--- overview --- pile-on. the following are a wide range of examples of everyday situations that could have crypto relevance, in one way or another. the purpose is to share a view of how large the fundamental questions are, beyond a software/hardware and computer model to perhaps question the assumptions of where the boundaries are, especially as it is decided upon in a fixed set of [signs] via code and programs, versus what i propose is to deconstruct to the most minimal structures, circuits and models and hypotheses that become the code, in a diagrammatic pattern language versus linear sign-based system. thus more like molecular sculpture, programming, in testing and evaluating ideas from the period table, via logical reasoning, than an issue of rationalization of a private finite bounded binaristically determined view that is detached from actual reality, separated from it, substituting for it. this is a problem of language and meaning and the limits of linearization both in terms of writing/reading though also computationally, in serial processing of, what amounts to a false singular perspective made up of fragments of relativism yet not rigorous enough to achieve grounded empiricism due to error reliance. thus, the gap in questioning and interpretation as it may relate to fields and ideas beyond the ordinary consideration. also: it is to assume cryptographers in their natural state may actually think in these terms (dimensionally) though it may not have a place in code as code or analogous encryption approaches due to a particular technical approach, if over-focussed on subjective mathematics and out of balance with the larger questioning of signs and their relation to reality, this as language based on logical reasoning, both mathematical and 'cultural'. in the way crypto may reference books via hidden patterns, to decipher messages, it is presumed this is more the foundation of the discipline than flawed technology. and thus more a reminder of its depth and range of operation, than finiteness. --- aesthetics --- the false perspective can be tricky, images deceive- who figures the effortless grace of a Cary Grant presidency would front for an illegal crypto dictatorship, another hidden order plotting against citizens behind the iconic, oversaturated stars and stripes of the US flag, emblem of patriotic ideology that all are safe, there is nothing to worry about, while people are actively being ground into dust. the image can lie. it can misrepresent. [signs] that are pattern matched can be subverted, appearing to be one thing while functioning as another. this is why testing hypotheses versus blind faith in theories is a required for vigilance. [sign.A] can transform into [sign.B] yet appear still as if the [sign] itself, unchanging, yet if the context or dynamics shift, its meaning and purpose can also. it is as if there is no awareness of what observation is, a pre-literate condition whereby populations are not educated enough to distinguish their or others ideas in a grounded framework. and critical to this is the concept of perspective, the physical relationships that establish viewpoints and boundaries. for instance, if a neighbor listens at the wall to monitor another person, who is simply typing at a computer and not making any disturbance that could effect them, yet this neighbor knows what they are typing is 'wrong' and disturbing and could in turn retaliate to stop the activity. this also is an issue of perspective and boundaries, where the right of privacy of a tenant is disregarded by a neighbor who instead surveils and exploits this as a means of political harassment. a line or boundary has been crossed, the law disregarded, and this can also happen with government, if it too monitors and disallows legal activity that seeks to shut down activity it deems 'wrong' to its particular limited agenda and viewpoint, and in this way ignoring the constitutional rights of other citizens as the default. meaning of words and concepts and symbols demarcate 'the lines' or trajectories of logical reasoning, they need to be validated and error-corrected and watched over to maintain a proper relationship, yet if this oversight fails, an all-seeing perspective that is actually very limited and based in false and biased views can become 'the public' framework, yet function against this public via corruption of these same frameworks and processes needed to maintain a shared public state. The Republic by Plato describes various forms of government as one type leads to another and in this, democracy is said to lead to dictatorship. of various other forms of governance, say aristocracy or communism, it is proposed in a context of empirical truth, that if 'truth' were the basis for governance of human citizens in a human state, that these various stages of governance could all function on the 'same side' of truth, even while configured differently. and if truth were the basis for relations, and its error correction, then perhaps these various forms of governance could error-correct known failures in these same systems. in this way it is hypothesized that the truth in European nations is not against truth in other areas, and the truth in Russia and truth in China is not inherently against or opposed to the truth in the US or Canada. and thus so too issues of crypto. in that, 'shared awareness' and 'shared truth' may have a different boundary than the nation-state and each state could function with 'shared lies' as a challenge which is common across borders as well, and maps into another framework than the state is organized around in its traditional terms. thus doubling of function, potentially, inside and outside, to deal with these dynamics both near and far. it would seem that human identity is the basis for this assumption that such shared empirical observation could