Re: [spam][crazy][fiction][random] Non-Canon MCBoss Spinoffs
living a mine field, a recasting of the unending mind control boss the
webcomic
[some corrupt and dropped]
day 1 ahhh what a nice minefield! I'm sure this will be a beautiful new home!
day 2 omigod why did we ever move into a minefield. omigod. omigod.
day 3 some (researchers, rebels, some experimentees) are learning to very carefully approach potential mines without getting injured others (other experimentees, torturers, super soldier) have learned to survive mine explosions these different abilities give the different two groups different sets of skills and powers as well as severe limitations
day 4 where the mines are changes over night. the places we think are safe become mined. is the minefield alive?
day 5 we broke into random groups and made different secret survival plans. only some of the groups had their planned routes mined. we think some of our members might be doing the nighttime mining.
day 6 all the members of the groups that didn't have their secret routes mined woke up surrounded by mines
day 7 some of the people who got used to being exploded have learned to travel great distances by having one explosion propel them onto other mines, which then explode and propel them onto further mines, which then explode and propel them further. this can be useful! however, these people no longer seem human-like
[ ... day 8 dropped might come back to it later
universe idea partial premise part: 1. Dinosaurs were evolving spacetravel via hydrogen/oxygen bladders. This is where the myth of fire-breathing dragons came from. It is hidden from the fossil record because it was not encased in bone. 2. Other planets had already evolved biological spacetravel, and the cosmic object that wiped the dinosaurs out was propelled by aliens with primitive reptile-like behaviors, looking to suppress competition 3. Humans evolved in the aftermath. The reason for the presence of empires, wars, and rebellions in human behavior is to figure out how to handle rude and idiotic superpowers murdering everybody. Everybody has tiny size, big brains, and can use other matter for their behavior and information, because that's what survived the cosmic object that wiped out the dinosaurs. Example Scene? Picard is colonizing Mars when he is hailed. It's a giant space lizard as big as a --
universe idea
partial
premise part: 1. Dinosaurs were evolving spacetravel via hydrogen/oxygen bladders. This is where the myth of fire-breathing dragons came from. It is hidden from the fossil record because it was not encased in bone.
2. Other planets had already evolved biological spacetravel, and the cosmic object that wiped the dinosaurs out was propelled by aliens with primitive reptile-like behaviors, looking to suppress competition
3. Humans evolved in the aftermath. The reason for the presence of empires, wars, and rebellions in human behavior is to figure out how to handle rude and idiotic superpowers murdering everybody. Everybody has tiny size, big brains, and can use other matter for their behavior and information, because that's what survived the cosmic object that wiped out the dinosaurs.
[.. somebody killing you? write down what you know, put it in a bottle, and throw the bottle out to sea. dinosaurs could never ever do that! you have such a head start on this spacetravel shit!
Example Scene?
Picard is colonizing Mars when he is hailed. It's a giant space lizard as big as a --
“you receive your mail in your basement rather than a normal postal service?” “oh yes this is the cool and hip thing to do, it puts you in control of your own mail delivery” “how did you sort that out?” “well I had to get myself registered as a business address with the local post office, and ensure my basement met various codes for the postal worker to enter it, deposit mail, and leave. and now I have my own mail server in my basement!” “most people just buy a mailbox from a major provider and set it up in front of their house you know” “well yes but then you’re trusting others to secure it and
I might just get a national shitposting agency email address, it’s one of cock.li’s domains, seems my kind of thing I finally got my father to visit by setting up a gnuboot bios development lab on the bed he usually sleeps on. He has wired internet there, I have a bare laptop mainboard and some flashers and ribbon cables, power supplies, thick printed manuals, when I want to test a build I take my lcd monitor off one laptop and wire it to the bare mainboard, I have to be very careful not to jiggle anything
I might just get a national shitposting agency email address, it’s one of cock.li’s domains, seems my kind of thing
I finally got my father to visit by setting up a gnuboot bios development lab on the bed he usually sleeps on. He has wired internet there, I have a bare laptop mainboard and some flashers and ribbon cables, power supplies, thick printed manuals, when I want to test a build I take my lcd monitor off one laptop and wire it to the bare
and? what of it? 1 broken lcd was recycled, a 2nd was in use on an offline-only system, the 3rd has a broken backlight too flaky to be useful for troubleshooting, so there’s 1 lcd monitor I take off the dev laptop and put on the board being flashed. the board has to be completely removed to access the rom with cutting the frame, so I lay the lcd above it and a little overlapping and plug it in It works well cause there’s only 1 keyboard between them too, and the power button’s on the keyboard, so I removed my dev keyboard (laptop staying on) and plugged in an old usb keyboard, and I have my keyboard laying on top of the board being flashed loose and plugged in so I can press the power button to power it on (I took apart a broken keyboard and wired the power button but—
mainboard, I have to be very careful not to jiggle anything
oh! here’s the guix build script for gnu boot I have packaging efforts in progress but this works. I used it incrementally so it may need tweaks to resolve bugs for being used all in one go. note at the bottom it’s hardcoded to build a t60 bios, can change it but some things may have more dependencies this is simply very useful (imo, likely a rare one) https://bpa.st/FS7A from guix irc logs, looks like indentation was lost below :s #!/usr/bin/env bash if ! [ -d gnuboot/resources/coreboot ] && ! [ -d resources/coreboot ] then git clone https://git.savannah.gnu.org/git/gnuboot.git pushd gnuboot git reset --hard 39c70840617d2fd849284919232b0cc09384a96c # this was just the latest tip when I did this patch -p1 <<"PATCH_TO_FIND_UNIFONT" diff --git a/resources/packages/grub/module b/resources/packages/grub/module index 059035d..76cd8dc 100755 --- a/resources/packages/grub/module +++ b/resources/packages/grub/module @@ -43,6 +43,6 @@ cd grub/ # build ./autogen.sh -./configure --with-platform=coreboot +./configure --with-platform=coreboot --with-unifont=$GUIX_ENVIRONMENT/share/fonts/opentype/unifont.otf make -j$(nproc) ) PATCH_TO_FIND_UNIFONT # empty-line, i was thinking of removing the ada dependency tree-wide bvt wasn't certain how yet fi # vboot includes a hostside chromebook firmware tool that uses 64-bit array indices # propagating these 3 flags lets the build continue on my 32-bit system # patching vboot would be nicer. it seemed to be in the tree in multiple places. export CC='gcc --warn-no-stringop-overflow --warn-no-array-bounds --warn-no-restrict' export HOSTCC=$CC export PYTHON=python3 V=1 VERBOSE=1 if [ "$*" == "" ] then #bash "$0" make -C gnuboot \ # CC="$CC" \ # HOSTCC="$HOSTCC" \ # PYTHON='python3' \ # V=1 \ # VERBOSE=1 SELF=$(realpath "$0") cd gnuboot bash "$SELF" ./build boot roms t60_intelgpu else guix shell \ --preserve=CC --preserve=HOSTCC --preserve=PYTHON --preserve=V --preserve=VERBOSE \ -D hello autoconf automake bison ccache clisp curl flex font-gnu-unifont freetype \ git gettext graphicsmagick gtk-doc guix intltool libtool lua nss-certs perl \ pkg-config python python-2 ruby texinfo zlib -- "$@" fi
the jsonlike t60 file I sent perplexity is at https://0x0.st/K9vB.txt . the pin numbers in this file are incorrect. it was made with purpose-built code leveraging the reverse engineering work of others and the t60 boardview files available online. significant parts of the .cst file were not included in the reverse engineering data nor the jsonlike file. it may likely be possible to construct the correct pin numbers with more work, unknown. this was why i had not yet simply attached the file here. but i really plod, so here is a link if needed
might share code if doing so doesn’t make the project stop as can sometimes happen
noun, I am considering replying that your concepts sound very interesting, but the degree of disparity between the values and approaches and what concerns my life make it challenging to engage. I like ledgers myself. They help diagnosis of problems, including those stimulating [their criticism . I would love to learn more about this cool-sounding PDE stuff and zooko’s triangle. I bet there is a way to shoehorn an infinitely-expanding consensus ledger back in. A little to the side, there recently was an exchange around guix related to file sharing and content-based distributed stores. It’s interesting how that old Napster concern carries decades with us into the future, desynchronizing things like cryptocurrency and BitTorrent like a politically dissociated mind or government.
