Avatar
Loki
3628e6a5764cacab310474c9f9c588657989c74b5ef0718c7e6e0e53a2a1f773

I'm tired of activists saying gas, oil and coal are bad for the environment. There is zero AGW and climate change is a meaningless name to distract you.

haha, yeah, lisp is a cool language. I use a lot of functional constructions in my work. But I couldn't live without channels, goroutines and interfaces. Like, I looked at Rust's coroutine implementations. So clunky and unintuitive and difficult to use.

And interfaces are also very rare to find anywhere, the main other one is Java. But I've always thought that this kind of "fat pointer" dynamic type was the most efficient and semantically clean way of doing dynamic typing.

My quibbles with go are mostly quite superficial and unimportant. Like, I disagree with several rules in gofmt, especially one liners for for and if blocks.

But I also very strenuously disagree with the use of variants as return values. It poisons all the RPC APIs with these assumed constructs that omit handling partial error conditions that are not failures, like getting a result, but not being able to query for the latest version, this is a result, with a proviso, an error condition that is not critical. Variants as return values assumes that all error states are critical, which is ridiculous, ever heard of "warnings" lol. I mean, imagine a shell that doesn't print a prompt??

Also, generics, I simply don't see the point of them. I also don't really understand why more easy tools for building generators aren't out there. Well, maybe I just never looked because they were not around before. Scaffolding tools could do this kind of task quite well. I've written simple AST walking code to implement a code block sorter once, that properly associates doc comments in the tree and I think I even got it to retain relative position of unconnected comment blocks to appear above where they were originally found, though often these kinds of comments are grouping a list of things.

For sure, chimps are pretty violent critters. And look at those teeth, they are VERY similar to ours, even down to the midsized canines and bicuspids and the number of molars, good for biting, tearing and grinding.

As regards to violence, hunting is violent, but farming can be peaceful right until the last minutes. And anyway, the animals we routinely eat are highly bred to be dependent on us, keeping them and working them and slaughtering them is literally what they are born for. When they escape into the wild within a few hundred generations they are back to their more wild, self-reliant form.

"braindamaged hipsterlangs" I'm stealing that one. C++ was this when it came out... I remember the hype, even read one of the "woo c++ is so much better than c" books back in the day.

For sure, a substantial number of users of languages wear their affiliation like a badge of tribal membership. I know I feel a little of that myself with Go, but it's because everything that went into Go is also interesting to me, Wirth's Modula and Oberon package model, Newsqueak's CSP concurrency, Plan 9 OS, indeed, and indirectly, that whole thing with Ed Wood's famous movie, and how cute Rob Pike's wife's artwork is (and kinda creepy though also). And I always hated objects, header files, and computers repeating tasks that don't need to be repeated, ie the go build system. Which Rust copied after Go implemented it, btw.

I just figured out how one could make a group blog page using existing Nostr web clients.

You can already log in with an `npub` and get a read-only view of a user's feed. They even can follow themselves.

If it were easy to specify this in a URL construction, ie, make a path for this like the various top level directories used in these web pages URLs, you could then create a link that redirects to it, and the only thing required then is a means to rewrite the URL, possibly some DNS trickery to bind a FQDN to a redirect would also work.

I will probably look into how it can be done in the next day or three. Might not be easy to do. iframes might make it easier, this way there is no need to tamper with redirection.

If there is interconnected relays between them, they will propagate.

Nostr certainly isn't a Partition Resistant distributed system 🕶

Caffeinol!

Caffeine is interesting how it is like this. It makes acetaminophen more potent, and it also makes alcohol give a stronger dopamine kick.

Interestingly, it also is prophylactic against strokes. Something to do with strengthening the breathing and heart signals I think, leading to more oxygen, more CO2 and especially more Nitric Oxide, that one in particular is probably part of the rush of caffeinol.

I'm just plain OUT of the whole alcohol business. Alcohol corrodes masculinity (literally degrades your homone output capacity), it corrodes the digestive system, it makes you lazy and substitutes genuine reward stimuli for a ritual of self-poisoning, it puts you at risk of stroke via gas blockages in fine capillaries that are most dense in the brain (and all erogenous zones), it is a very large amount of calories, plus on top what can't be converted to sugar can persist for days in the blood, like you see after people drink multiple bottles of spirits on NYE and similar, for days afterwards still drunk, don't really sleep, not really awake, and often total loss of long term memory.