occur in a human framework, to resolve discrepancies occurring internally and externally and provide a means of accurate feedback in regards to shared principles and the ability to evaluate and correct errors in a common framework based in shared truth, tested and retested against the evidence. what is particularly of interest in this is the role of symbolism that spans all states of the world, especially in a realm of flags and other representations of a people or culture, potentially as signaling systems referencing common elements. for instance, colors or stars or birds, as these structural /signs/ may change country to country yet reference or communicate via similar symbolic elements. likewise, each country or region may relate in particular frameworks for cuisine and local customs, including clothing and zeitgeist, as modern and traditional influences may be mediated uniquely in a given context which can also heavily depend upon geography and connectivity, which can lead to routes unchanged over millennia, more closely connected to the ancient past than the unfolding future. and that there is truth everywhere and truth to be learned from these various people and perspectives about existence and the nature of being and perception. that perhaps they know things that are beyond another's limited boundary and thus listening and considering the ideas is an important process in human relations, as it relates to truth and evidence and what exists versus what is believed to exist. and that deep human connections are possible in opening up and allowing for this dialogue and evaluation of hypotheses in a shared framework based on and guided by truth itself. where each perspective counts in the truth it exists within. and that 'higher truth' as a principle must be accounted for likewise, fundamentally. that some truth is hierarchical and its structural capacity must be recognized and respected, versus deferring to lesser truth and less accurate interpretations. in this way, truth establishes actual power. its corruption weakens and dilutes it. it is something to consider then, when a national dish or symbolic [sign] are corrupted or subverted -- say the main ingredient in hotdish of a given culture is being poisoned somehow as part of a hidden agenda. or that an apple is so loaded with chemicals and various drugs as to be sickening, yet remains a symbol of health ('an apple a day keeps insurance and healthcare in perpetual play'). what if the kielbasa is spiked at the factory. or the water is loaded with unfiltered psychiatric run-off and windshield wiper fluid. or mothers breasts transit Zoloft to newborns. at what point of disjuncture may these dynamics be considered corrupt in their pre-existing interpretations and requiring of new evaluations to get at what has changed and what is going on behind the curtain of hidden, secret state and its antihuman agenda. how can an appearance remain unchecked which has been subverted so that it stands against itself as its own [anti-sign]. yet this a=b condition becomes an issue of allegiance and ideological alliance, as if litmus to separate the canaries into the psychiatric system while funneling the rest into the awaiting cattle chutes. silent, passive, easily controlled, compliant, ready to be led to their demise while helping the process along and getting paid for it. what are the security issues involved and secrecy required for such events to occur yet be off the cultural and communications radar. where is the feedback or critical evaluation in a larger human context, versus fragmented relativisms that focus here or there in specificities, yet cannot seem to make tangible a standing conspiracy to overtake the world and turn the earth into a slave prison-planet. in that sense of civilian world war, it is curious what individuals might think about in terms of the stakes involved, life and death scenarios as the situation becomes increasingly clear. what happens when people are set against one another in barbarian-like mindsets and pre-literate and illiterate frameworks. might not issues like tattoos become areas of populist contention, where those of differing natures seek to regain the meaning of their signs, no longer observing boundaries of respect for unlike others, whose tattoos by comparison may be their devaluing, or seek to signify what they really are not- and thus a stand-off could occur in such strange realms. or, those with piercings as a security issue, if say there is a sudden appearance of torturers in the population, against the opposition, where having battery hookups on various body parts is inviting such exploitations. would you walk around in a thunderstorm in a large field with a metal antenna strapped to your head? what about walking around with 'security exploits' in times of war, inviting the oppositional imagination to consider the worst, given the specifics. and so too, the increasing primativisation as a cultural trend, whereby ear plugs and flesh tubes seemingly emulate villagers of particular cultural traditions as if a style or extension of a fashion or aesthetic movement. the issue involved is also of a potential security exploit- what might someone do with that, against a person, as a weakness or if they relate to it as a threat of profanation of the shared values. and there is nothing to stop the stand-off between these people. i cannot help but think of college hazing gone wrong, where a U-Lock could easily capture a person against a pole via their earlobes and there could be no way of escape in a given scenario than ripping your own ears open and having flaps from the stretched condition. and yet- there are vast many people who despise these kinds of transgressions, in cultural terms, for signifying a devolving culture. what if such aesthetic choices are security choices. what if they could