@Devonshire's banner p

Devonshire


				

				

				
0 followers   follows 0 users  
joined 2022 September 05 13:46:29 UTC

				

User ID: 572

Devonshire


				
				
				

				
0 followers   follows 0 users   joined 2022 September 05 13:46:29 UTC

					

No bio...


					

User ID: 572

Null has directly countered one of the main dogmas of the modern internet, that you cannot name the previous identities and criminal records of trans people. Whatever else you call him, he has not "played the good little boy" just because he has not gone nuclear.

Controlling the narrative is important, but is not the only thing. I can still go to Josh's Telegram and get his side of the story with receipts. (Who knows how long that will last?)

Even if a society of mass-delusion, truth still matters. Probably even more.

single corrupt election official

You need multiple people. To stuff a ballot box in a precinct, you would need at least an accomplice stuffing the books, which are explicitly in the control of another person.

avoiding Just World fallacy and all the other things torture apologists have said on this very thread

Hey. Asshole.

I think it is good to avoid torture. It is an excellent thing to do.

Do not do it from a position of lies, especially putting lies in my mouth.

It seems like bad-logistics was something that Putin could have known if he had bothered to check.

Does anyone have recommendations for an automatic trash can that is easy to keep clean?

You can hose down a normal trash can, but an automatic trash can has seams and electronics that are not compatible with hosing.

I do not think Gibson bakery suffered $36 million worth of damages. The NPV of their entire future line of business to the end of time could not possibly be that. But I am glad the jury made sure to stick it in Oberlin's eye.

Oh okay sorry for wasting your time.

Your link does not work for me, mostly because their IT systems sucks and not through any fault of yours.

I took Organic Chemistry I my Sophomore year and I vaguely remember I was taking it late. (I passed after a rough start because I needed to figure out what to study, which should not have been as hard as it was to figure out, but whatever.)

Is there a way to block users here?

My favorite part so far is that the author correctly handles quotes that cross paragraphs. I think I am in love.

We have another thread about extremely extended adolescence. 17-year-olds used to be mature enough by necessity to raise a family, go to war, sit on a factory job for 8 hours, work a field for 14 hours.

Overall it is probably good that our 17-year-olds do not need to do that any more. But they can still crank out babies like 17-year-olds did 300 years ago.

This might change my mind. Thanks.

I am steelmanning something I disagree with so you should not keep on asking me to explain exceptions, but there are places where you want enough plausible deniability to get through the day, including the ability to publicly declare victory to your homeland, which can be a valuable thing.

I am not a fan of the idea, but to pull it off you need some kind of publicity about the deal anyway, so you would negotiate the deal and then leak rumors that it happened.

Are you talking about the normal bug bounty market? It is a bit hyperbolic to call it "ransom" and I am having trouble thinking of times where it was an existential risk.

EDIT The point about ransomware is very good and what I should have thought of when given the word ransom.

I already told you that I am skeptical of crypto-voting systems especially because of user education so switching from "lol what about zero days" to "lol math nerds!" is not really responsive to anything I said.

See https://www.themotte.org/post/86/culture-war-roundup-for-the-week/11192?context=8#context

But if aliens showed up and said they would drop rocks on us if we did not implement an E2E voting everywhere in the country within 20 years, we absolutely could do it, and it would be pretty secure.

Applebee's is largely automated in that most of their food is mass-produced off-site and then heated in a microwave. People who go out do not want to dictate their order to a robot that they might have to outsmart, like I have to trick my washing machine and dishwasher into doing things.

The last mile will always be hard.

I am not sure who in this conversation said "there will never be a down year" but anyone who said that was wrong.

In an E2E voting scenario, the design goal is (more or less, there are different systems) that you have the math so you can sit at home and verify that your vote was counted, often without anyone else being able to verify how you voted, and even if the people who are running the election are trying to screw you over.

Right, Jim is saying that someone blew it up, that there was lots of incentive for people to blow it up, and is pleased as punch about it blowing up.

But the other poster seemed convinced that this was an "admission" of USG involvement.

No, it is the math that works regardless of the security of the individual components.

If I send an encrypted message over an unsecured wire, and someone else shows up and says "oh but what if someone interferes with the unsecured wire?" they are missing the first part of understanding.

Each E2E system has its tradeoffs, but in general they are designed to absolutely detect if the people running the system deliberately messing with your vote. Detecting accidental messing with your vote is a necessary side-effect.

Your link does not mention COVID.

a single zero day

This is not how crypto-voting systems work.

You get the series of numbers from the voting system and can run them in your own computer, or even by hand with pencil and paper, and verify that your vote was counted.

The entire point of crypto verification is that you are not relying on someone else's computer. The threat model is the other person actively trying to screw you over, so "someone loaded a zero-day onto the voting equipment" is not even relevant.