And I didn't even mention the problem of Thiamine deficiency, which can literally lead to your hippocampus rotting away, and literal physical holes forming in the middle of the brain. That one I got, a very severe alert sign of that is double vision, which is not like how they depict it in movies, it's literally like when you have misaligned colour layers on printed pictures, and you see the magenta, cyan and yellow layers fringing over top of each other. Makes it really difficult to read text, especially high contrast like on a computer screen.

# Indranet and Use Cases for Wealthy vs Poor Nations

Indranet is a peer to peer, Lighting Network monetised system of network services, primarily relaying between clients and servers, and peers and other peers. It is designed in as generalised and flexible way as possible to be easily adapted by users to fit their purposes.

The use cases for Indra are different for wealthy countries, versus poor ones. The reason being quite simple, only wealthy countries have enough resources to fund extensive, expensive large scale metadata collection systems like the NSA operates on telephone and now primarily internet networks.

## Wealthy Nations Threat Model

The value of an anonymising relay network system like Indra, or Tor, or I2P, in a wealthy country is about defending against the gathering of this information about users by large, state-level malicious actors such as the NSA or CIA, and similar organisations in other wealthy countries.

Thus, the prices, and the services provided by Indra relays in wealthy countries are about eliminating this information asymmetry between well heeled attackers versus the common people that are being attacked via this type of intelligence gathering.

Aside from the purpose of paying to have your network traffic hide end points from such attackers, there is a lesser use case that has not quite so much relevance in a wealthy country, which is in-band payment for access to network infrastructure.

## Poor Nations Threat Model

In poor nations, where corruption is rampant, and malicious actors tend to be physically threatening to their targets, such as organised crime organisations and similar, the problem of the information asymmetry is far less, even, practically nonexistent.

The government's funding base is just not high enough to cover the cost of leaning on network infrastructure providers to allow access to tapping the traffic travelling through trunks and backbones.

The need that is more acute in such regions is leveraging the division of labour to enable community based provision of network access services, and for this use case, and threat model, the bigger problem is in the difficulty in retailing one's surplus network access as a means to an income, and conversely, providing network access for all sorts of purposes, but especially facilitating businesses that make use of digital money via Bitcoin and Lightning Network.

## Indranet Covers the Spectrum of Needs of Rich *and* Poor

Indranet uses prepaid billing and anonymous payments as a spam limiter, a utility that is common to both of the categories covered in the foregoing.

Spam tends to be prevalent anywhere that communication is "free" and "unlimited". Spammers will fill every channel they can with their garbage, so long as the cost of filling the channel is lower than the profit that is generated by this messaging.

Spam cannot be economic when the bandwidth cost is market determined and the cost of messages linearly compounds with the volume. Ultimately, spam is simply a problem any time it is difficult to meter the consumption of network resources.

On the flip side of this, metered access to networks provide also a mechanism to cover the costs of provision of service, and paying a profit to employ people and resources to provide this network service.

Spam, and the unwanted capture of network volume and endpoints are integrated elements of the same problem, which in a wealthy country is more acute due to the relatively low cost of network service.

In poor countries, more often the problem is a lack of access to network service. There is many important ways in which poor people, beset by corrupt, legally protected organised criminals, can share their resources to mutually assist each other in the defence against this kind of attack. The simplest, and most concrete example is a duress alert system, which can notify nearby users of the arrival of malicious individuals who are preying on the poorly defended poor people's resources and indeed their lives.

This need is served when it can be a profitable business for technically minded members of a poor community, to make a living serving their neighbours, as well as enabling the community to have access to this vitally important resource for coordinating community action, especially in the case of predators.

Idk about Tor's PoW. I think that spammers and griefers will have shortcuts. Bonnets would get around it.