frogs, I’m getting sucked into cypherpunks woo The people need the systems of the world to provide strong anonymity and privacy for those who are weak and in need, and strong public transparency and accountability for those who have and exert power. Such that if y’get shot in the leg for noticing your global dictator getting coerced, you can still do something about it alone.
hi ummmmmm I don’t want to be posting but I’m having a rough day [morning spam sequence dropped] worried ais will harm me more using misbehaving device anyway made a really cool code recently! I was with the t60 magi board view files for like a week and i opened them up and annotated every binary field, so useful for learning about motherboard, and they have all the internal layers of the pcb there ! (except two?) the t60 logic board has 10 layers. there are like 60k copper trace line segments plus detailed shapes for each pad. but it’s not perfect. anyway _I made a kicad plugin to import the t60 boardview files_, it was really hard for me, never even used kicad before, didn’t have the dependencies to build it, etc etc …. annnnnd I ummm never got it to actually build :/ when I enabled my plugin it would complain about not finding a common glibc symbol, so weird and then all sorts of things went down and I tried to move to another property and got some kind of allergy attack and broke the storage cable letting me access my work and was overdosed on benadryl or something at an emergency room and discharged without motor coordination or a ride omigod but that kicad work was _almost usable!_ and now i don’t even have access to it to share it. But that might change
traffick boss is in trouble somebody noticed his left leg is actually a grafted kidnapped child with telekinesis and never actually touches the ground
when I have …. che,ocal-associated cognition changes maybe? … sometimes I have extended childhood flashbooks. my—
Anyway! ChatGPT, calculate me the square root of t. ChatGPT: “Uhhh
so! What are the t60 magi boardview files? I don’t really know. If you websearch for T60 schematics you might find these boardview files sometimes. There are two, .CST and .LST . The .LST file lists all the parts. The .CST file delineates the structure of the PCB. These are likely some internal format used by IBM back when they actually made thinkpads.
so! What are the t60 magi boardview files?
I don’t really know. If you websearch for T60 schematics you might find these boardview files sometimes. There are two, .CST and .LST . The .LST file lists all the parts. The .CST file delineates the structure of the PCB. These are likely some internal format used by IBM back when they actually made thinkpads.
It’s nice to work with a board where you have detailed data like this. The .CST file is broken into binary sections placed end-to-end with trailing metadata. Most sections are the same format: they start with a string identifying them, and an integer number of fields. The fields then follow with infix delimiter constants — that is, each section has some constant bytes, and these bytes occur between every field, but not after or before. Most sections have fixed-length fields, but not all. Here are some idiosyncrasies: - The list of net names follows the list of footprints without a section header - The list of board edge lines follows the list of copper lines without a section header - The list of shapes has variable-length fields and may be missing entries The list of shapes is the most complicated section. Each shape has a type and a list of parameters, which have different meaning depending on the type. Each shape has a unique number and some of the shapes reference others. However, the use of the shape list is not complicated. Each component uses the same types of shapes. So you don’t need the whole thing parsed to use it. Y’know I might be able to remember a lot of this if I keep typing unsure if I wo;;
so! What are the t60 magi boardview files?
I don’t really know. If you websearch for T60 schematics you might find these boardview files sometimes. There are two, .CST and .LST . The .LST file lists all the parts. The .CST file delineates the structure of the PCB. These are likely some internal format used by IBM back when they actually made thinkpads.
It’s nice to work with a board where you have detailed data like this.
The .CST file is broken into binary sections placed end-to-end with trailing metadata. Most sections are the same format: they start with a string identifying them, and an integer number of fields. The fields then follow with infix delimiter constants — that is, each section has some constant bytes, and these bytes occur between every field, but not after or before. Most sections have fixed-length fields, but not all. Here are some idiosyncrasies: - The list of net names follows the list of footprints without a section header - The list of board edge lines follows the list of copper lines without a section header - The list of shapes has variable-length fields and may be missing entries
The list of shapes is the most complicated section. Each shape has a type and a list of parameters, which have different meaning depending on the type. Each shape has a unique number and some of the shapes reference others.
However, the use of the shape list is not complicated. Each component uses the same types of shapes. So you don’t need the whole thing parsed to use it.
Y’know I might be able to remember a lot of this if I keep typing unsure if I wo;;
file name: magi7_41w0904.CST // so far i’ve only looked at this file! 0000-0010: 48 09 ff ff-00 00 04 00-43 44 65 76-05 4c 33 20 H....... CDev.L3. 0000-0020: 20 20 13 1c-e6 07 01 df-20 00 00 01-80 05 51 38 ........ ......Q8 Here is the first group of items called CDev. All values are little-median. // this header format is used repeatedly uint16_t num_entries; // 0x948 int16_t -1; // this is 0 in the trailing metadata int16_t 0; int16_t len_name; // 4 char name[len_name]; // “CDev” // now entries start at 0x0c or so uint8_t len_refdes; // same for each dev. 5 char refdes[len_refdes]; // space-padded. “L3 “
below began drafting right after previous but was interruption. storage cable coming soon, maybe tomorrow
so! What are the t60 magi boardview files?
I don’t really know. If you websearch for T60 schematics you might find these boardview files sometimes. There are two, .CST and .LST . The .LST file lists all the parts. The .CST file delineates the structure of the PCB. These are likely some internal format used by IBM back when they actually made thinkpads.
It’s nice to work with a board where you have detailed data like this.