lead to other interactions eventually in a changing context, and the 'shared awareness' is simply the result of an absence of error-correction for the group, and that such a group may have limits on some issues, which could align with certain principles. in that, it is highly likely many are in these contexts and require adaptation to cultural dynamics, and so may be self-aware about the deeper divisions this may involve in 'shared awareness' in terms of aesthetics, or as aesthetics divide groups and individuals from one another. as if a stage play and costumes for different characters and their roles. and that this must be acknowledged. and yet so too there could be ideology involved, beliefs that could be fundamentally false or wicked or antihuman even, associated with similar signage and associated or related practices, given the particular individuals and groups so aligned. and in this way, like a freeway sign or marker offering direction, these iconic [signs] and the observational processing of symbols establishes certain relations and is involved in establishing and maintaining specific limits, boundaries, and rites. the rock-opera film Quadrophenia is an interesting contrast between the aesthetics of mods on vespa scooters and leather-clad rockers on motorcycles in the UK 1960s. the contrast between the Beatles and the Rolling Stones likewise, in some way. it involves aesthetic communications and symbolic language of artifacts, actions, and ideas, cultural practices that can eventually run in parallel or even against one another, say if biker gangs go to war over territory. graffiti or [signs] can be part of this infrastructure of hidden communication that may otherwise be missed by those outside the shared boundary or framework of interrelational awareness. so an issue such as hairstyles, such as the mohawk from the punk era, versus in the present day, where it may be a different sign, potentially of conformance if the spirit of rebellion is only shallow, versus visceral challenging of order. and as language, how this may relate historically to earlier eras, peoples, and ideas. that there is depth to signs and symbolism, and thus literacy involves awareness and the ability and capacity to read and interpret these events in their depth, or to the depth available. and thus experience or knowledge can help in observation. in other words, there could be authentic signs and symbols, retaining an integrity and others that are mimicking this, emulating, or simulating the [signage] while potentially even standing against its depth, as an anti-sign, camouflage or label wearing, as status symbols or markers, these relations hollowed out of meaning and made superficial yet still potentially functioning and treated as if originals and not copies of copies which devolve via noise, and dissolve into greater falsity. what is a sign that only references itself? or self-aware self-referencing. what if to some extent it is a form of advertisement, marketing, instead of ideas it is about consumerism, for instance, replacing cultural depth with its commodification as a result of increasing development of illiteracy in a context of mass populism. such that the TV extra or stand-in or "bit part" becomes a kind of vocation, just like a person can decide to become a heroine user and make a living as an addict, because the clinics and programs need them to justify their own existence and thus a lifestyle can be sustained by various choices, say versus another line of work. such as focusing on human problems beyond the self and making huge sacrifices on behalf of the group, and taking beating after beating in doing so. maybe it is an issue of broken people again, yet at some point there is also a choice and again a boundary issue- a critical moment, and making the wrong choices distinguishes one group from another, and it is proposed The Moment of Truth is this demarcation. whose to say that if a government falls and functions in its worst vices against its own citizens, that those on the inside of its internal organization are also not the same group protected in corrupt society - such that surveillers and those going after people, setting them up or gathering evidence to take them down, are not themselves the pedophile networks and child abusers and misogynists who most benefit from this devolved condition, seemingly of a shared political agenda even. and so what if the [signs] are not accurate for what may actually be involved or the network of signs are not allowed to be established or referenced for shared navigation because this territory is already encrypted and under control, via these same hidden and hostile forces, operating beyond the existing boundaries. what if there is a plague or epidemic of moral collapse that is the rotten core of the rogue state and its antihuman agenda and that at its center is a concentrated network that is organized around principles against citizens, education, law, freedom, human development, family, marriage, nature, as part of a conspiracy. and yet this very situation could also have been devised as a trap, with a dual plan that both allows for this maldevelopment in order to annihilate it within society, and thus complex and contradictory cryptography also exists in this same context. --- further note on aesthetics --- regarding issues of individual style, the film Tinker Tailor Soldier Spy, released in the past few years, was an interesting evaluation of the dress of those whose business it is to operate in the realm of secrets and national security issues. it is almost that dress is occurs thoroughly at the midpoint range, in an ambiguous realm that is neither completely common nor singularly identifiably unique. and thus blending into a surrounding population, nondescript perhaps, not standing out as a benefit for those moving between