146600+ entries in 0.94s

mircea_popescu: it wants
to be whatever usg's silicon valley politruks appear
to be willing
to put stalin's notes behind
that season.
mircea_popescu: but otherwhise
there's no excuse available
to
the chuchka
that "washing is
too hard and besides rubbing against a
tree
trunk is a close approximation"
mircea_popescu: or whatever, if
they don't feel like it, like eg ben_vulpes doesn't for his paste service, let
them not
to
a111: Logged on 2017-11-07 17:29 apeloyee: you want sci-hub
to wwork for phree?
a111: Logged on 2017-11-07 17:27 apeloyee: ......p_n are independent and uniformly distributed,
then
the probability of
tuple of
these being chosen is
the same (by definition of independence), and because CRT gives a bijection, all outputs are equally likely. did I repeat myself enough?
a111: Logged on 2017-11-07 17:14 asciilifeform: ( why is
there EVER EVEN ONE ?! )
mircea_popescu: asciilifeform not so, because
the gap's a cone not a rectangle
mircea_popescu: in general so after 16773120 bits were produced by FG, 4096 were added
to last bit and 1
to first. pyramidfixer.
a111: Logged on 2017-11-07 17:03 asciilifeform: what ought
to do instead, is
to rngize
the bottom Q bits, where Q is log2(estimated prime gap at
the current bitness,
times severalfold engineering margin)
a111: Logged on 2017-11-07 16:41 asciilifeform: but as i currently understand, my q reduces
to 'find
The Formula For Primes' (tm)(r), a millenium-long headache for mathematical folx ,
to
this day unsolved.
a111: Logged on 2017-11-07 16:21 apeloyee: I must say
that I dont understand how "exponent 131074 reduces
to exponent 2 somehow", and what CRT has
to do with it
BingoBoingo: For a while big mediterranean cables were snipped similarly
to likely same effect
a111: Logged on 2017-07-04 03:09 asciilifeform: in other unsurprises, 'Corrupt data
that accidentally flowed out of a NASDAQ systems
test caused
the share prices...'
BingoBoingo: <asciilifeform> ( i wouldn't put it past'em
to 'technical glitch' and
turn off bbc for a few min.
to get you
to up your wattage, say ) <<
They do it
to comcast
apeloyee: consider
that
the enemy will certainly
take advantage of your willful ignorance of atmospheric conditions (as known from bbc,etc), as you will up
the power
apeloyee: no externals plox << opportunistic use is a
thing
apeloyee: can add a phase offset so
that
they are in-phase at receiver. N stations, more
than N
times SNR increase, but opens
to attacks based on partial knowledge
apeloyee: if you needed 1W before, add a relay half-way, need 0.25W for you and relay nao. generally private relay should be a lot closer
to sender. needless
to say relay must re-modulate.
apeloyee: more: set up a site, bemoaning "radio intruders" on $band, stream from several nearby radios on it.
the recipient can
then improve SNR by subtracting whatever interference (from your POV), or estimate atmospheric conditions
a111: Logged on 2017-08-30 20:08 mircea_popescu: and
the shower has a pair of buttons : if you increase
the hot water debit,
this drops pressure for
the hot pump, which kicks in, dropping pressure for
the main pump, which kicks in. and vice-versa.
apeloyee: more crackpot ideas: live in flyshitville, can
then have ample warning about enemy detection equipment, and plenty of RF emission by and neighbors' equipment
to hide behind ( but few neighbors, important for SNR)
apeloyee: 'maximize # of bits
that can be sent before you gotta move' <<
this mostly involves choice of locality. "check if
the map matches
the locality. If it doesn't - change
the locality."(R)(C)
apeloyee: transmit slowly enough. enemy's cost
to proportional
to
time
apeloyee: if you miss some
time period, got
to capture moar.
apeloyee: yes, involves capturing and comparing
traffic from multiple points, because each individual bit gives very little confidence
apeloyee: and? understand I claimed
that it's possible
to find you, not
that it's easy or cheap
apeloyee: df for usg for free << correlation attacks work but are neither easy nor cheap. if
they only exchange 10% of
the
traffic, will
take 10x as long
to find you, unless
they know
the key
apeloyee: hogging sw spectrum will be a simple way
to make new enemy. << can reach a mutially beneficial agreement.
the more
transmitters,
the more channel capacity, until
the distortion is above noise.
apeloyee: or
they must send strgraight
to enemy
apeloyee: gotta exchange among
them all
traffic.
apeloyee: an'
they have 30000 SDRs
to keep
the siege? physical objects?
apeloyee: understand,
they can't keep sieges on 10,000 вредителей. will go bankrupt.
apeloyee: most of
the processing is local << if a known вредитель,
that means siege. otherwise
they need
to exchange ~approx as much data as can be fit in spectrum. obv can't reuse
the very same spectrum. hence lasers/sound/cables. can be sabotaged.
them low noise receiver must cost quite some $$$.