Plutus, Haskell, Nix, Purescript, Swift/Kotlin. laser-focused on FP: formality, purity, and totality; repulsed by pragmatic, unsafe, “move fast and break things” approaches


AC24 1DE5 AE92 3B37 E584 02BA AAF9 795E 393B 4DA0

  • 2 Posts
  • 362 Comments
Joined 2 years ago
cake
Cake day: June 17th, 2023

help-circle



  • You conveniently dodged my question, then asked me stupid questions, thinking I’d have to agree with cherry-picked offenses by China. I am not a fan of China. I just think they are justified in defending themselves. Furthermore, I think it’s hilarious that the the US decided to offshore our high tech goods to have them manufactured there as if we weren’t ASKING to be hacked. The only solution going forward is CLEARLY domestic RISC-V manufacturing and not allowing our enemies to manufacture our critical technologies.

    Do I support China’s:

    • domestic surveillance: of course not
    • transnational repression: of course not
    • supression (sp!) of free speech and freedom of the press: of course not
    • bullying of its neighbours: of course not
    • aggression against Taiwan: of course not

    Do I support China engaging in pre-emptive cyber warfare against aggressors: absolutely

    Do I support the US engaging in pre-emptive cyber warfare against aggressors: absolutely

    Do I support Israel engaging in pre-emptive cyber warfare against aggressors: absolutely

    Do I support war crimes being committed by ANY of these countries: NO


  • Embedding Trojans in your enemy’s infrastructure and leaving them to be switched on in times of war is ABSOLUTELY defense. You may not like it. But that’s called cyber warfare.

    Quick question: Do you fundamentally disagree with what China is accused of but fully support Israel and the US’s extrajudicial backdoors, Trojan horses, domestic spying, pager bomb assasinations, AI targeted air strikes, and other clandestine war crimes just because they are perpetrated by “the good guys”?





  • This is really cool.

    It reminds me of the Edinburgh Decentralisation Index: an academically rigorous decentralization index that the university of Glasgow school of informatics devised to quanitfy the decentralization of cryptocurrencies:

    The Edinburgh Decentralisation Index (EDI) studies blockchain decentralisation from first principles, archives relevant datasets, develops metrics, and offers a dashboard to track decentralisation trends over time and across systems.

    https://informatics.ed.ac.uk/blockchain/edi

    You should give it a serious look. IMO, it would offer some insight into academically peer-reviewed ways of quantifying this kind of thing.









  • Are there obvious, inherent pitfalls to deregulation of anything at all? Yes.

    Is it absolutely necessary for it to exist? Also yes. Self sovereignty is both dangerous and absolutely necessary…unless you WANT Uncle Sam to be able to put a short time-limit on spending your tax return once they adopt a Central Bank Digital Currency (and they will). With a CBDC controlled by the Fed, we will be subject to money that expires and other features that feel like bugs that go hand in hand with a central power controlling a currency.

    Agree to disagree then. You don’t seem to grasp my points and I don’t grasp yours. Peace.

    As my rant above detailed, I’d be happy to give up my belongings if I lived in a truly communist society. But I don’t. So, I hold onto my possessions tightly since it is literally the way I survive.


  • I suspect you should listen to your own counterpoint:

    Don’t walk down the street because someone might rob you.

    Don’t use your computer because someone could hack you.

    Don’t go swimming because it is possible to drown.

    Throwing out the baby with the bathwater.

    An uncensorable ledger not controlled by any one party is (at the very least) a valuable technology with unique abilities despite scammers using it for gambling.

    The digital equivalent of uniqueness is (at the very least) a valuable technology with unique abilities despite assholes using it for Bored Apes.

    Just because you can’t see the use case, doesn’t mean we need to stop innovating.


  • Scammers:

    • don’t tend to share any of their their source code
    • usually have an initial token allocation where insiders are given early access to more than 15% of tokens. (this one is a CRUCIAL)…Obviously, the best ITA is one where the tokens are 100% available to everyone at once.
    • heavily market their cryptocurrency before it even has a use-case (most projects fall into this category)
    • their governance is centralized to some charismatic Elon-bro that talks about price all the time
    • don’t let you use any wallet you want (self-sovereignty is CRUCIAL)
    • don’t give you access to your keys at all times (again, self-sovereignty)
    • are usually just some governance token or ERC-20 or some quickly minted Solana token ($LIBRA $TRUMP $MELANIA were all obvious scams)
    • never have a viable peer-reviewed white paper
    • their code is NEVER formally verified by neutral parties
    • use technologies that are not auditable
    • use technologies that are not decentralized

    I’ve spotted many scammers a mile away just starting with this list off the top of my head.

    For instance, I am the moderator of infosec.pub/c/midnight and actually locked my own communities until I see the source code.

    I like the tech from what they tell me. But, I can’t, in good conscience recommend it yet because it ticks some of the above scammer boxes.