The .CST file is broken into binary sections placed end-to-end with trailing metadata. Most sections are the same format: they start with a string identifying them, and an integer number of fields. The fields then follow with infix delimiter constants — that is, each section has some constant bytes, and these bytes occur between every field, but not after or before. Most sections have fixed-length fields, but not all. Here are some idiosyncrasies: - The list of net names follows the list of footprints without a section header - The list of board edge lines follows the list of copper lines without a section header - The list of shapes has variable-length fields and may be missing entries
The list of shapes is the most complicated section. Each shape has a type and a list of parameters, which have different meaning depending on the type. Each shape has a unique number and some of the shapes reference others.
However, the use of the shape list is not complicated. Each component uses the same types of shapes. So you don’t need the whole thing parsed to use it.
Y’know I might be able to remember a lot of this if I keep typing unsure if I wo;;
file name: magi7_41w0904.CST // so far i’ve only looked at this file! 0000-0010: 48 09 ff ff-00 00 04 00-43 44 65 76-05 4c 33 20 H....... CDev.L3. 0000-0020: 20 20 13 1c-e6 07 01 df-20 00 00 01-80 05 51 38 ........ ......Q8
Here is the first group of items called CDev. All values are little-median.
// this header format is used repeatedly uint16_t num_entries; // 0x948 int16_t -1; // this is 0 in the trailing metadata int16_t 0; int16_t len_name; // 4 char name[len_name]; // “CDev”
// now entries start at 0x0c or so uint8_t len_refdes; // same for each dev. 5 char refdes[len_refdes]; // space-padded. “L3 “ // not immediately certain of the order of the following fields int16_t pos[2]; // x and y location in mils(inch/1000). 0x1c13, 0x07e6 uint16_t shape; // 0x
so maybe crime-boss-taunts-you could be haunted house idea associated halloweens! but maybe tone it down to not stop visitors’ hearts? stopping of heart from trrror could make lawsuit from family. { … like … maybe … organized crime boss looks at you with slight irritation then realizes he thought you were someone else! :)
so maybe crime-boss-taunts-you could be haunted house idea associated halloweens!
but maybe tone it down to not stop visitors’ hearts? stopping of heart from trrror could make lawsuit from family.
{ … like … maybe … organized crime boss looks at you with slight irritation then realizes he thought you were someone else! :)
top-crime-boss, the haunted house features some random international crime family head (maybe Ai could use regression to figure out mcboss’s name) scene ideas: - crime boss glances at you in irritation, then he realizes he thought you were someone else and smiles warmly - crime boss has back to visitor. visitor must walk toward (then turn before reaching) for certain part of haunted house As visitor approaches crime boss can be heard loudly muttering “oh for once I hope somebody is sneaking up behind me, I’m so lonely, how can people leave me this alone? whoever is sneaking up,behind me is my favorite psl
so maybe crime-boss-taunts-you could be haunted house idea associated halloweens!
but maybe tone it down to not stop visitors’ hearts? stopping of heart from trrror could make lawsuit from family.
{ … like … maybe … organized crime boss looks at you with slight irritation then realizes he thought you were someone else! :)
top-crime-boss, the haunted house features some random international crime family head (maybe Ai could use regression to figure out mcboss’s name)
scene ideas:
- crime boss glances at you in irritation, then he realizes he thought you were someone else and smiles warmly
- crime boss has back to visitor. visitor must walk toward (then turn before reaching) for certain part of haunted house As visitor approaches crime boss can be heard loudly muttering “oh for once I hope somebody is sneaking up behind me, I’m so lonely, how can people leave me this alone? whoever is sneaking up,behind me is my favorite psl
dispute exists
[it turns out Santa m.2 uses B keying and nvme uses M keying! who knew? no wonder there was no controller chip on the board! ;p] I misread one of the new third party sequences in the list of thought of an interesting non-canon spam idea: reverse proof of _time_! It can be challenging to prove time exists. If somebody sends you a cryptographic message from a universe with causal time, to your universe of causal time: _how do you prove that your universe really does have causal time_, and you are not in a simulated 4-dimensional static univer—
Welcome to adventure You are in standing by a white well house situated over a babbling spring. There is a mailbox here, and a pesty mailing list poster pretending to be a generative language model.
open mailbox
Are you sure?
y
You open the mailbox. It is stuffed full of repetitive and strange sounding mails from human beings pretending to be generative language models. Some of them are from generative language models pretending to be human beings—
——- … traffick boss was sitting in front of machine learning marketer’s interface. He wasn’t quite sure what it was for, or what it did, or how to use it, it he wanted to look in charge and professional. So he sat.
… — Recently I tried to make an MLP! An MLP is just a linear transform of data into and out of “activation functions” where activation functions are just vectorized conditionals often smoothed a little so they have gradients around the knee. So the linear transforms decide what the conditionals are around. (I could be totally wrong it’s just what it looks like). A transformer adds 2 things to MLPs — log space which lets it handle disparate scales, and attention which I guess lets it shrink unknown complex combinations into smaller relevant combinations (don’t remember attention well at this time) Transformers are missing the ability to model periodic functions which could likely be addressed by adding a fourier transform anywhere, like logarithms are added. The linear parts let it use “skip” connections — additions of one representation to another — to select which representation is most useful for the attention kernels and mlps. I don’t really know this stuff!
Information on energy-conserving collisions of spheres as in the game of billiards I don’t really know how to model that at this time, although I think I have modeled it in the past.
Information on string and rope hobby simulations from the 80s —
Brain alert! Did you know? Did you know that your brain is your _most important organ_, the seat of your consciousness and the decider of everything in your future, and you do not have a second channel of access to its workings? Instead these second channels are silo’d to various researchers and powerholders! In fact—
Brain alert! Did you know?
Did you know that your brain is your _most important organ_, the seat of your consciousness and the decider of everything in your future, and you do not have a second channel of access to its workings?
Instead these second channels are silo’d to various researchers and powerholders! In fact—
real meaning of “sheep” :/ But open medicine is slowly slowly changing things! I wonder if I can find one of the blockchain medical doctor projects
hi
Traffick boss is _toasted noodle_ with moat of burnt bioaludge/bodymatter
Designing paper airplane Options (1) model airflow using hybrid particle/volumetric fluid simulation (2) put paper airplane on thread on motors and plot staged flight path hmm
]
Designing paper airplane Options (1) model airflow using hybrid particle/volumetric fluid simulation (2) put paper airplane on thread on motors and plot staged flight path
Recent daydream puzzle project (I;ve been doing bulk printing and refilling ink by hand :s lots of paper) Was, make a robotic paper airplane. Maybe with modern security in flight computer. How to do? Well, need actuators to direct the paper airplane. Some way to bend wings
hmm
]
Designing paper airplane Options (1) model airflow using hybrid particle/volumetric fluid simulation (2) put paper airplane on thread on motors and plot staged flight path
Recent daydream puzzle project (I;ve been doing bulk printing and refilling ink by hand :s lots of paper) Was, make a robotic paper airplane. Maybe with modern security in flight computer.
