asciilifeform does not harbour any illusions that this is 'easy pill' -- think, e.g. korolev would have had this pill, if it were so easy. but curious re the prohibitive boojum specifically.
asciilifeform: the motion of the rocket ( align the tube with the motion axis, naturally ) does this for you, neh
asciilifeform: why not pipe it straight to the chamber.
asciilifeform: colour me again thick, why does the dry air require cooling ? esp if your intended use for it is rocket oxidizer
asciilifeform: meteorite does not burn from friction of atmosphere, but specifically from compressing oncoming air
asciilifeform: ben_vulpes: colour me thick, but how does the compression of oncoming gas ~pull out~ heat ? consider how 'reentry heat' comes about.
asciilifeform: ( though i suspect something like it would even work in a 'springy' solid. see 'phonons' etc )
asciilifeform: ( if you cannot, you have a solid, and naturally no it won't work on a solid, lol )
asciilifeform: for so long as you can make a pressure gradient at all.
asciilifeform: ben_vulpes: iirc wirbelrohr works just the same on liquids
asciilifeform: must point out, i haven't the faintest reason to think that it would work; was specifically curious re whynot
asciilifeform: ( as well as the fact that it has to work 'from parking lot to mach X' )
asciilifeform: as i understand, would be constrained by possible length of the tube and the strength of the material from which it is made
asciilifeform: also gives you cooling, reasonably cheaply
asciilifeform: ben_vulpes: gives you clean, h2o-free o2, if the spigot is placed correctly in the vortex, as i understand
asciilifeform: ben_vulpes: http://btcbase.org/log/2018-04-12#1796970 << here's a thing i wondered about for many yrs : is there any reason why a wirbelrohr could not do the job of 'frost control' in an 'airbreather rocket' ?☝︎
asciilifeform: in any case fits-in-head MUST come ahead of 'proofiness'.
asciilifeform: ada's spark is a similar, if somewhat uglier/bulkier, thing☟︎
asciilifeform: spyked: in re proof machines, i'm much moar interested in items like ACL2 , where you can affix your hand-written program to a hand-written proof of correctness in a mechanically-reliable way☟︎
asciilifeform: ( and i dun think i need to explain that the mecha-proof is ~meaningless~ without reading the claimed verifier )
asciilifeform: but this was enuff for the tech to find its way to the cargocultists.
asciilifeform: unfortunately it never went far beyond 'rediscovered pythagor's theorem'
asciilifeform: spyked: if you recall, back in the 'minsky age', that was the initial attraction of mechanical 'reasoners' -- discovery of ~simple~ inferences☟︎
asciilifeform: avgjoe: there is no magical document that proves trustworthiness. but there is, just like thousand years ago, working with people, and developing relation with them
asciilifeform: avgjoe: understand, 'looking up' tells you just about nothing if you do not have any existing trust of any of the people who wrote the item you are 'looking up' in.☟︎
asciilifeform: but then suddenly very very hip when crackpot symmetrics.
asciilifeform: wasn't so popular when he was demonstrating effective smooth integers algo
asciilifeform: i've no particular objection to snake oil from king cobra vs from japanese viper; but as i observed earlier, the sudden popularity of bernsteinism has never been explained to my satisfaction.
asciilifeform: mircea_popescu: blake2 is bernstein's hash ( consists of a slightly modified chacha, his symmetric algo )☟︎
asciilifeform: ( 1 possible variant formulation of this : you want to prove that it is not possible to quickly skip over any portion of key space )
asciilifeform: so what you'd want to prove is that there exists ~no~ method more effective than brute guess, for $system.
asciilifeform: http://btcbase.org/log/2018-04-12#1797536 << we may have had the thread iirc, but : cryptographic 'lowest difficulty' is inescapably statistical, considering that there is a nonzero and calculable probability of guessing a key ( under any system which is not otp, i.e. correct key is somehow distinguishable from the space of possible rubbish key )☝︎
asciilifeform: right now 2 types of cipher are known -- otp, and errythingelse. only re otp is there a mathematical statement of any substance ( i.e. it is degenerate case, leaks 0 bits )
asciilifeform: ( what would 'getting somewhere' look like ? how about a general theory, or even ~study of particular case, like aes~ re how many bits of key are leaked per, say, TB of ciphertext )
asciilifeform: linked proggy is iirc by another d00d
asciilifeform: to be fair, the thing isn't even obscenely lengthy, esp for a robo-generated proggy. ( it remains the case that i dislike c, and also ecc; but these are orthogonal concerns )
asciilifeform: why the author stopped where he did, and did not unroll ~all~ of the loops, i do not presently know
asciilifeform: zx2c4: you can come back any time, you have voice now.
asciilifeform: the use of pointers, for instance, is discouraged, and their migration between scopes is prohibited
asciilifeform: zx2c4: there is some quite 'fascist' compile-time checking. most noobs to the lang, spend a week or so getting their proggy to even build.
asciilifeform: if you switch the runtime checks on, you get a ~50% speed penalty in practice, vs 'naked c'
asciilifeform: ( gnat , the ada compiler, is based on ordinary gcc )
asciilifeform: zx2c4: performance is difficult to compare; if you remove various safeguards, you get ~same binary as equiv c proggy would have produced on same ver of gcc.
asciilifeform: there is absolutely no justification for the continued use of c, aka overflowlang, aka heapabuselang, since... oh, 1985.
asciilifeform: and doesn't require a multi-MB runtime.
asciilifeform: and add to this, that it has an actual paper standard, and minimal 'implementation-defined' rubbish (tho sadly not zero)