Of course open source. Has to be auditable. https://git.indra-labs.org/dev/ind

It's $PATH not $path

I dunno shit about zsh builtins tho... Surely not divergent from sh/ash/csh/bash by *that* much... I remember fish has some rather odd syntax too...

My suggestion is go back to bash :)

GN

Way too late, but I just needed to express my ergodicity theory of randomness so here I am.

😂🤣😭😩😊

Ergodicity is the property of a system in which within a given average time, a system visits all possible states.

A simple example is in a sealed container of some kind of gas. Depending on temperature, the locations of all particles inside will fill the space pretty quickly.

When the energy in an ergodic system is low, a snapshot of a given state of the system, assuming you can capture the velocity and direction of the state changes, you can probably model it faster than it iterates.

Think of a tube with a rubber ball inside, in micro or zero gravity. A modern computer could tell you the final resting state from only the initial impulse given to the system.

If the systems ergodicity is too high, that is, you cannot measure it precisely enough in time and/or space to catch one average cycle, then you have a system that would be said to be unpredictable, like the Poisson point process of radioactive decay, or the finding of a valid bitcoin block.

Think of a transparent ball, with a dice inside it.

If you gently roll it, you can predictably flip it to one of its 5 other states by rolling the ball until the center of gravity and friction of it's current position is overcome and the state change is both orderly and predictable.

But if you roll the ball too fast, or shake it, even just one sharp punt, the cube could run through every possible state (face perpendicular to the ball's inner surface) so fast it can't be captured in a definite state by a 60fps camera, then we certainly could not predict the motion that will result, and certainly not the final resting state after the system dissipates it's imbued inertia.

The emission of alpha and beta particles by Schroedinger's Cat Murdering Box radioactive atom is from a Poisson point process, which in this case means that because we can't know when this atom was born, we don't have the first clue when it might, on average, decay and emit.

The decay process is random because outside influences add, and subtract, to and from the energy threshold required to topple the structure that holds the particle in orbit. It ergodicity might be low, but it's state change probability is a black box.

The ball with cube, it also becomes a random event when enough energy is added, like the origami-metal spring of the Scrabble enclosed dice, even given accurate measure of initial inputs, if they are high enough, again our camera, and thus prediction computer, cannot beat the system to it's final state.

There is some differences between these things, but both of them hinge on the energy levels, and capturing the moment of impulse, and specifically, being able to sample the data fast enough to get both position and velocity at the same time.

So, Schroedinger's Cat is about an ergodic system that we don't have the starting moment when the energy was added, so we can't possibly predict when it will decay, not to mention it's lability to external energies.

The dice, it just moves to fast to capture that impulse as both direction and speed, and thus it is "random"

Random just means the systems state is too fast, too energetic, and in the former case, of unknown progression towards completing a cycle of ergodicity.

The quantum superposition idea is as retarded as the child who thinks their mother has disappeared when they cover their eyes, or like the bug Blatter beast of kraal and using one's towel as a blindfold, thinking you can't see them and thus they don't have to attack.

In my opinion.

Because it is precisely rejecting the very premise of science - that given sufficiently precise preconditions, a phenomena can be caused to occur on demand.

This premise is ancient. This premise long precedes our species, because you can see corvids, almost anywhere on the planet, using tools and rituals to get predictable results, like dropping nuts onto rocks to crack them open. They have been doing it since long before our debut as a species.

No. Schroedinger's Cat does not demonstrate that the system is impossibly random. Just that nothing can be predicted without sufficient precision of the state and inputs altering the state.

My father used to say to me that it is impossible to measure something precisely without a smaller thing composing the structure of the sensor. As in, you can't catch a photon or electron, as nothing inert exists that is smaller.

My father was no kind of scientist, but like me he was curious to learn, and was not blinkered by convention, and like all theists, just don't buy the wibbly wobbly quantum model.

Einstein also rejected much of the quantum model, and funny enough another quantum doubter was Lewis Carrol, who was also, like me and my dad, and Einstein, polymaths. Capable of relating multiple complex models to each other.

It's not that much of quantum physics is wrong. On the contrary. It's models produce accurate predictions.

But it's not spooky parallel universes and superposition of these spooks. It's just probability, and the much later developed field of chaos theory, which is basically mathematical, deterministic feedback equations that rapidly diverge from immeasurable differences of starting inputs.

