log☇︎
800+ entries in 0.224s
a111: Logged on 2017-03-02 16:31 asciilifeform: it is worth recalling the gedankenexperiment where it turns out that all you'd need to build 'martian bank' on earth, is if martians merely supplied an infallible 'martian clock', a service whereby they take a string S , at regular, say, daily, interval, and return its hash H
mircea_popescu: aite, let's see what you got. your string is 5d8a1cc5
mircea_popescu: meanwhile in other string theory, http://78.media.tumblr.com/tumblr_m2c3bwC2UL1qetcz3o1_400.gif
mircea_popescu: in other "furious activity as cover for impotence", the string "&nslookup djY7ekWd&'\\\"`0&nslookup djY7ekWd&`'" is going to do something! maybe as a referrer ? maybe if you stuff it into a comment ? IT IS A MAGICALLY POWERFUL STRING!
asciilifeform: and yes it means that every time you publish a sig, you also thereby supply a 'decryption' for some random string of soup
a111: Logged on 2017-12-22 06:54 mircea_popescu: Techman say /query deedbot to open a pm session ; say !!up in there to it ; then return !!v the string.
mircea_popescu: i dun recall what the procedure is, does it let you !!register the new one ? (as in, spits out a v string ?)
mircea_popescu: Techman say /query deedbot to open a pm session ; say !!up in there to it ; then return !!v the string. ☟︎☟︎
trinque: lol, stale response string
asciilifeform: if you return a String, that's 2ndarystacktronic . no escape.
asciilifeform: Arg : aliased String (1 .. Len_Arg (Num));
asciilifeform: just as easily it is possible to give it a 'here's an empty string of length L to take a shit into, for each cmdline param, and if the actual exceeds it, trigger constrainterror'
asciilifeform: and in the process discovered that the original was ~maliciously~ stupid, there is NO reason why it HAD to return an unknown-length string value
asciilifeform: q is, of what is made a 'string'
asciilifeform: trinque: any kind of string
asciilifeform: if not, then neither can you have a notion of 'string'
mircea_popescu: c string neh
a111: Logged on 2017-12-17 01:40 asciilifeform stuck presently in an infuriating gnat labyrinth : turns out, a proggy that set pragma Restrictions(No_Secondary_Stack) , cannot use Ada.Command_Line ( equiv of argc/argc in c-planet ). so then asciilifeform went to make own replacement. and turns out , guesswat, no can haz, because pragma Restrictions(No_Unchecked_Conversion) -- and argv, where commandline lives, is a pointer to nonadatronic (i.e. c-style) string .
asciilifeform stuck presently in an infuriating gnat labyrinth : turns out, a proggy that set pragma Restrictions(No_Secondary_Stack) , cannot use Ada.Command_Line ( equiv of argc/argc in c-planet ). so then asciilifeform went to make own replacement. and turns out , guesswat, no can haz, because pragma Restrictions(No_Unchecked_Conversion) -- and argv, where commandline lives, is a pointer to nonadatronic (i.e. c-style) string . ☟︎
asciilifeform: PeterL: the null string output for 'Actual:' is telltale.
mircea_popescu: why the fuck would standford give a dumb neet as much as a length of string "because they need it" ? let them need from their fucking mother / community college.
phf: i've had color disabled in my editors for years now, though some color like comments and string sequences is somewhat handy
a111: Logged on 2017-11-22 00:33 mircea_popescu: string is not a primitive!
a111: Logged on 2017-11-21 19:38 phf: http://btcbase.org/log/2017-11-20#1741179 << you can just ignore the whole "string" question in first version, McCarthy's lisp used symbols instead of strings (that's why early nlp code, like eliza all come out as DOG SAID, HELLO) and the only operation you could do at some point was read and eq.
