asciilifeform: the most comical situation was of course in usgland. i was working at an army base, and there were the most titanically impressive generators i've ever seen, each easily the size of a train car, diesel cisterns two stories high, etc. BUT we still lost power in the lab. because somehow it wasn't connected to it.
asciilifeform: mircea_popescu: the pictured gensets are what most folks have where i live.
asciilifeform: so long as we're speaking of a house, rather than datacentre or factory
asciilifeform: and gives you time to revv up the motor.
asciilifeform: it makes the quality of the ~input~ ac irrelevant.
asciilifeform: thing is, even cheap generator, that has to be connected with extension cord and rolls on wheels out of garage, suffices if you have good doubleconverting ups
asciilifeform: and for that petrol is quite irrelevant, you want doubleconverting ups with ample spare capacity and fresh battery.
asciilifeform: anyway petrol generator is 'sexy', vrooom, vroom, but actual practice is that brown-outs, spikes, <30sec blackouts, are the real itch re computer user.
asciilifeform: mircea_popescu would be quite surprised what the % accuracy on sine coming out of mechanical genset is.
asciilifeform: 'Should a block strictly larger than 1Mb get mined, betting will close immediately and all bets received after the event (where "received" means "bet transaction gets one confirmation on the bitcoin network") will be refunded, minus BitBet's fee.' << aaaaand there went mircea_popescu's 'anti-chiseling' thing. gone, just like that.
asciilifeform: how does a gavinblock - definitionally - sit on 'main chain' ?
asciilifeform: let's start with 'If a bitcoin block strictly larger than 1000000 bytes (1 MB) gets mined on the main chain and subsequently receives more than 100 confirmations before December 31st 2016 at midnight GMT included, this bet resolves as "Yes".'
asciilifeform: ^ how the fuck does this even make sense as written ?
asciilifeform: year after that, it uploads this log on daily basis (along with the keystroke logs we already know to exist starting in win8) to microshit. etc.
asciilifeform: say next year it will write not only timestamp but exe hash to log.
asciilifeform: ring nodes, enabling traffic disruption and injection. This means that all the talk about legal instruments, NSLs etc. is immaterial, and that Tor traffic is practically vulnerable.'
asciilifeform: 'Around 800 backbone fiber connections in the continental US (95+% of the backbone) have been tapped for data collection. Some of the telcos are aware of this, but are silently cooperating by not implementing point-to-point bulk traffic encryption. There is an extensive ghost network that connects these nodes, enabling traffic analysis and tracing in near-real time. As of recently, the passive taps are being converted to active filte
asciilifeform: <jejb@kernel.org>; << l0lllz. such is bitrot, we all knew, high-energy photons are attracted by the toe fungus of kernel devs; physics nobel at 11.
asciilifeform: i very deeply grasp ~what~ mircea_popescu wants to achieve with this thing, and it is a thing that direly needs doing. but not so trivial!
asciilifeform: when whole university labz were mining.
asciilifeform: if you infected it, others could have also.
asciilifeform: if it is ever a winblowz box, it is weak.
asciilifeform: 'lalalala not problem and stfu' is not an approach.
asciilifeform: this is an approachable problem, and i wanted to learn what mircea_popescu 's approach is.
asciilifeform: mircea_popescu: fine, make it six people. how do you find the traitor (or simple incompetent who let his nodes get hijacked by third party)