realms amongst others of different domains. what is interesting is that there is value to camouflage yet also the potential for small details, that establish identity in a minimal or traditional framework than needing to establish this as extreme individualism or group activity, though that likely has its place equally so, given different context. though it would appear an issue connected with identity and shared or unshared awareness, if the focus is on maintaining costuming or being removed of its additional requirements. perhaps for some the tradeoff is necessary or critical, yet for others it could be that their anonymity is part of their security and safety protocol. as a [sign] they may become ambiguous and unnoticed in a particular context, in that their extreme sport is bloodsport and yet no one may be the wiser of such activity. another film, The Company (2007) with Michael Keaton as the head of a mole-hunting counterintelligence unit, an orchid lover known as "mother", conveys this symbolic dimension likewise in a larger symbolic framework that cultural communication inherently exists within, as the context for shared meaning via language. and thus if [signs] are mediated in this way as a way of conveying stories, why would they be limited in this same depth in a realm of computation involving such [signs], unless of course this is not the case and other approaches exist within crypto. this has been a futile attempt to reference the [signage] of self as signifying a certain algorithm reading by others, in a surrounding culture, as the boundary for shared or unshared awareness. it may be a haircut, a suit, color or style of clothing, shoes, tattoos or body piercings, though at some point these are patterns that are matched against others, such that a 'hacker' is represented by a particular style or school of thought, and defined aesthetically. or programmer, or covert operative, or cryptographer, or technocrat, or artist, or activist. and there seems to be a corrolaly here, potentially, between these same issues of superficial crypto where a BIG SIGN is put up saying: HERE IS THE HIDDEN SECRET!!! and so sometimes a style can develop that begins to represent a hacker, say, with stickers all over their laptop, and the ability to run scripts and vandalize and steal passwords, and yet they may be operating in a different realm from those of the 60s onward, who are part of a different language, and 'hacking' could have become a popular group activity, normalized, not radicalized in the same way, in that it is thoroughly profitable and aligned with policies of development say, and so the 'alternative may have become the mainstream' yet view itself as standing apart in some critical way, which is signified by ritual practices, conferences, clothing or hairstyles or music, etc. an anthropological study probably would be needed of the subculture versus a naive guess at what may be involved. excepting that 'popular signs' of hacking appear to coincide with existing politics, where exploitation of other citizens may be occurring by script kiddies and others who are benefiting from this societal breakdown, versus goals of a higher purpose that may remain in the underground, and those who are not craving to be up on stage. it is just that, a particular shallowness and hollowness to certain disciplines appears to exist - including with other realms such as architecture concerned with increasing heights of skyscrapers versus questioning, changing, or challenging city planning principles to address economic, social, or governance issues within building design - and yet in this superficiality, the [architect] is equated with those who before them did explore these dimensions and served higher principles that today seem absent in the development process, as if culture itself has been subverted, hacked, rooted, taken over and sent in another antihuman direction. and so someone may stand-in as an [architect] and look the iconic part, yet serve other principles and effectively function in masquerade, hiding another agenda. and so in a 'landscape of difference', of wildly diverging styles as if freedoms of people to be who they really are, conglomerate around computer monitors and there is a class of programmers who can manipulate computers and develop software and maintain systems -- and yet the gap is only widening at the same time these same types are playing foosball or raving with friends and eating expensive food, while operating in a realm potentially associated with 'hackers' or those who are standing-in for an idea that tended towards human liberation via technology, and not its confinement, whereby these same technologists in their lifestyles and their stylistic code of hair, jewelry, clothing, and tribal customs appear to actually represent the [anti-sign] of the previous hacking ethos in its larger purpose and calling. such as the potential of the internet, versus monetization. as if the very idea and imagination of this online context has collapsed into a trapdoor beneath center stage, where advertisement and marketing rule everything in a no-exist dungeon scenario, and these of simulated radicalism and emulated individualism are actually ~Garden of Earthly Delights minions, an occupying force that is developing an antihuman agenda via hardware and software as an unchecked business model, with no greater expectation of individuals in their capacity. so a [sign] can look like something or have appearance or claim to be equivalent to some defined meaning, and this may be pattern matched even -against itself-, and yet if it does not correlate or ground to a larger context of truth this same 'naming' could be superficial or subverted, and instead be [anti-sign] instead, whereby pseudo-truth moves to falsity in an unshared perspective, beyond the protected boundary where