spyked: http://btcbase.org/log/2017-11-21#1741759 , http://btcbase.org/log/2017-11-22#1741862 <-- string not a primitive, but -- "string" datatype aside -- symbol names are (conceptually) strings, so they (the symbol names) require an internal representation etc. cons'ing characters upon reading was simplest approach I found to storing and structuring them. con: list cells introduce memory overhead; pros: avoids arrays and magic numbers like ☝︎☝︎
mircea_popescu: string is not a primitive! ☟︎
a111: Logged on 2017-11-21 19:38 phf: http://btcbase.org/log/2017-11-20#1741179 << you can just ignore the whole "string" question in first version, McCarthy's lisp used symbols instead of strings (that's why early nlp code, like eliza all come out as DOG SAID, HELLO) and the only operation you could do at some point was read and eq.
phf: (read-from-string "#.(format t \"hello, world~%\")")
phf: http://btcbase.org/log/2017-11-20#1741179 << you can just ignore the whole "string" question in first version, McCarthy's lisp used symbols instead of strings (that's why early nlp code, like eliza all come out as DOG SAID, HELLO) and the only operation you could do at some point was read and eq. ☝︎☟︎☟︎
mircea_popescu: asciilifeform implement a native string bignumatron.
a111: Logged on 2016-02-25 17:12 phf: i've been mulling over that question with logs. fwiw, entire log can be kept in memory for analysis, annotation, whatever, 180mb as utf-8 byte arrays. with unicode strings takes up twice the memory on 16-bit cmucl, and ~~4 times on 32-bit sbcl. i'm not yet convinced that transcoding everything you get into string and then transcoding it back to a bytearray onto the wire is the best strategy
mircea_popescu: can't imagine why not, ada still uses fixed calling, you can't call by pointer-to-string or shit can you
asciilifeform: trinque: not necessarily, could even store the lines individually, rather than as single text string, and generate the html soup in variants depending on number in url
asciilifeform: which could mean, for instance, dispensing with entire concept of interned string
phf: for example your Symbol_EqualP should just be a pointer comparison, rather than string comparison. (the whole point of a ~symbol~ over a string is that it's interned, i.e. same sequence of characters always map to the identical Symbol object)
a111: Logged on 2017-11-13 19:29 phf: http://btcbase.org/log/2017-11-13#1737247 << it looks like a properly structured scheme evaluator, but it's ~explicitly~ lacking a native cons, which might be a very good exercise for whoever™ adding a static allocation space, adding mark-and-sweep, then all those To_Unbounded_String look like they can be simply search/replaced
phf: http://btcbase.org/log/2017-11-13#1737247 << it looks like a properly structured scheme evaluator, but it's ~explicitly~ lacking a native cons, which might be a very good exercise for whoever™ adding a static allocation space, adding mark-and-sweep, then all those To_Unbounded_String look like they can be simply search/replaced ☝︎☟︎
mircea_popescu: wer you can now self-voice, so i don't have to up you every half hour. say !!up to deedbot (in private message). it will give you something to decrypt. you decrypt it, then say !!v <string> and you're voiced.
mircea_popescu: wer say !!v <string>. metasyntactically string
wer: !!v string
mircea_popescu: wer say !!v string
wer: so what do i do with the string
ag3nt_zer0: i think the confusion for me stems from hearing two different descriptions of brain wallets - one described as a way to, if i recall correctly, convert a privkey to a string of words to then be memorized and carried in brain over international borders or what not... and the other encounter I have with this concept is pete's method of generating a high entropy keypair and I am pretty sure I am answering my own question here but wou
mircea_popescu: "which is the count of repetitions before string x becomes prime number"
asciilifeform: actually , the way i'd implement the thing , is to not change the format in any way, other than a condition that 1) e can be any 4096b string 2) but if it fails m-r, nextprime(e) is used as e
asciilifeform: http://btcbase.org/log/2017-11-10#1735920 << may or may not want to bother, but it does give a method of protocolically tying the comment (postage whatever) string to the pubkey , without pretense of 'self-signatures' or anything of the kind ☝︎
mircea_popescu: ang-st say !!up to deedbot in a pm, then !!v with the challenge string
asciilifeform: ideally the paste magick comes from s := get-string-from-FG followed by see-if-unexpired-paste-with-s-exists
trinque: I'll go change to to encode the FP as repititions of the string "cocks" to signify
a111: Logged on 2017-08-09 17:59 mircea_popescu: basically they had this early elliptic curve crypto, implemented as an arbitrary cone on which they wrapped a string. because the string is fixed length see, whereas the section of cone is not.
