Avatar
Ben Eng
0b1e11c0406b6f929dd3c9c21e5a2930527d327912ef6dff13a64ad2d3c6aeea
Applied cosmology toward machine precise solutions to replace humans with autonomous systems in all domains.

I google-searched "holesail peer to peer" and it found nothing relevant. Using brave search found it as the first result along with holepunch-related pages. Looks like Google is down-ranking or censoring this.

Does keet have a directory of rooms for users to find interesting rooms to join?

Windows Task Manager shows two pear-runtime.exe processes doing nothing. After killing them and retrying, a window opened and the user interface appeared. Seems to be working fine now.

When I do `pear run pear://keet` on windows, it just sits there forever making no progress.

Is it supposed to do something???

https://docs.pears.com/guides/getting-started

Bitcoiners want Bitcoin to become the new de facto money. They do NOT want the government to treat Bitcoin as money. Otherwise, financial regulations like KYC/AML and money transmitter licensing will be enforced, which no Bitcoiner should build technology to comply with.

Florida appellate court rules that Bitcoin is money. https://www.klgates.com/Trouble-in-Paradise-Florida-Court-Rules-that-Selling-Bitcoin-is-Money-Transmission-02-13-2019

We anticipate that any form of mixing transactions to hide the parties conducting that transaction from government surveillance is being targeted. Privacy is illegal, apparently.

Replying to Avatar Ben Eng

nostr:npub1kzu0hk2h3tpru7pdj73jk7e6wtx6qas8vy6eh4jkv82zw545py9qu9rf4g the term you are looking for is "embedding" in AI Unchained for inserting a block of content into a context window so that you can submit a prompt to operate on that content.

nostr:npub1kzu0hk2h3tpru7pdj73jk7e6wtx6qas8vy6eh4jkv82zw545py9qu9rf4g the term you are looking for is "embedding" in AI Unchained for inserting a block of content into a context window so that you can submit a prompt to operate on that content.

My internal communication just now.

«Following up on the topic of autonomous operations, AO roughly refers to a service running mostly without human intervention. [MyProduct] can push this envelope further by setting a more ambitious goal. By standardizing the patterns for SOPs and interfaces (workflows, observability), and by formalizing them toward machine precision, we can enable the next generation. It becomes trainable for an LLM. First, gen AI can assist SRE to answer questions. Then, it can do the SRE's job almost completely, once given sufficient agency. That should be our end-point to set a vision that can excite.»

Everyone on Nostr are excited about Blossom Drive. It's a minimalist in every way. Entirely different than what I envisioned as the basis for decentralized storage. Perhaps this basic building block is what we need at the base layer. Torrents above it?

Because of the friction of integrating digital services to fiat payment systems, including PCI-DSS and KYC/AML, the ease of integrating to Lightning might be what pushes Bitcoin into the mainstream. Unleashed.chat is the first service that only accepts Bitcoin/Lightning because of this ease of integration.

I asked Unleashed.chat about what topics I talk about. That is not me. Do I have a doppelganger?

https://files.sovbit.host/media/public/7197c3e0b8008668165cda66dc3eadd2cdd0532175f3a7dfb5d00488e8420ac3.webp

Bookmarking this ep on executive function using the prefrontal cortex for how to evolve toward AGI.

https://open.spotify.com/episode/0c8DWcNAFHioywGxC9rjwN?si=XXGiAMTNQj2UJhW8kIGjSQ

Replying to Avatar Ben Eng

Centralized control through government tyranny, cronyism, and corporate monopolization are the underlying dynamics that must be mitigated through decentralization, but we are falling behind. Foundational technologies are lacking.

First we need identity. Id must be self-sovereign, so that the individual controls their own private keys, sharing them with no one, holding custody securely with unbreakable secrecy. Everything else is built on SSI as a foundation, because we need ownership, privacy, authenticity, integrity, and access control---all dependent on identity.

Next, we need dis-intermediated communication. Individuals need to be able to exchange messages reliably without being tied irreplaceably to a third party. This includes being able to identify, find, and address each other according to their identity.