skew and distortion, bias and warping are unaccounted for and allow belief to function as truth, a bubbled interior realm, potentially that of unchecked egotism and narcissism in place of substance of the claimed signs. in this way, issues of language-- it confuses what the sign references with the sign (its attributes) itself, as if wearing the costume equates with the role, acting versus being. knowing versus pretending or mimicking to some extent or another. it is like comparing a programmer who knows 50 computer languages and has designed their own, versus someone who has done some C++ and can run malware scripts and do bug exploits, where both reference the same [sign], in a context of shared truth. and if this is unaccounted for, then a vast bubble culture may exist, which is then extended into code, as an illusion is sustained about the basic nature of things, technological, ideological, institutional, computational, philosophical, though most especially political. the power dynamics operating in these domains and the active high-voltage structural circuits relied upon for day-to-day operation of this exploitation, versus other parallel plans remaining hidden. the potential for the greater truth, discharging the covert super-capacitors in each discipline as the motherboard of state rewires and reprograms its territory. --- trading the paperclip --- an artifact can function as language. its relation to its context is important, as this establishes or changes meaning. an item can be placed in a museum and the way it is observed can be transformed, such as Duchamp and the Fountain urinal, signed by the artist, thus recontextualizing it, establishing a new context, meaning, way of relating and interpreting the artifact within new dimensionality. (reframing) a particular artifact i find especially interesting is the ACCO Ideal butterfly paper clamp, it is an innovative, functional, highly aesthetic style of paperclip that has always reminded me of electric transmission towers. those giant metal armatures crossing continental landscapes, carrying the AC powerlines that deliver high voltage power from its area of generation to its areas of consumption. in many ways representative of the federal level of the state in its civic quality. thus there is a potential transference of the icon of the transmission tower into the smaller scaled context of a similarity or likeness in a type of paperclip, which may or may not be recognized by an observer who readily uses the artifact. and this is to suggest that, like a business card or a calling card, such an artifact could function as a token in its symbolism, if valued, and also as [signage] that is recontextualized by its surroundings. in other words, it could function as a cryptographic key potentially, or shared key, or cipher system, depending on whether or not these encounters with 'networks of power' are noticed by an observer who can relate to their meaning, or who is bounded in awareness. in other words, the paperclip can have a kind of currency, both as a material object and "informationally" as a form or basis for data exchange, of ideas, as it relates to shared awareness or as a basis for communications. and this could and does occur already with other artifacts in the realm of symbolic communication that as a practice is perhaps best zoned in paracrypto relations, non-verbal, rich with meaning, adept in language, yet likely unnoticed by those outside its limits. so there is a famous instance of a paperclip as money, where a single paperclip is exchanged and the person eventually ends up with a 2-story farmhouse... One Red Paperclip http://en.wikipedia.org/wiki/One_red_paperclip this is not the same idea, though it gets at the current involved in transactions around a common object in terms of shared value and exchange. yet this can occur informationally, where the paperclip instead is a symbol or sign of language, and can establish communication and transmit ideas, potentially. and thus transfer data or awareness or provide insight. it is like a silver bullet placed at a crime scene as this relates to its perpetrator. or an assassin who puts pennies on the eyes of their victim. yet also not of this same deathly realm necessarily, it could instead belong to a realm of networking or connection between peoples or indicate certain parameters which may or may not be valid, given its source. so such an artifact could be used for communication and carry insight in its use and application, whereas a mimic or subverter may attempt the same yet it could be hollow or shallow or misleading, and in a sense, 'collapse the wave that carries the signal', thus indicating an ungrounded relation or compromised instance. in this way, the paperclip of ordinary design can represent this tradeability as language, by its use as exampled in the url above. and yet in another mundane environment it may be just like another penny on the ground, so infinitesimal that it is beyond notice, as if worthless and subconscious unless needed for use. and yet another style of paperclip, the butterfly paper clamp, has a symbolism that goes beyond itself as an icon and maps into another structure (electric transmissions pylons) and in some sense can represent these as language, and in a sense, symbolic currency even. in that to share the artifact could function both by itself as a symbol, though also in a context of surrounding environment that may function in and reference an embedded context, as a [sign] in relation to other [signs], and this is how sentences or more in-depth meaning can be formed beyond the singular event of 'the symbol' (pylon!) and into statements involving or extending its meaning, to some threshold of what is possible to communicate in an abstract realm, given surrounding structures and frameworks of an observer. in this way an