And there is another principle to mention, that being Nyquist's digital sampling theory. In order to reproduce a signal, you must capture at least 2x the precision of the required fidelity, ie, for human ears, the sample rate must be at least 36000 to get reasonable fidelity at 19000hz, and thus we got 44100 for CD and 48000 for DVD.

The more dimensions in the signal also becomes an exponent on top of this simple doubling. Even the motion of a dice has several more dimensions related to how many ways it can dissipate energy.

Saying you can only detect either direction or position of a photon doesn't mean there are spooks in orderly physical phenomena - but rather, our best sensors are way way way to imprecise to capture both things out of one photon, and certainly not without also then altering the inputs that lead to the next resting state of the system.

It's built on top of the recently patched, bandwidth bottlenecked rendezvous routing system of Tor, that now has a CPU based proof of work for spam mitigation.

It essentially tries to make a full network out of the hidden service systems, which are already creaking from the attacks of the pre-PoW rendezvous protocol.

There was a messaging project called "torchat" some years back, that got abandoned because the Tor Project changed around their API too many times and broke the torchat author's code. It used tor hidden services to create overlay addresses, virtual addresses you might say, exactly in the way that Veilid is doing, more or less.

The problem is simple: bidirectional, telescoped onion routing is slow to build, and slow to recognise when it fails. Tor is not as slow or rigid as I2P, but it is in the same vein.

I'm working on a replacement for Tor, which dispenses with these bidirectional, telescoped channels, and uses the same technique used in Lightning, the Sphinx TLV onions, and uses a dual key, session based system for accounting bandwidth (and time) for sessions that are paid for using keysend/AMP style sender initiated lightning poyments, and a differently configured internal lightning network where there are no fees as the routers are being paid for relaying, not passing around payments.

The most important difference is that Indra hidden services don't have a bottleneck in the same way as Tor hidden services. Tor hidden services are backed up by 6 two directional 3 hop paths that meet and form a rendezvous, meaning that at any given time, bandwidth capacity and thus latency are highly constricted, a hidden service might have a 2.5Gbit pipe but most of the relays are 100 or 300, and everything necks down to that, and the congestion that can bring, etc etc. Indra hidden services basically are designed such that most of the time, the full bandwidth of a server can be used.

And overall, the biggest difference is this design has nothing to say about congestion control, or incentivising running of the software that enables it. Indra uses milliSats as a tool for making spam costs linearly scale, ie, making it uneconomical. Tor has no such thing, and that suits No Such Agency very well, who are probably running half of the Tor network by now.

nevent1qqsx5r6mnseh9rjrxunqpj3csm86c7gf7whywreqwc06xcmyr90lu8gppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7zvz276

Mister Flopp, the front man of CasaHoddle, b(sh)itcoin dealers, recently posted stuff about this:

https://veilid.com/

well, from this link:

https://www.theregister.com/2023/08/12/veilid_privacy_data/

And of course, they are resurrecting the old hacker group Cult of the Dead Cow, something that I associate with BoingBoing, Xeni Jardin, and most especially R. U. Sirius. People whose time passed at the end of the 20th century, a nest of retarded cool kids.

So I just want to say that Veilid is from Cult of Cool Kids, since they used trendy Rust and Flutter, that all the cool open source kids go on about, the Mozilla Way.

C.o.C.K. developers of Failid, a hidden service overlay network over the already No Such Agency controlled "anonymization" system.

I was pretty chuffed to see that several of my ideas, and of my co-founder buddy are using in Indranet, but, we are not cool kids, and we certainly are part of no cult except in our own minds with ourselves as our only acolytes.

Replying to 50c5c98c...

#SundayGunday

https://homemadeguns.wordpress.com/2023/07/10/fgc-9-production-ramping-up-across-the-eu/

For those who aren't sure.

FGC means "Fuck Gun Control"

It was meant to be built at home.

https://youtu.be/kucefQ6sYbo

THE HK SLAP!!!

ICH HABE EINE MP5 ICH GIVE A LITTLE SLAP!