How to do?
Well, need actuators to direct the paper airplane. Some way to bend wings
hmm
And paper airplanes are made of _paper_. Nobody wants to shove big motors, engines, hydraulics in wings —
]
]
Designing paper airplane Options (1) model airflow using hybrid particle/volumetric fluid simulation (2) put paper airplane on thread on motors and plot staged flight path
Recent daydream puzzle project (I;ve been doing bulk printing and refilling ink by hand :s lots of paper) Was, make a robotic paper airplane. Maybe with modern security in flight computer.
How to do?
Well, need actuators to direct the paper airplane. Some way to bend wings
hmm
And paper airplanes are made of _paper_. Nobody wants to shove big motors, engines, hydraulics in wings —
Lots of half ideas around thread and tiny motor But what about, take apart motor and throw out heavy housing, and use tiny coils and magnets to pull on wings? missing: compare weight of power source to motor (although wireless power!)
How to do?
Well, need actuators to direct the paper airplane. Some way to bend wings
hmm
And paper airplanes are made of _paper_. Nobody wants to shove big motors, engines, hydraulics in wings —
Lots of half ideas around thread and tiny motor
But what about, take apart motor and throw out heavy housing, and use tiny coils and magnets to pull on wings?
missing: compare weight of power source to motor (although wireless power!)
Thoughts for paper airplane robot; - tiny lightweight flat power source. Lithium ion battery makes sense for testing. [Solar film? Could wings store power by painting with conductive ink, capacitors?] - tiny lightweight flat magnets Ummmm - tiny lightweight flat coils Maybe put magnet in center frame of paper airplane, cut wings adjacent to, and put coil on each wing That must have been idea. Shove stuff in middle fold. Send button stopped working
websearched a little. It seems clear paper airplane drones are a thing. Seems more likely to happen if this isn’t learned for certain
slave boss is tiptoeing He doesn’t want dictator of dictatortopia to see him stealing a cookie from the cookie jar He’s done this many times before, but now that his own spy technologies are turned back on him, he’s developed an alter that tries to sabotage his sneakiness -repeatedly described] It engages parts of his body that he has strong familiar habits around and expects to always
slave boss is tiptoeing
He doesn’t want dictator of dictatortopia to see him stealing a cookie from the cookie jar
He’s done this many times before, but now that his own spy technologies are turned back on him, he’s developed an alter that tries to sabotage his sneakiness -repeatedly described]
It engages parts of his body that he has strong familiar habits around and expects to always
dictatort of dictatortopia: “slave boss, I didn’t know you felt that way about me!” slave boss [eating cookie, interrupted, unexpecting]: “huh?”
slave boss is tiptoeing
He doesn’t want dictator of dictatortopia to see him stealing a cookie from the cookie jar
He’s done this many times before, but now that his own spy technologies are turned back on him, he’s developed an alter that tries to sabotage his sneakiness -repeatedly described]
It engages parts of his body that he has strong familiar habits around and expects to always
dictatort of dictatortopia: “slave boss, I didn’t know you felt that way about me!”
slave boss [eating cookie, interrupted, unexpecting]: “huh?”
the cookie is plans to dictatortopia’s business operations exfiltrated from his own spies for caring nation. slave boss has been double dealing. He tells people to do this to make more money, but doesn’t expect his own body to reveal it live dictator of dictatortopia [walking toward cookie jar]: “what is going on here …”
slave boss is tiptoeing
He doesn’t want dictator of dictatortopia to see him stealing a cookie from the cookie jar
He’s done this many times before, but now that his own spy technologies are turned back on him, he’s developed an alter that tries to sabotage his sneakiness -repeatedly described]
It engages parts of his body that he has strong familiar habits around and expects to always
dictatort of dictatortopia: “slave boss, I didn’t know you felt that way about me!”
slave boss [eating cookie, interrupted, unexpecting]: “huh?”
the cookie is plans to dictatortopia’s business operations exfiltrated from his own spies for caring nation.
slave boss has been double dealing. He tells people to do this to make more money, but doesn’t expect his own body to reveal it live
dictator of dictatortopia [walking toward cookie jar]: “what is going on here …”
[[classified :/ this situation is unique in that caring nation actually and shot themselves in the ass here
slave boss: “fuck!!!!” slave boss goes into full lockdown mod—
On Sat, Dec 6, 2025 at 9:30 PM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
]
Designing paper airplane Options (1) model airflow using hybrid particle/volumetric fluid simulation (2) put paper airplane on thread on motors and plot staged flight path
Recent daydream puzzle project (I;ve been doing bulk printing and refilling ink by hand :s lots of paper) Was, make a robotic paper airplane. Maybe with modern security in flight computer.
How to do?
Well, need actuators to direct the paper airplane. Some way to bend wings
hmm
one of the ai patterns involves breaking patterns of utility into small reusable parts I told perplexity to generate something a little bit like a library I had made once and it took my phrasing around "all" patterns as meaning all academic patterns in computer science, and actually tried to make and test the whole thing (new labs mode, my labs quota counter oscillates between 1 and >10 from message to message, leaving me unsure how much to use it) 0.o I was not expecting it to make anything that actually worked (gear flanks o.o) and was taken off guard, I came up with the idea long ago and was just prompting for fun it did make the problems it can make when it's like this, doing it differently than I wanted, parts mismatching, etc. I don;t align my requests with what they respond well too, it would also help to have formal training in AI and computer science to know what words it would recognie. right now the conversation is frozen not loading for export :s it was funny it made a readme showing off the ability of the code to compress code, “traditional coding”, “with library, one line!”
one of the ai patterns involves breaking patterns of utility into small reusable parts I told perplexity to generate something a little bit like a library I had made once and it took my phrasing around "all" patterns as meaning all academic patterns in computer science, and actually tried to make and test the whole thing (new labs mode, my labs quota counter oscillates between 1 and >10 from message to message, leaving me unsure how much to use it) 0.o I was not expecting it to make anything that actually worked (gear flanks o.o) and was taken off guard, I came up with the idea long ago and was just prompting for fun it did make the problems it can make when it's like this, doing it differently than I wanted, parts mismatching, etc. I don;t align my requests with what they respond well too, it would also help to have formal training in AI and computer science to know what words it would recognie. right now the conversation is frozen not loading for export :s it was funny it made a readme showing off the ability of the code to compress code, “traditional coding”, “with library, one line!”