errant paperclip or other symbol strangely located in a context could call attention to itself through its uniqueness or out-of-placeness, and in questioning its existence, strange or covert communication could take place in hidden channels of awareness, beyond the boundary of others. and in this way, who placed the paperclip or how it got there could remain a mystery, it could even involve a hidden hand with root access to establish such scenarios, and this can be a way that crypto-communciations occur in what can be a paranormal realm, as statistically unlikely events stack up one after another and establish an entire universe of non-verbal communication via symbols and signs, in precisely this way. there is magic involved, and this connectivity transcends the limits of computers and hardware and software devices and is primary in establishing human relations, and advancing shared awareness via referencing truth within empirical frameworks, using fundamental principles and concepts of language, via this hidden calculus. this is the same idea involved in transmuting the word 'cipher' into 'cigar', it is of a similar process of the actualization of these concepts in the everyday environment as an artifact functions as a cryptographic key or message yet may remain unnoticed in these dimensions by others. it is proposed that this Strange Read/Reply Function (SRF) could be a way of annotating such extra-dimensionality via reinterpretation, misreading, errors, mistakes, misunderstandings, or other mutations of meaning that recontextualize yet expand or alter the original condition and perhaps provide additional insight or bring into question its meaning, via this dŽtournement. optimized plagiary or [recoding] or [overcoding] or a way of accessing subtext via another method of deconstruction. thus opening up interpretation of the text beyond the limit of its referenced [sign] to its potential or range of [signage], so to evaluate ideas and allow relations beyond the preconceived boundaries, to access hidden dimensions embedded within the deep structure of the code, its intersign armature. in this way at the intersection or juncture of architecture and archaeology, past and future meeting in the present. do observers relate, and in what structures, frameworks, dynamics. what is the potential, the boundary, the limit. how to access the greater truth of N-dimensionality, the nonlinear in linear context. and thus a conceptual tool to potentially reassign the sign to say more about it, as this may relate to sets and multisets as parallel, co-existing computations. perspectives or frames that potentially have a lot to offer traditional views, such that the ephemera and errata could be critical in establishing grounding where the assumptions of normative practices related to sign-based communication (as linear calculation) and correct interpretation may make it off limits, by default of being wrong or breaking rules of grammar and-or syntax, versus to acknowledge and allow the potential for meaning where it exists, unearthed. --- on randomness --- it has not adequately been conveyed that artists and artworks can be expert at this signaling and data exchange via symbolic communication. and this extends into the entire ecosystem of gallerists and museums and auctioning of paintings during critical periods, where for instance The Scream will suddenly dominate the global news cycle -- this becomes a form of widely distributed communication -- not only in terms of 'selling the paperclip' and instead the other parallel aspect of using this artifact as a shared reference, a world line by which other dynamics may be aligned or effected by its force fields. including art heists likewise. or newly discovered painting, such as the recent Van Gogh painting of a pot farm. previously introduced to the ideas of John Cage regarding his use of the I Ching to generate randomness, i was unable to appreciate its value as a way to mediate questions of architecture instead of engaging social issues within design ideas. and i probably am still too limited to understand its actual relevance in that domain. and yet in a context of cryptography this same technique could seemingly allow another RNG approach and thus is mentioned here for those it may interest. composer John Cage - chance operations http://en.wikipedia.org/wiki/John_Cage#Chance similarly yet differently, in relation to this, graphic symbols could potentially also be used in a roulette approach for randomness, slot-machine littoral: symbols graphic search http://www.symbols.com --- urls --- some additional content related to previous ideas... animal prints confusing zoo animals (a=b) http://ca.news.yahoo.com/blogs/daily-buzz/uk-zoo-bans-animal-prints-because-... The Science of Stress, Orgasm and Creativity: How the Brain and the Vagina Conspire in Consciousness (human code) http://www.brainpickings.org/index.php/2013/09/23/naomi-wolf-vagina/ Naomi Wolf and Jim Pfaus talk sex // ^related http://www.youtube.com/watch?v=0Ttrb-97tFA The Phases of the Moon http://www.pinterest.com/pin/178525572702339653/ Plumage // note: politics and style (ref. symbol dictionary for more info) http://www.mnartists.org/work.do?rid=339423 ☷ ☶ ☱ ☲
On Sun, 2013-09-29 at 01:06 -0500, brian carroll wrote:
another film, The Company (2007) with Michael Keaton as the head of a mole-hunting counterintelligence unit, an orchid lover known as "mother", conveys this symbolic dimension likewise in a larger symbolic framework that cultural communication inherently exists within, as the context for shared meaning via language. and thus if [signs] are mediated in this way as a way of conveying stories, why would they be limited in this same depth in a realm of computation involving such [signs], unless of course this is not the case and other approaches exist within crypto.