Over top of p2p comms, we need censorship-resistant apps that are capable of interacting with one's social network. This includes commerce, so Bitcoin for store of value and for payments is a foundational element of the architecture.

For apps and the services that individuals can offer for commerce to be censorship-proof, we need for hosting of logic on compute to be distributed, and we need the data that is processed to be distributed.

Here is the point where the analysis necessarily veers away from the simple explanation that I've tried to stick to, so I'll stop this thread here, and I'll start exploring the details in separate threads as my wandering mind spontaneously gets to them, as I did in this thread.

Expanding on foundational technology for distributed data for decentralized apps, we must recognize the separation of concerns between an app's data versus the user's data.

If someone offers an AI image generator as a service, the app's own data includes the model weights. This is distinct from the end user's preferences, prompts, and generated images. We would want to enable the end user to own his data, so that he can control the access (privacy, sharing) and he can take his data to other services. For data to be as censorship-resistant as identity (SSI), we introduce the concept of self-sovereign data (SSD). The user's data can be scattered and replicated throughout the Internet, served by diverse storage services without any one platform having control over availability. Think of this being enabled by a contemporary bittorrents protocol, because we want to preserve a p2p approach for censorship-resistance.

Through this separation of app data and end user data (SSD), we would design every app to honor this bring your own data (BYOD) approach. This becomes the norm for the future decentralized Internet. Every app must support bring your own identity and bring your own data, so that end users can never be locked in (and rug-pulled) by the service provider.

nostr:nevent1qqsvmj267j9dkpvnluq3u7ehruqrmmtqra9j6g64fhjunpnh6c422jspr3mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmqzyq93uywqgp4kly5a60yuy8j69yc9ylfj0yfw7m0lzwny45knc6hw5qcyqqqqqqgvl5hkm

Centralized control through government tyranny, cronyism, and corporate monopolization are the underlying dynamics that must be mitigated through decentralization, but we are falling behind. Foundational technologies are lacking.

First we need identity. Id must be self-sovereign, so that the individual controls their own private keys, sharing them with no one, holding custody securely with unbreakable secrecy. Everything else is built on SSI as a foundation, because we need ownership, privacy, authenticity, integrity, and access control---all dependent on identity.

Next, we need dis-intermediated communication. Individuals need to be able to exchange messages reliably without being tied irreplaceably to a third party. This includes being able to identify, find, and address each other according to their identity.

Over top of p2p comms, we need censorship-resistant apps that are capable of interacting with one's social network. This includes commerce, so Bitcoin for store of value and for payments is a foundational element of the architecture.

For apps and the services that individuals can offer for commerce to be censorship-proof, we need for hosting of logic on compute to be distributed, and we need the data that is processed to be distributed.

Here is the point where the analysis necessarily veers away from the simple explanation that I've tried to stick to, so I'll stop this thread here, and I'll start exploring the details in separate threads as my wandering mind spontaneously gets to them, as I did in this thread.

The danger of quantum computing growing capable of factoring large numbers is not only that public key cryptography that enables private communications, data privacy, data integrity, and Bitcoin transaction verification. It is that replacing the cryptographic algorithm in Bitcoin would require a hard fork. Once Bitcoin becomes the dominant money, such an event would provide an opportunity to change the rules encoded into the protocol. The enemy class would seek to inject authoritarian controls (KYC, AML, lawful intercept) into the protocol at that opportunity.

This thought arose while listening to this podcast.

https://open.spotify.com/episode/0IIp1LOwQg1pNpiNxTDrUp?si=ws9HStHLQPavQ2T77U08Cw

Replying to Avatar Ben Eng

Listening to this read. nostr:npub1h8nk2346qezka5cpm8jjh3yl5j88pf4ly2ptu7s6uu55wcfqy0wq36rpev, does Bitcoin mining rely on real time availability of Internet access? Or can a block be verified offline and then synced to the block chain periodically (i.e., once per day)?

https://open.spotify.com/episode/2W7MuTETn73GMjJOkCEUES?si=uklow9IhS9qffDS887_ruQ

I'm guessing the 10 min per block rate plus the bandwidth needed for the block size places a constraint on the latency and throughput needed by a miner.