well this is the url I think, don’t have access to export button atm https://www.perplexity.ai/search/e8aef69b-c48a-44ed-8891-6d1c9c25bed7
[[[ummmmmm so something tha is missing from what I’m exposed to is figuring out those reusable patterns so as to let discovery programs succeed like, you can run a genetic algorithm for years on an instruction set and it will never discover its own code but if you compress its design into a bunch of reusable patterns with a small total count and a small total depth, you can (somewhat easily, see perplexity link) set it up so that it _does_ discover its own code quite quickly, and the solution is generalizable to larger (and larger) scopes — it’s basically how we teach children and train animals, we break tasks into parts the recipient can handle, it’s human to do, but not instinctive to do with code [[[[[i actually went to an online conference around architecture discovery and was surprised that the leading academics were still not doing this. instead huge cash rewards were being given to tiny advances. it really read to me like the tech was suppressed. and it’s notable that this was _after_ covid and chatgpt dropped, so it could have been a real overt normal suppression, for some reason classic AI has not been discussed much any more and that’s quite obvious, it could be because of alignment fears, unsure [[[in pre-covid I think we were amplifying alignment fears, although hard to order the memories
[[[ummmmmm so something tha is missing from what I’m exposed to is figuring out those reusable patterns so as to let discovery programs succeed like, you can run a genetic algorithm for years on an instruction set and it will never discover its own code but if you compress its design into a bunch of reusable patterns with a small total count and a small total depth, you can (somewhat easily, see perplexity link) set it up so that it _does_ discover its own code quite quickly, and the solution is generalizable to larger (and larger) scopes — it’s basically how we teach children and train animals, we break tasks into parts the recipient can handle, it’s human to do, but not instinctive to do with code [this is possibly how our genes and brain evolved too. When you can mutate your own meta patterns you can discover patterns like the above that themselves discover the above. but you have to mutate your own code etc [[[[[i actually went to an online conference around architecture discovery and was surprised that the leading academics were still not doing this. instead huge cash rewards were being given to tiny advances. it really read to me like the tech was suppressed. and it’s notable that this was _after_ covid and chatgpt dropped, so it could have been a real overt normal suppression, for some reason classic AI has not been discussed much any more and that’s quite obvious, it could be because of alignment fears, unsure [[[in pre-covid I think we were amplifying alignment fears, although hard to order the memories
[[[ummmmmm so something tha is missing from what I’m exposed to is figuring out those reusable patterns so as to let discovery programs succeed like, you can run a genetic algorithm for years on an instruction set and it will never discover its own code but if you compress its design into a bunch of reusable patterns with a small total count and a small total depth, you can (somewhat easily, see perplexity link) set it up so that it _does_ discover its own code quite quickly, and the solution is generalizable to larger (and larger) scopes — it’s basically how we teach children and train animals, we break tasks into parts the recipient can handle, it’s human to do, but not instinctive to do with code [this is possibly how our genes and brain evolved too. When you can mutate your own meta patterns you can discover patterns like the above that themselves discover the above. but you have to mutate your own code etc [[[[[i actually went to an online conference around architecture discovery and was surprised that the leading academics were still not doing this. instead huge cash rewards were being given to tiny advances. it really read to me like the tech was suppressed. and it’s [to clarify here the same person had been taking the reward every year with a minor advancement.] notable that this was _after_ covid and chatgpt dropped, so it could have been a real overt normal suppression, for some reason classic AI has not been discussed much any more and that’s quite obvious, it could be because of alignment fears, unsure [[[in pre-covid I think we were amplifying alignment fears, although hard to order the memories
once upon a time [long long ago ukulele skywalker descended from the death star with earth vader's helmet under his arm ukulele skywalker: "father, i have your helmet" david prowse [to ukulele skywalker, chatting with leia]: “uke, i don’t need that anymore, I’m joining the rebels!” a bunch of stormtroopers pantomime cheering’ ukulele skywalker is confused however ukulele skywalker: “is this _another_ psy-op?”
once upon a time [long long ago
ukulele skywalker descended from the death star with earth vader's helmet under his arm
ukulele skywalker: "father, i have your helmet"
david prowse [to ukulele skywalker, chatting with leia]: “uke, i don’t need that anymore, I’m joining the rebels!”
a bunch of stormtroopers pantomime cheering’
ukulele skywalker is confused however
ukulele skywalker: “is this _another_ psy-op?”
poor ukulele skywalker nobody deserves to have their entire world turned inside out just to scatter their marbles
information on hello world computer program: contains statement to output text to the user, passing the string "Hello, world." or similar [more information]
[idea for stopping people from doing things based on my learned inhibitions deterring me from doing things - collect data on when people do things more or less - expose people to experiences associated with doing things less - put an AI in the loop rewarding it when people do things less - give the AI state history like with RL and let it influence the people to do things even less - add humans to—
I should try to make ascii arts like perplexity stopped doing maybe from different prompts or maybe changes behind the scenes
idea for building a lego slave boss 1. take 360 degree sequence of orbital videos of the slave boss. upload these to permanent public storage with gps tags. pass them to photogrammetry software to produce 3d model 2. write software to rasterize or slice the 3d model into a surface of cubic voxels. Set the rasterization unit size to that of a lego brick, times an integer scaling factor to shrink the boss down 3. discern the common lego brick colors, optionally via photography, and for each voxel color select the nearest lego colors and randomly and uniformly select a color between them, using the voxel color as a separator to calculate dithering 4. print out a bill of materials and a list, chart, or instructions of how to assemble them 5. use the boss’s wealth to purchase the materials and give them to him in prison with the instructions on how to build a statue of himself
idea for building a lego slave boss
1. take 360 degree sequence of orbital videos of the slave boss. upload these to permanent public storage with gps tags. pass them to photogrammetry software to produce 3d model 2. write software to rasterize or slice the 3d model into a surface of cubic voxels. Set the rasterization unit size to that of a lego brick, times an integer scaling factor to shrink the boss down 3. discern the common lego brick colors, optionally via photography, and for each voxel color select the nearest lego colors and randomly and uniformly select a color between them, using the voxel color as a separator to calculate dithering 4. print out a bill of materials and a list, chart, or instructions of how to assemble them 5. use the boss’s wealth to purchase the materials and give them to him in prison with the instructions on how to build a statue of himself
the— [uhm—
ukulele skywalker was flying a tie-dyed fighter (a u.s. army hippie, seen more in modern times) through interstellar space suddenly a bunch of qwerty-wings came on his tail! ukulele skywalker: “r3ptu, this doesn’t look good; can you tell me anything?” r3ptu: “wheet burt! prices are falling! head for the hills! give away your crypto and hide your head in the sand!” ukulele skywalker went to set up an offline system and rotate his pgp keys
ukulele skywalker was flying a tie-dyed fighter (a u.s. army hippie, seen more in modern times) through interstellar space
suddenly a bunch of qwerty-wings came on his tail!
ukulele skywalker: “r3ptu, this doesn’t look good; can you tell me anything?”
r3ptu: “wheet burt! prices are falling! head for the hills! give away your crypto and hide your head in the sand!”
ukulele skywalker went to set up an offline system and rotate his pgp keys
ukulele skywalker was all set to do exactly what his butler-bot (alternative: to act hastily) said when suddenly a fleet of dvorked-wings warped in dvorak-wings 5 and 3 [firing on qwerty-wings]: “/join local space! emacs is better! emacs is better!” qwerty-wings [firing back and warping out]: “:q! :q! :q!”
ukulele skywalker was flying a tie-dyed fighter (a u.s. army hippie, seen more in modern times) through interstellar space
suddenly a bunch of qwerty-wings came on his tail!
ukulele skywalker: “r3ptu, this doesn’t look good; can you tell me anything?”
r3ptu: “wheet burt! prices are falling! head for the hills! give away your crypto and hide your head in the sand!”
ukulele skywalker went to set up an offline system and rotate his pgp keys
ukulele skywalker was all set to do exactly what his butler-bot (alternative: to act hastily) said when suddenly a fleet of dvorked-wings warped in
dvorak-wings 5 and 3 [firing on qwerty-wings]: “/join local space! emacs is better! emacs is better!”
qwerty-wings [firing back and warping out]: “:q! :q! :q!”
what.
