log☇︎
81300+ entries in 0.028s
asciilifeform: describe a model of computation that is 1) usefully complete -- can carry out actual work 2) is substantially non-brittle - i.e. flipping 20% of the bits results in something that is only, say, 20% away from, but still recognizable as the original performer, rather than liquishit
asciilifeform: fwiw cured me of 'this great unsolved problem is merely a small misconception everyone in the field merely happened to suffer from'
asciilifeform: i -- did
asciilifeform: what can i say, do try it
asciilifeform: brittleness is in fact the reason why nobody's made 'evolved' code do much of ~anything interesting to date
asciilifeform: ( this is called 'brittleness' by aficionados of 'meat-like machinery' ) ☟︎
asciilifeform: far more narrow in the world of the artificial.
asciilifeform: expand?
asciilifeform: or the evolution of 'hiv2' etc
asciilifeform: this is reminiscent of the old virulence debate re ebola etc - 'why are there not moar ebolas'
asciilifeform: if you use infected idiots, you're stuck explaining what's to keep'em from reinstalling winblows + patch against whatever door you walked in through.
asciilifeform: this has 0 bearing on physical reality.
asciilifeform: so - willingly crafted boxes, then
asciilifeform: that nobody knows how to make it +ev.
asciilifeform: that was my argument against the entire uci thing, recall
asciilifeform: whole point of botnet neh
asciilifeform: 2 * maxint
asciilifeform: ( formatting hdd, that is. doesn't )
asciilifeform: however this does not buy you the use of the victim's willingly paid electric bill.
asciilifeform: 1990s virii folx had the right idea.
asciilifeform: you can achieve similar effect just by formatting their hdd, erasing whatever eraseable roms, etc
asciilifeform: because there is not yet any known way to compensate the possibility of deliberate misanswer in the calculation. ☟︎
asciilifeform: but they are not.
asciilifeform: if cpu cycles were actually fungible, this would already long ago exist.
asciilifeform: good chunk of extant iron, is not actually bitcointronic
asciilifeform: and if his hdd dun fit the chain ?
asciilifeform: he dun have a his
asciilifeform certainly did
asciilifeform: hey who didn't think of 'say virus installed linux' in 1998
asciilifeform: this is an entertaining idea ( though i predict that the typical luser will run ever the moar quicker to the new hdd shop from it ) but was not in mircea_popescu's classical uci spec.
asciilifeform: so 'sane os' magically containing luser's demanded toolset, is also somehow in the mix ??!
asciilifeform: where does uci pool of available cpu cycles come from then
asciilifeform: next thing - he takes it to the corner store and trades in hdd
asciilifeform: user switches on box, sees 'muhahaha all my cycles belong to mircea_popescu OS installed!'
asciilifeform: expand plox
asciilifeform: similar to existing crapware
asciilifeform: my current understanding is that you need ~some~ degree of stealth
asciilifeform: why would he keep it plugged in if you formatted and installed slave-for-tmsr-os instead of all that stood there
asciilifeform: victim, rather
asciilifeform: which implies that user keeps the machine plugged in
asciilifeform: in original description of uci, was described as 'cpu cycle by the pound' sort of affair
asciilifeform: only works because it doesn't result in operating box.
asciilifeform: unobtainium.
asciilifeform: http://btcbase.org/log/2017-07-15#1684024 << ☝︎
asciilifeform: any and all of which look for other processes and occasionally snapshot to send back to $mothership - 'perhaps interesting', 'perhaps contains keys'
asciilifeform: winblows box, containing potentially 900 other pieces of shitware
asciilifeform: let's take the typical bot, of which existing nets ( of infected nodes, rather than 'voluntary' p2p ) are made
asciilifeform: this doesn't magically become a description of a working scheme, by mircea_popescu stating so
asciilifeform: i was still speaking of uci bots
asciilifeform: you also want that nobody can affect how the net works by bringing 9000 of his own As to the table.
asciilifeform: this is necessary but not sufficient
asciilifeform: ( everyone is also subject to piano falling on him )
asciilifeform: in practice, some folx moar often than others.
asciilifeform: babbage knew how.
asciilifeform: it is also subject to key compromise at any time.
asciilifeform: so cannot form identity.
asciilifeform: bot node, generally, has nothing like an actual rng.
asciilifeform: mircea_popescu: is not distinguishable. but he can make a key and build identity
asciilifeform: i do not know of a solution to this presently
asciilifeform: and cannot operate by 'nothing to allcomers'
asciilifeform: and so you cannot have 'communicate only with knowns' in botnet
asciilifeform: which is that new infections are not physically distinguishable from sybils
asciilifeform: there is a separate problem pertaining to uci, that does not reduce strictly to 'nat problem'
asciilifeform: and ergo net would have to be deployed in massive burst, whereby yesterday there were 0 S, but today 9000. ☟︎
asciilifeform: this may very well be fundamental limit.
asciilifeform: my objection is that the star topology does not go away by virtue of being called something else. you have a class of fully-capable nodes, S, that can accept unsolicited pipes; and a much larger class of P ( lessay, peons ), behind NAT, who cannot. ergo stars.
asciilifeform: i'll point out that i do not know of a different recipe than mircea_popescu's ( and in fact is same used by 'skype' and various heathens , for many years. )
asciilifeform: sorta as british admiral answered 'boil the ocean' to 'is there a solution to uboat'
asciilifeform: it's the 'insect' solution, gotta mention it for completeness.
asciilifeform: depends what you're doing, neh. if you're a cicada looking for a fuck -- worx
asciilifeform: it is ugly.
asciilifeform: existing botnets do this -- the familiar port scan and hammer
asciilifeform: i.e. to shout
asciilifeform: it gives the current state of the art re 'how to connect without introduction'
asciilifeform: ( as alluded to in http://btcbase.org/log/2017-05-23#1660666 ) ☝︎
asciilifeform: mircea_popescu: recall your joak re brits fucking ?
asciilifeform: this is == to sina's 'you used gpg yesterday, why is using it tomorrow a problem'
asciilifeform: this'd require at least 2 S to exist, lol
asciilifeform: speaking here of topological problem that will remain after rewritten by people.
asciilifeform: creates massive stars, in practice.
asciilifeform: and for botnet.
asciilifeform: it is a problem in the same way as it is for trb.
asciilifeform: == S
asciilifeform: ^ or as pictured here, C
asciilifeform: the problem -- and it IS a problem -- is that cold bootup, for ~any~ node, requires knowing a working S.
asciilifeform: mega-revelation
asciilifeform: well yes. if you were able to connect, you were... surprise... able to connect
asciilifeform: *telepathy
asciilifeform: telapathy ?
asciilifeform: and how exactly is this achieved ?
asciilifeform: not if he has to connect to one of $smallint S boxes. that are all firewalled off at his isp.
asciilifeform: if serf can't get on the actual net, this is not something that can be solved ~for~ him by anyone else
asciilifeform: there is no external cure for aol.
asciilifeform: whitelist aol.
asciilifeform: but strictly like so.
asciilifeform: http://www.loper-os.org/?p=208 << like so.
asciilifeform: can only vanish along with http.
asciilifeform: ( if somebody wants to describe how , i'll listen )
asciilifeform: it can't really be vanished away without killing 'tcp to arsebook' etc also. as i currently understand it.
asciilifeform: 'hole' is the wrong word re how udp holepunch works