What’s up today? (Part 2)

this approach borrows the +1, 0, -1 elements from ternary computing first developed in RU Setun ternary computer first built in the 50s

2 Likes

I don’t really get it though. If adding a sign, then that seems to me the same as adding another bit – no? … and as zero isn’t negative or positive, rather than +1,0,-1 (ternary), it seems like it would be better to use that extra bit to have (00,01,10,11) so quaternary instead of ternary.

But I’m probably missing something, perhaps it’s a method to accelerate the computation?

1 Like

it is known to accelerate compute, IOTA uses ternary in their PoW powered DAG for speed and security reasons to handle massive nano-payment use cases, that said IOTA is a bit lost, they made their money early…

1 Like

those interested in how the biggest organism in the forest works “orange forest slime mould”, will pick up some important ‘encoding’ concepts likely useful to Autonomi’s development and ultimate transformation of the Internet into Internet 2 over time… video starts where their ‘encoding’ discussion get’s interesting and possibly useful to Autonomi future ‘biomimickry inspired’ roadmap plans (sort of like Venom enveloping Spiderman, non? :slight_smile: )

2 Likes

another one with some insights ‘how slime moulds solve problems better than us’ :wink:

2 Likes

As a free-market Voluntaryist, I would be remiss if I didn’t point out that a truly free-market (no government intervention) economy is also a decentralized group intelligence. The State is just a boot stepping on the wee ants for it’s own purposes.

5 Likes

SETUN related ternary computer history… with some ternary math explanation, more power efficient too…

Revisiting Radix Economy. Finding the origin of the “optimal… | by Steve Weis | Medium.

2 Likes

https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094

3 Likes

Ssh backdoor (remote command execution, no ssh login logging left behind on the hacked system) with a lot of steps (spanning a couple of years) and obfuscation that went into it trying to implement it unnoticed. Also backdoor only usable if you have the correct ED448 private key.

6 Likes

Seems we dodged a bullet there by sheer good luck.

Everything I know about the XZ backdoor raises a variety of interesting issues that the OSS community needs to address.

What other similar attacks are planned/ in progress?

6 Likes

Mastodon infosec has covered xz brilliantly and with humour. My apologies to Arch users.

It’s also a decent use case for LLMs because the opsec was so good that it could be part of a set of tell tale characteristics which help identify similar supply chain attacks.

4 Likes

I’m glad I don’t use Discord. :wink:

6 Likes

I did laugh, but I don’t think Arch had it at all actually? Someone points it out lower down in that thread. Don’t think I’ve fully understood how it was (attempting to | being) spread though

2 Likes

Glad they sell ads otherwise it would be the users they sell.

It’s not an either/or. They might be selling user info too. Just another reason we need :ant: and apps on :ant: to replace the clear net.

7 Likes

Wow so this is apparently an April fools joke. You know I saw this at the top of my google news feed when I search for AI news! LOL

3 Likes

4 Likes

Anyone seen alternative sources of this info?

1 Like

Not specifically, but I’ve heard Iran has promised retribution for the attack on it’s embassy, so I would not be surprised.

1 Like

I am starting to get that boat vibe you and Neil have. Getaway from a bunch of toddlers throwing tantrums who call themselves adults running countries.

4 Likes