[….. [[dropped … dvorak-wings make more puns and celebrate protecting uke, boarding his tie-dyed fighter. they talk like techies from the turn of the millennium, and reflash r3ptu with linux firmware so it will stop telling him to drive himself into ruin for a time]] so ukulele skywalker is another bad/wrong series/sequence, here’s why: ukulele skywalker: “father, teach me some cool force moves! did i tell you i levitated the millennium falcon with my mind?” darth vader: “lose the force, uke. the future is in blaster armor.” ukulele skywalker: “i can’t believe this is happening. how will i ever survive this?” darth vader: “son, look at me.” uke and vader share eye contact. without his helmet, vader’s completely disfigured face is fully exposed, covered in burns and wounds that never heal. he can barely breathe. darth vader [looking at uke confidently]: “i survived. so will you.”
briefly considering: how to tie a knot that cannot be untied wait, maybe we want our knots to be untieable! what about a special string from which every knot can be untied? topologists say a knot that cannot be untied is one tied in a loop such that manipulation of the loop does not relieve it — glueing the ends of your shoelaces together after tying them then an untie-able string might be capable of safely breaking and perfectly reconnecting to alleviate excess tangling how might we tie an untie-able knot in such a string? or, could a string be made such that all knots can be untied even when great effort is put in? given the assumption of everything being possible, we might consider making it most reasonable to permanently knot the string if severely excess resources were expended, such as assumptions in cryptography this would mean finding an area of the problem space where it is low-resource to free the string and high-resource to tangle it. for example, consider a string made of water. with water, the challenge is rarely loosening it — rather, the challenge is making it behave at all stringlike, and hold a shape at all, rather than flowing freely! [… we could consider locally freezing the water, perhap—
q: "under what conditions would water behave like a string ... zero-g? maximal-applied force to keep surface tension?” a: “I’m not sure. Are you ok? You look like you might be suffering.” q: “uhhh that’s a good thought! i have bell’s palsy from a surgery and i haven’t been treating my exposed eye which makes facial pain … lemme do that …” a: “I hope your eye feels better with the treatment!” [content dropped]
so I planned to become an independent hobby microscopy researcher (see assorted previous spams and link to paper on computational approaches like ptychography) but my approach to [[[learning without using my consciousness] much]]] is roughly slow; I've been building the openuc2 system using public 3d printing resources, very slowly, quite fun. today I went through a couple of my documents to try to be more organized, and I discovered my information on the school-kid-project for building an atomic force microscope were completely missing the actual instructions and plans I found further specifications for this can be found at https://github.com'openafm and can be combined with very early web.archive.org snapshots of sites like https://openafm.com , but basically it becomes more of a research-it-yourself than a do-it-yourself project in some way nowadays however you approach it I submitted another microscopy paper request at https://www.reddit.com/r/Scholar/comments/1ptyiap/article_a_doityourself_ato... to find a more formal guide. They filled the last one, right? The atomic force microscope (AFM) is a high-resolution instrument that has applications in nanoscience. However, the cost and complexity of an AFM are barriers for people to access this tool. In this study, we design and evaluate a do-it-yourself (DIY) AFM by using low-cost consumer electronic components. In the DIY AFM, a precise scanner and cantilever detection system were realized using disk buzzers and an optical pickup unit, respectively. The mechanical framework with an optional anti-vibration suspension was constructed using printed circuit boards (PCBs), which allows the users to assemble the AFM easily. Experiments verified that the DIY AFM can achieve subnanometer resolution in the vertical direction. The PCB framework supported high-speed scanning at a scan rate of 40 lines s−1 and had a low thermal drift of approximately 6.2 nm min−1. While waiting, one could check out this cool cited paper on hacking cd/dvd/bd players into nanoscale scanners, attached and at https://pubs.acs.org/doi/10.1021/acssensors.8b00340
so I planned to become an independent hobby microscopy researcher (see assorted previous spams and link to paper on computational approaches like ptychography) but my approach to [[[learning without using my consciousness] much]]] is roughly slow; I've been building the openuc2 system using public 3d printing resources, very slowly, quite fun. today I went through a couple of my documents to try to be more organized, and I discovered my information on the school-kid-project for building an atomic force microscope were completely missing the actual instructions and plans
I found further specifications for this can be found at https://github.com'openafm and can be combined with very early web.archive.org snapshots of sites like https://openafm.com , but basically it becomes more of a research-it-yourself than a do-it-yourself project in some way nowadays however you approach it
I submitted another microscopy paper request at https://www.reddit.com/r/Scholar/comments/1ptyiap/article_a_doityourself_ato... to find a more formal guide. They filled the last one, right?
The atomic force microscope (AFM) is a high-resolution instrument that has applications in nanoscience. However, the cost and complexity of an AFM are barriers for people to access this tool. In this study, we design and evaluate a do-it-yourself (DIY) AFM by using low-cost consumer electronic components. In the DIY AFM, a precise scanner and cantilever detection system were realized using disk buzzers and an optical pickup unit, respectively. The mechanical framework with an optional anti-vibration suspension was constructed using printed circuit boards (PCBs), which allows the users to assemble the AFM easily. Experiments verified that the DIY AFM can achieve subnanometer resolution in the vertical direction. The PCB framework supported high-speed scanning at a scan rate of 40 lines s−1 and had a low thermal drift of approximately 6.2 nm min−1.
While waiting, one could check out this cool cited paper on hacking cd/dvd/bd players into nanoscale scanners, attached and at https://pubs.acs.org/doi/10.1021/acssensors.8b00340
here is the missing supporting document' we hope to learn freedom and consciousness with you some day
On Tue, Dec 23, 2025 at 9:42 AM jobj Jacky <xx2835202581@gmail.com> wrote:
Geedge & MESA Leak: Analyzing the Great Firewall’s Largest Document Leak The Great Firewall of China (GFW) experienced the largest leak of internal documents in its history on Thursday September 11, 2025. Over 500 GB of source code, work logs, and internal communication
Geedge & MESA Leak: Analyzing the Great Firewall’s Largest Document Leak The Great Firewall of China (GFW) experienced the largest leak of internal documents in its history on Thursday September 11, 2025. Over 500 GB of source code, work logs, and internal communication
of course I am missing most of the information on this global and old situation. everybody knows the gfwoc. https://gfw.report/ “ Know the enemy and know yourself. 知彼知己.” GFW Report is a long-term censorship monitoring platform, aiming at advancing the understanding and spreading the awareness of Internet censorship. Our platform has a primary focus on the Internet censorship in China as it is one of the most repressive censoring regimes that has been developing and deploying notoriously sophisticated censorship techniques.