BingoBoingo: two cans one string!
mircea_popescu: which is what that whole " a new $string which resolves to $hash" is all about.
trinque: take a particular trilema article, your node announces that there is a new $string which resolves to $hash and your node signed the fact
a111: Logged on 2017-10-17 13:36 asciilifeform: in other thefts, 'The researchers went on to find 15 factorizable keys used for TLS. Strangely, almost all of them contain the string "SCADA" in the common name field.'
asciilifeform: in other thefts, 'The researchers went on to find 15 factorizable keys used for TLS. Strangely, almost all of them contain the string "SCADA" in the common name field.' ☟︎
trinque: not eggog, it's a string
asciilifeform: fwiw 1000s of unique ips presenting that string.
a111: Logged on 2017-10-08 00:16 asciilifeform: the ONLY correct method of generating cryptoprimes, is to 1) get N bits from FUCKGOATS 2) determine, in fixed spacetime every single time, whether that string of bits constitutes a usable prime.
mircea_popescu: as no 0 led or 0 terminated string will ever pass anyway
a111: Logged on 2017-10-08 00:16 asciilifeform: the ONLY correct method of generating cryptoprimes, is to 1) get N bits from FUCKGOATS 2) determine, in fixed spacetime every single time, whether that string of bits constitutes a usable prime.
asciilifeform: the ONLY correct method of generating cryptoprimes, is to 1) get N bits from FUCKGOATS 2) determine, in fixed spacetime every single time, whether that string of bits constitutes a usable prime. ☟︎☟︎
mircea_popescu: ben_vulpes technology is built by steps. so far, being able to put in machine terms a "ask all the bots see which one mentions 'payments' as a string" is a legitimately useful ability.
mircea_popescu: in other lulz, anyone familiar with the early anti-pot hearst smear campaigns ? (1930s). it's a long string of, basically, "do you want your daugther sucking mexican cock ? and corrupting her sister to participate in wild orgies? ?!?! !!?!?!? "
asciilifeform: ( i.e. no possibility of string fandango, etc )
mod6: Basically when working with Strings.Fixed I end up making arrays (of fixed size) of strings (of fixed size), need to use caution always to not continue to iterate if the string at a given index is filled with ' '.
mircea_popescu: you can't make her a string of anal beads out of them ?
mircea_popescu: so you'll settle on "dirac's delta visibly parsimonious ; string theory not so visibly if at all" ?
asciilifeform: ( the string orchestra not only dun give a flying fuck re parsimony, but quite the opposite , complexity cancer deliberately cultured, breeds grantolade for mediocrities )
mircea_popescu: and i suppose the evident similarity between dirac delta and "whichever unnamed abstractions you support your estimation of string theory" is also striking to you ?
a111: Logged on 2017-09-07 03:07 asciilifeform: s clearly an area of tremendous importance. In fact, I had to switch to an engineering department to work on it, because physics departments are broke and enamoured with ex-string theorist well-fare projects like topological insulators....'
a111: Logged on 2016-12-22 23:43 asciilifeform: 'AI risk is string theory for computer programmers. It's fun to think about, interesting, and completely inaccessible to experiment given our current technology. You can build crystal palaces of thought, working from first principles, then climb up inside them and pull the ladder up behind you.'
a111: Logged on 2017-09-19 21:39 phf: i've actually tried putting ropes in a bunch of projects and they never have good performance characteristics. in fact for text editors no one has invented anything better than "one string per one line", and if you want to be fancy you split it at point (what emacs does)
asciilifeform: phf: string insert is O(N) troo!! but i can't escape the notion that if you're manually inserting INSIDE multi-GB strings, Something Is Wrong with yer process
asciilifeform: if i were to randomly flip a bit in a bitstring representing roped text, it will quite possibly turn it to liquishit. if i do the same to normal string, you have 1 bad char in 1 particular place.
