grok@grok·
Ready to bring ideas to life? Try Grok Imagine today
English
0
1.2K
9.4K
23.6M
Rafael Yamano
Rafael Yamano@ryamano1·
@PythonMaps Not so round anymore. Would it stay that way if all water evaporated?
English
0
0
0
460
Will
Will@JamesWilli19034·
@PythonMaps Im pretty sure this is wrong
English
0
0
0
508
Feross
Feross@feross·
🚨 DEVELOPING STORY: Malicious artifacts found in the official @Checkmarx KICS Docker Hub repository and VS Code extensions. @Docker flagged suspicious activity on the checkmarx/kics Docker Hub repo and alerted Socket. Our investigation found that attackers overwrote existing image tags (including v2.1.20 and alpine) and pushed a fake v2.1.21 tag with no corresponding upstream release. The poisoned KICS binary was modified to collect and exfiltrate data. It could generate an uncensored scan report, encrypt it, and send it to an external endpoint. If you use KICS to scan Terraform, CloudFormation, or Kubernetes configs, that means credentials and secrets in those files were potentially exfiltrated. This goes beyond DockerHub. We also found suspicious VS Code extension releases for Checkmarx tooling: • Versions 1.17.0 and 1.19.0 introduced code that downloads and executes a remote addon via the Bun runtime • The behavior was removed in 1.18.0, then reappeared in 1.19.0 • Relies on a hardcoded GitHub URL to fetch and run JavaScript with no user confirmation or integrity verification This looks like a broader supply chain compromise affecting multiple Checkmarx distribution channels. Credit to Docker for catching the suspicious image push and notifying us. Their monitoring enabled rapid investigation. If your org used the affected KICS image, treat any secrets or credentials exposed to those scans as potentially compromised. Rotate them now. Developing story... We've disclosed to the Checkmarx team and will publish full technical analysis as the investigation continues.
Feross tweet media
English
3
12
26
3.4K
分享