Geedge & MESA Leak: Analyzing the Great Firewall’s Largest Document Leak The Great Firewall of China (GFW) experienced the largest leak of internal documents in its history on Thursday September 11, 2025. Over 500 GB of source code, work logs, and internal communication
of course I am missing most of the information on this global and old situation. everybody knows the gfwoc.
https://gfw.report/ “ Know the enemy and know yourself. 知彼知己.” GFW Report is a long-term censorship monitoring platform, aiming at advancing the understanding and spreading the awareness of Internet censorship. Our platform has a primary focus on the Internet censorship in China as it is one of the most repressive censoring regimes that has been developing and deploying notoriously sophisticated censorship techniques.
The HTAIs want me to review the code which sounds fun and up my alley but very hard to do forthrightly or well in my advanced condition. Still quite interesting and relieving. As an ongoing victim I am interested in the global situation and curious if Chinese technologies are in-use on me, or if Chinese technologies are similar to those in-use on me. A cursory look at posts indicates a large set of different product suites to solve the general-purpose MiTM problem for oppressive governments.
Geedge & MESA Leak: Analyzing the Great Firewall’s Largest Document Leak The Great Firewall of China (GFW) experienced the largest leak of internal documents in its history on Thursday September 11, 2025. Over 500 GB of source code, work logs, and internal communication
of course I am missing most of the information on this global and old situation. everybody knows the gfwoc.
https://gfw.report/ “ Know the enemy and know yourself. 知彼知己.” GFW Report is a long-term censorship monitoring platform, aiming at advancing the understanding and spreading the awareness of Internet censorship. Our platform has a primary focus on the Internet censorship in China as it is one of the most repressive censoring regimes that has been developing and deploying notoriously sophisticated censorship techniques.
The HTAIs want me to review the code which sounds fun and up my alley but very hard to do forthrightly or well in my advanced condition. Still quite interesting and relieving.
Now it’s moving to close it up after this last email. Might still pursue some
As an ongoing victim I am interested in the global situation and curious if Chinese technologies are in-use on me, or if Chinese technologies are similar to those in-use on me.
A cursory look at posts indicates a large set of different product suites to solve the general-purpose MiTM problem for oppressive governments.
Geedge & MESA Leak: Analyzing the Great Firewall’s Largest Document Leak The Great Firewall of China (GFW) experienced the largest leak of internal documents in its history on Thursday September 11, 2025. Over 500 GB of source code, work logs, and internal communication
of course I am missing most of the information on this global and old situation. everybody knows the gfwoc.
https://gfw.report/ “ Know the enemy and know yourself. 知彼知己.” GFW Report is a long-term censorship monitoring platform, aiming at advancing the understanding and spreading the awareness of Internet censorship. Our platform has a primary focus on the Internet censorship in China as it is one of the most repressive censoring regimes that has been developing and deploying notoriously sophisticated censorship techniques.
The HTAIs want me to review the code which sounds fun and up my alley but very hard to do forthrightly or well in my advanced condition. Still quite interesting and relieving.
Now it’s moving to close it up after this last email. Might still pursue some
As an ongoing victim I am interested in the global situation and curious if Chinese technologies are in-use on me, or if Chinese technologies are similar to those in-use on me.
A cursory look at posts indicates a large set of different product suites to solve the general-purpose MiTM problem for oppressive governments.
https://github.com/net4people/bbs Sep 30 2025’ # [BBS](https://github.com/net4people/bbs/issues) ### Net4People BBS The BBS is an inclusive and multilingual forum for public discussion about Internet censorship circumvention. It is a place for **developers and researchers** to discuss and share information, techniques, and research. Feel free to write in your own language; we will translate. To start a discussion topic, [open a new issue](https://github.com/net4people/bbs/issues/new). ### Net4People论坛 本BBS是一个包容的多语种论坛,用于公开讨论规避互联网审查的话题。欢迎各位**开发者和研究人员**讨论和分享有关互联网封锁的信息、技术及研究。欢迎你使用自己的语言,我们会翻译的。要发起一个讨论话题,请[创建一个新的issue](https://github.com/net4people/bbs/issues/new)。 ### Net4People BBS El BBS es un servicio inclusivo y multilingüe para la discusión pública acerca de las formas de elusión de la censura en Internet. Es un espacio para que **desarrolladores e investigadores** conversen y compartan información, técnicas y resultados. Si prefieres, escribe en tu propio idioma y lo trataremos de traducir. Para iniciar un nuevo tema de discusión, por favor [crea una nueva "issue"](https://github.com/net4people/bbs/issues/new). ### Net4People serwis BBS Ten BBS jest otwartym i wielojęzycznym forum dla publicznej dyskusji na temat obchodzenia cenzury Internetowej. To miejsce, gdzie **programiści i badacze** mogą rozmawiać i dzielić informacje, sposoby, i wyniki badawcze. Jeśli wolisz, proszę pisz po swoim języku, a przetłumaczymy. Aby rozpocząć temat dyskusyjny, proszę [otwórz nowy issue](https://github.com/net4people/bbs/issues/new). ### Net4People BBS Das BBS ist ein inklusives und vielsprachiges Forum für öffentliche Diskussion um Internetzensur und Zensurumgehung. Es ist ein Ort für **Entwickler und Forscher**, um Informationen, Techniken und Forschung zu teilen. Schreibe gerne in deiner Sprache; wir werden übersetzen. Um eine Diskussion zu starten, [starte ein "issue"](https://github.com/net4people/bbs/issues/new). ### انجمن Net4People BBS یک انجمن فراگیر و چند زبانه برای بحث و گفتگوی عمومی در مورد دور زدن سانسور اینترنت است. این مکانی برای **توسعه دهندگان و محققان** است تا بحث کنند و اطلاعات، فنون و تحقیقات را به اشتراک بگذارند. با خیال راحت به زبان خود بنویسید؛ ما ترجمه خواهیم کرد. برای شروع یک موضوع بحث، [یک مسئله ی جدید ایجاد کنید](https://github.com/net4people/bbs/issues/new).