This is an especially poignant comparison point considering the relative lack of study of new AES modes. -- Sent from Ubuntu
I am becoming convinced Brian is using this list as a steganographic channel using steganography and english mimic functions based on some corpous of text (eg using markov chains - its surprisingly effective if you try it, given the complete lack of actual textual understanding of the model). Adam On Sun, Sep 29, 2013 at 01:49:48PM -0400, Ted Smith wrote:
On Sun, 2013-09-29 at 01:06 -0500, brian carroll wrote:
another film, The Company (2007) with Michael Keaton as the head of a mole-hunting counterintelligence unit, an orchid lover known as "mother", conveys this symbolic dimension likewise in a larger symbolic framework that cultural communication inherently exists within, as the context for shared meaning via language. and thus if [signs] are mediated in this way as a way of conveying stories, why would they be limited in this same depth in a realm of computation involving such [signs], unless of course this is not the case and other approaches exist within crypto.
This is an especially poignant comparison point considering the relative lack of study of new AES modes.
On Sun, Sep 29, 2013 at 11:53 AM, Adam Back <adam@cypherspace.org> wrote:
I am becoming convinced Brian is using this list as a steganographic channel using steganography and english mimic functions based on some corpous of text...
please keep noise on the medium to a minimum ;)
(only following orders...) guess will find out how many anarchists it takes to kick me off the list... :L On Sun, Sep 29, 2013 at 4:04 PM, coderman <coderman@gmail.com> wrote:
On Sun, Sep 29, 2013 at 11:53 AM, Adam Back <adam@cypherspace.org> wrote:
I am becoming convinced Brian is using this list as a steganographic channel using steganography and english mimic functions based on some corpous of text...
please keep noise on the medium to a minimum
;)
On Sun, Sep 29, 2013 at 3:54 PM, brian carroll <electromagnetize@gmail.com> wrote:
... guess will find out how many anarchists it takes to kick me off the list...
this is a false assumption; anarchists would not kick you from a list. just how "anarchist" this particular instance of cypherpunk list is, is however, an open question. *grin*
On Sun, Sep 29, 2013 at 5:55 PM, coderman <coderman@gmail.com> wrote:
... just how "anarchist" this particular instance of cypherpunk list is, is however, an open question.
... the authoritarians hang out on cryptography@metzdowd.com ;P
5:55 PM, coderman <coderman@gmail.com> wrote:
... the authoritarians hang out on cryptography@metzdowd.com
yeah- heard it through the wire its a rough crowd over there... not worth being stabbed by a ham while walking down the street also, best to avoid the pyre if at all possible, re: fool/fuel use has me wondering about the two crypto lists in conjunction, if a census has been conducted or online survey for background in that, seemingly there are two or three main areas i am guessing for crypto backgrounds-- those from the military, those from academia, mathematics and-or linguistics, & those from computers/webdev for instance, percentage of ham operators in given age ranges how many had a parent with electronics or engineering background how many approached via software development online or pre-internet it would be interesting to know how the list populations are different e.g. perhaps older, military trained crypto at the cryptography-list more computer-based, software development crypto at cypherpunks also in this same regard; how many learned electronics during era of crystal radio building etc. or other DIY independent exploration or homebrew computing or are now involved in microcontrollers today, etc. and in this same way it would be interesting if more projects/classes/ education could occur for electromagnetic literacy in electronics today as a foundation for both knowledge and skills yet also experimentation, prototyping, new code, programming, proof-of-concept crypto systems that move from ideas into hardware and software models, vice-versa
I'd be really, really impressed if this was really a stego tool's output. Is it really possible to build systems that can generate mostly-but-not-entirely grammatically correct sentences about a specific topic with meaningful progression between subtopics? On Sun, 2013-09-29 at 20:50 -0500, brian carroll wrote:
5:55 PM, coderman <coderman@gmail.com> wrote:
... the authoritarians hang out on cryptography@metzdowd.com
yeah- heard it through the wire its a rough crowd over there...
