The thought began, as many good things begin, in #trilema.
Users of the WOT, of V, and other systems where your cryptographic identity is wholly in your own hands1 live with a certain risk of “cryptographic death” – i.e. the compromise of one’s signing key. A conscientious user of public key crypto might keep the thought [...]
Once upon a time (in August of ‘15, to be exact) I wrote a very simple versionatron called ‘V‘.
Edit: See also Ben Vulpes’s excellent introduction to V.
V is a carefully-designed poison against the scurrying little vermin who feed on the proverbial ‘fear, uncertainty, and doubt.’
For readers who are not in the little circle of folks [...]
Mircea Popescu writes:
‘Now making an irc channel is quite the pleasant experience : you create something out of nothing, get to name it and are now the boss of it. For a generation devoid of proper “empire building” avenues, this is about as cool as it gets. So you can do anything you wish, right [...]
Presenting a very old game, entitled: Man vs. Machine. Or, why Man is not a Particularly Good Source of Entropy.
All of my readers are invited to test the security of their GPG public keys using a new and very simple online tool: “Phuctor” (part of a long-term collaborative project with Mircea Popescu.)
Phuctor is based on cutting-edge Ancient Greek technology.
Engine now re-written, using GMP. Roughly 100-fold speed boost! The service is now essentially “real-time.”
Edit: Feel [...]
This post is of interest only to those who study Bitcoin. If you have never heard of Bitcoin, read my previous post on the subject.
Shitcoin is to be a distributed network for attaching “dirt” to particular bitcoins when certain conditions are met, in a manner which allows Bitcoin users to post bonds in [...]
Computing pioneer Alan Kay tells us that a computer is “an instrument whose music is ideas.” This seems like a beautiful metaphor, until you realize that we have somehow ended up in a world where the profession of musician is nearly unknown. To continue with this analogy, let’s imagine that you were a [...]
Computer users are forever being misled, successfully lied to, sold “old wine in new bottles,” bamboozled in a myriad ways large and small. Why? Simply because we are, to use the technical term, suckers. Not always as individuals, but certainly collectively. The defining attribute of the sucker is, of course, an [...]
Technological standards may be usefully divided into five basic types:
4 – Standards arrived at by consensus.
Examples: Common Lisp.
3 – Standards imposed by dictatorial fiat.
Examples: Russian railroad gauge.
2 – Standards imposed through sudden, overwhelming, and indisputable technological supremacy over the previous state of the art.
Examples: Arabic numerals. Sildenafil.
1 – Standards which inescapably [...]
The aim of Loper is to build a sane computing environment on top of the ubiquitous yet nauseatingly flawed X86-64 architecture. I believe that it is possible to abstract away its most damning shortcomings, such as the lack of direct hardware support for capabilities, orthogonal persistence, type-checking, and garbage collection. However, wouldn’t it be nice if we were not [...]