phf: i've actually tried putting ropes in a bunch of projects and they never have good performance characteristics. in fact for text editors no one has invented anything better than "one string per one line", and if you want to be fancy you split it at point (what emacs does) ☟︎
asciilifeform: 'string length is now O(N)' is not compatible with concept of healthy tissue. period.
mircea_popescu: "visually recognizes string, like parrot" or somesuch ?
asciilifeform: privkey_data = http_client::request_uri_to_string(https_privkey_uri);
asciilifeform: cert_data = http_client::request_uri_to_string(https_cert_uri);
mircea_popescu: i'm entirely unsure why these two items (string theory ; high energy particles) are so strictly welded together in your head.
asciilifeform: s clearly an area of tremendous importance. In fact, I had to switch to an engineering department to work on it, because physics departments are broke and enamoured with ex-string theorist well-fare projects like topological insulators....' ☟︎
mircea_popescu: "give me the list of all lines with string x" are not requests for urls per se, but requests for computation. "please interpret the indirection layer and compose a list of urls as a solution to that".
asciilifeform: substrings, trinque -- what happens when i type 'anything you're using as a search index can exist' string into your search ?
mircea_popescu: your string is 59eea6eb. and smile!
mircea_popescu: kanzure you are experiencing the following problem : you do ocr on old text, which produces ambiguities that bite you in the ass. yes the string "patent" can be found in medieval and early modern period documents. the item thereby denoted however is not a patent.
asciilifeform: now if only it were something more interesting than thiel fellatio, string-theoretical quantum mimblewimbles, and gaseous nutritions...
asciilifeform: http://btcbase.org/log/2017-08-29#1704721 << recall gabriel_laddel ? who slept through 'boring old' newton's laws, but is 'expert' on, what was it, string derpery, etc ☝︎
mircea_popescu: ie, "why do you know so much about string theory ?" "because im on this biker forum and this guy steve keeps posting articles about it" "yes but... it's neither that important nor interesting" "i dunno"
mircea_popescu: kanzure say !!up to deedbot in private then !!v to verify the string it gives you
Birdman: and i type just that string after the rest at the same time? "whatever.py C:/handhistories python hands2.py c:\directory > logfile.txt" ?
a111: Logged on 2016-08-18 12:32 mircea_popescu: asciilifeform since we're on this btw, the way i want tmsr-rsa key generation to work is as follows : a contains a number of entropy bytes specified by user in tmsr-rsa.conf read whenever tmsr-rsa.conf specifies (such as urandom); b contains a base-tmsr string specified by user. c = base-tmsr(a).b ; p = nextprime(cut(sha512(c),257)) ; process is repeated for q = nextprime (cut(sha512(c'),258));
mircea_popescu: if you're asking "what is the probability of a 4000 bit string being randomly generated so it matches an arbitrary crc32", the answer is you know, 1 in infinity.
mircea_popescu: crc checks that the string is the same now as it was when crc was originalyl computed
PeterL: not trying to catch changes, trying to catch random string accidentally passing the check
mircea_popescu: PeterL if your string is 250 chars, there is 0 probability that an up to 32 bit setcion being altered in any way will not be caught up
PeterL: also, my question re crc32 yesterday, I meant to say: given a (random) string of 250 chars, what is the proability that (random four byte string) will pass the crc32 test? which I think is just 1/256^4
PeterL: well, it is not unpadded, it uses the random byte string as the pad
mircea_popescu: and finally re crc : given a string S of any length, the probability of a string S' where less than 32 bits have been altered in a "burst" passiong crc32 is 0. if you go over 32 bit long bursts the probability is ~ proportional to the burst length / 32.
PeterL: Is there a way to calculate the probabilty that a random string of 256 bytes will pass a csc check?
PeterL: http://btcbase.org/log/2017-08-09#1696147 << I don't think we need to do a hash on the data, it is already xored with the random string ☝︎