not worth being stabbed by a ham while walking down the street
also, best to avoid the pyre if at all possible, re: fool/fuel use
has me wondering about the two crypto lists in conjunction,
if a census has been conducted or online survey for background
in that, seemingly there are two or three main areas i am guessing
for crypto backgrounds-- those from the military, those from academia,
mathematics and-or linguistics, & those from computers/webdev
for instance, percentage of ham operators in given age ranges
how many had a parent with electronics or engineering background
how many approached via software development online or pre-internet
it would be interesting to know how the list populations are different
e.g. perhaps older, military trained crypto at the cryptography-list
more computer-based, software development crypto at cypherpunks
also in this same regard; how many learned electronics during era
of crystal radio building etc. or other DIY independent exploration or
homebrew computing or are now involved in microcontrollers today, etc.
and in this same way it would be interesting if more projects/classes/
education could occur for electromagnetic literacy in electronics today
as a foundation for both knowledge and skills yet also experimentation,
prototyping, new code, programming, proof-of-concept crypto systems
that move from ideas into hardware and software models, vice-versa
-- Sent from Ubuntu
nothing out of the ordinary here. nong shim, black, gourmet spicy, kimchi On Sun, Sep 29, 2013 at 9:01 PM, Ted Smith <tedks@riseup.net> wrote:
I'd be really, really impressed if this was really a stego tool's output. Is it really possible to build systems that can generate mostly-but-not-entirely grammatically correct sentences about a specific topic with meaningful progression between subtopics?
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 9/29/2013 7:01 PM, Ted Smith wrote:
I'd be really, really impressed if this was really a stego tool's output. Is it really possible to build systems that can generate mostly-but-not-entirely grammatically correct sentences about a specific topic with meaningful progression between subtopics?
I'm sure you have seen this by now: http://spammimic.com/ - -- -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.20 (MingW32) iQEcBAEBAgAGBQJSSOX6AAoJEDMbeBxcUNAeXNYH/RjMV+JimIfacDG6xJTi1Ylj MYP43JDEupbYytOxx4O1NemhKx0mstZW400oBJ0n0f0vMC7Vgb9CbG1lHLu4MVrB VERdOzokOV4yYRMLvqCVQHSlqw1NV0KD7hfKiAse75SQeDypfPN416oGhtjOldzw RlqBDQhXhE0cXdCDKEb9T1wimLBPN+U6XCSjCPd2cDa8TWk73VJVhHBmPhj2ijRd yqzUFakhL6w9ESd4XY4sj3V0mR7LNRy/lh0iJr2JkVxvBtM4MoVX1U5o+AO61ffw YZUVjCNsBSIUzLNVYzVhmXQyRw08hEvVMlobSK6km8CCR2eT0qQ1A91dGVMIhZA= =evGz -----END PGP SIGNATURE-----
On Sun, 2013-09-29 at 17:55 -0700, coderman wrote:
On Sun, Sep 29, 2013 at 3:54 PM, brian carroll <electromagnetize@gmail.com> wrote:
... guess will find out how many anarchists it takes to kick me off the list...
this is a false assumption; anarchists would not kick you from a list.
This assumes a non-existant model of anarchism; anarchists would be quite willing to kick people from lists, for a variety of reasons. Anarchism is a political movement and ideology with a long history, not just some juvenile ~no rules~!1! caricature. -- Sent from Ubuntu
On Sun, Sep 29, 2013 at 6:41 PM, Ted Smith <tedks@riseup.net> wrote:
... This assumes a non-existant model of anarchism; anarchists would be quite willing to kick people from lists, for a variety of reasons.
i disagree; and particularly not for posts that brian has made.
Anarchism is a political movement and ideology with a long history, not just some juvenile ~no rules~!1! caricature.
interesting that you assume this is my understanding... [ we could get into a long discussion of the various *-anarcho-* philosophies, positions, and norms, however i'd prefer to focus more on the crypto and less on the social... ]
On Sun, Sep 29, 2013 at 11:03 PM, coderman <coderman@gmail.com> wrote:
... [ we could get into a long discussion of the various *-anarcho-* philosophies, positions, and norms, however i'd prefer to focus more on the crypto and less on the social... ]
last tangent on the subject: the interesting (to me) aspect of various anarcho philosophies are related to decentralization and avoiding diffusion of responsibility. this is why i implied that on an un-moderated, anarchist leaning list you (as an individual) would simply filter / plonk those who provide nothing interesting to the conversation. you would not rely on a third party authority (like the list maintainer) to enforce your personal preferences. are there limits? of course. but we're no where near them, IMHO. best regards,
participants (5)
-
Adam Back
-
brian carroll
-
coderman
-
d.nix
-
Ted Smith