MlT (MlT
): please accept this honorary PhD
MlT (MlT
): please accept this honorary PhD
Sexagenarian Clown Pussy
I was thinking more like buttons for A-Z, but that sounds good too.
I would like at least 26 more buttons
Cryptocurrency is not necessarily anonymous. Buying bitcoin from a broker leaves a record connecting your payment method to your wallet. Even if you mine them yourself, doesn’t your IP address show up on the public ledger? I guess if you somehow bought bitcoin in cash…
Is there a more private cryptocurrency I’m not considering?
GNU Raster Editing Program - GREP
Graphical Image Tool - GIT
Photo Editing with Raster Layers - PERL
Visual Image Manipulator - VIM
The implications of “magic is data” are fun. It leads to stories like Unsong where you can brute-force enumerate incantations until you find a good one. I also like the concept of Wizard’s Bane. I haven’t read it, but my understanding is that magic turns out to be Turing-complete, and the protagonist creates a LISP evaluator in magic, which enables them to outcast their enemies who are still doing the magical equivalent of writing assembly.
For completeness, we should review the involuntarily uploaded data as well.
You’re not the boss of me now!
Won’t someone please think of the children…'s unkicked faces
Check out git-annex: https://git-annex.branchable.com/
It’s super cool if you know git. It lets you track where your files are without having them all in the same place. You could have a bunch of disconnected hard disks, and git-annex will remember where you put your stuff.
You can also set a minimum number of copies and it will only let you delete stuff from one place when it’s sure there are sufficient copies elsewhere.
I do not recommend using the assistant (edit: nor the webapp) if you’re planning on ever reviewing the repo’s history. It generated a bajillion automatic commits that drown out any handwritten commit messages.
Haha agreed, if we’re talking about kilobytes of missing data brute forcing is intractable.
There may be structure to exploit in the data format. E.g. if you’re recovering missing content from a book written in English, you can probably get away with enumerating only printable ASCII and 90% of the letters will be lowercase.
But practically, I am unconvinced because the information density is pretty high on the kinds of things people like to torrent.
On average it’ll take 2^(n-1) guesses to reconstruct 2^n bits, so… depends on how many hashes / sec you can do.
Meanwhile, ChromeOS 120 is off the scale
Ahoy, FlavoredButtHair truly embodies the pirate ethos
The fun thing is that it’s basically unquantifiable how large the risk is. We only know about vulnerabilities after we find them!
If TPB tells you to download a malicious MKV file, it might be specially crafted to exploit a vulnerability in your video player. For instance, VLC had a vulnerability in 2019: https://www.videolan.org/security/sa1901.html
DRM = Direct Rendering Manager, in case anyone else was thinking Digital Rights Management…
https://en.wikipedia.org/wiki/Direct_Rendering_Manager