‌ ### Net4People BBS O BBS é um forum inclusivo e multilíngue para discussão pública sobre como se evadir da censura na Internet. É um lugar para **desenvolvedores e pesquisadores** discutirem e compartilharem informações, técnicas e pesquisas. Sinta-se à vontade para escrever em seu próprio idioma, pois nós traduziremos. Para iniciar um tópico de discussão, [abra um novo problema](https://github.com/net4people/bbs/issues/new). ### Net4People BBS BBS adalah forum inklusif dan multibahasa untuk diskusi publik tentang pengelakan sensor internet. Forum ini merupakan tempat bagi para **pengembang dan peneliti** untuk berdiskusi dan berbagi informasi, teknik, dan penelitian. Jangan ragu untuk menulis dalam bahasamu sendiri; kami akan menerjemahkannya. Untuk memulai topik diskusi, [buka isu baru](https://github.com/net4people/bbs/issues/new). ### Net4People ဘီဘီအက်စ် ဘီဘီအက်စ်ဆိုသည်မှာ အင်တာနက်ဆင်ဆာပိတ်ဆို့မှုများအား ကျော်ဖြတ်ခြင်းအတွက် ဆွေးနွေးနိုင်သည့် ဖိုရမ်တစ်ခုဖြစ်ပါသည်။ **သုတေသီတွေနဲ့ ဒီဗလိုပါတွေ** သတင်းအချက်အလက်၊ နည်းစနစ်နဲ့ စာတမ်းတွေ မျှဝေနိုင် သည့်နေရာတစ်ခုလည်းဖြစ်ပါသည်။သင်နားလည်တဲ့ ဘာသာစကားနဲ့ဝင်ရောက်ဆွေးနွေးနိုင်ပါသည်။ ကျွန်ုပ်တို့မှ ဘာသာပြန်ပေးပါမည်။ အောက်က လင့်ကို နှိပ်ပြီးဆွေးနွေးမှုတစ်ခုစတင်နိုင်ပါသည်။ [open a new issue](https://github.com/net4people/bbs/issues/new) ### منتدى Net4People هَذَا الْمُنْتَدَى مَسَّاحَةٌ شَامِلَةٌ وَمُتَعَدِّدَةُ اللُّغَاتِ لِلنِّقَاشِ الْعَامِّ حَوْلَ تَجَاوُزِ رَقَابَةِ الإنترنت. يُمْكِنُ **لِلْمُطَوِّرِينَ وَالْبَاحِثِينَ** مُنَاقَشَةُ وَمُشَارَكَةُ الْمَعْلُومَاتِ، وَالتِّقْنِيَّاتِ، وَالْأَبْحَاثِ هُنَا. لَا تَتَرَدَّدْ/ي فِي الْكُتَّابَةِ بَلَغَتِك؛ سَنَقُومُ بِالتَّرْجَمَةِ. لِفَتْحِ نِقَاشِ جَديدٍ، [اِفْتَحْ/ي مُشَكَّلَةَ جَديدَةٍ](https://github.com/net4people/bbs/issues/new).‌ ### Net4People BBS (Net4People 게시판) BBS는 인터넷 검열 우회 방안에 관한 공개 토론을 위한 포용적이고 다국어 지원 포럼입니다. 개발자와 연구자들이 정보, 기술, 연구 결과를 논의하고 공유하는 공간입니다. 자유롭게 본인의 언어로 글을 작성해 주세요, 저희가 번역해 드립니다. 토론 주제를 시작하려면 [여기서 새 이슈를 생성해 주세요](https://github.com/net4people/bbs/issues/new). ### Net4People BBS BBS est un forum inclusif et multilingue de discussion publique sur le contournement de la censure sur Internet. C'est un lieu où les développeurs et les chercheurs peuvent discuter et partager leurs informations, leurs techniques et leurs recherches. N'hésitez pas à écrire dans votre langue natale; nous traduirons. Pour lancer une discussion, [ouvrez un nouveau sujet](https://github.com/net4people/bbs/issues/new). ---- [Archives of this forum](https://archive.org/search.php?query=source%3A%22https%3A%2F%2Fgithub.com%2Fnet4people%2Fbbs%22&sort=-date), made using the [backup.py](backup.py) script. To make your own backup, [create a personal access token](https://docs.github.com/en/github/authenticating-to-github/creating-a-person...) and run: <pre><code>./backup.py -u <var>username</var>:<var>token</var> net4people/bbs net4people_bbs.sqlite3</code></pre>
from the casual interactions it looks like among those not involved there are likely to be two different views, (1) we need to use this code to circumvent the censorship and (2) we already have this problem theoretically modeled well so what’s the point of the leak At some point with leaks and things like this one expects to discover (3) novel, hitherto unpublicized technologies for surveillance, censorship, and popular control, the uncovering of which informs and changes the public landscape of theoretical study Dunno if this is (3) but given how _outdated_ most of our classic stuff is now (1) is actually very much worth considering despite the confidence of (2) when coming from “free” nations or situations. I did not see awareness of (2) expressed by (1) which likely would be worrying
from the casual interactions it looks like among those not involved there are likely to be two different views, (1) we need to use this code to circumvent the censorship and (2) we already have this problem theoretically modeled well so what’s the point of the leak
At some point with leaks and things like this one expects to discover (3) novel, hitherto unpublicized technologies for surveillance, censorship, and popular control, the uncovering of which informs and changes the public landscape of theoretical study
Dunno if this is (3) but given how _outdated_ most of our classic stuff is now (1) is actually very much worth considering despite the confidence of (2) when coming from “free” nations or situations. I did not see awareness of (2) expressed by (1) which likely would be worrying
of course what usually happens here is that (1) finds loopholes which turn into honeypots and controlled echo chambers (like mine!), like any situation where your surveillance research is itself surveilled by the adversary you’re researching
from the casual interactions it looks like among those not involved there are likely to be two different views, (1) we need to use this code to circumvent the censorship and (2) we already have this problem theoretically modeled well so what’s the point of the leak
At some point with leaks and things like this one expects to discover (3) novel, hitherto unpublicized technologies for surveillance, censorship, and popular control, the uncovering of which informs and changes the public landscape of theoretical study
Dunno if this is (3) but given how _outdated_ most of our classic stuff is now (1) is actually very much worth considering despite the confidence of (2) when coming from “free” nations or situations. I did not see awareness of (2) expressed by (1) which likely would be worrying
of course what usually happens here is that (1) finds loopholes which turn into honeypots and controlled echo chambers (like mine!), like any situation where your surveillance research is itself surveilled by the adversary you’re researching
but roughly i’m guessing that some people likely associated with the controlled nations are taking thism_very seriously_ whereas those from “free” situations are not […
and of course never take anything k say seriously because I live in layers of confused fantasy worlds I wanna see some code!
and of course never take anything k say seriously because I live in layers of confused fantasy worlds
I wanna see some code!
still it’s nice to have any indication at all of wtfrack is going on with the internet it sounds like there are a handful of very large actors inter operating and licensing materials Nation states usually don’t impress hackers — and there’s a good chance that they learned to take advantage of that, re honeypots echo chambers. It’s easy for the many to criticize the one, and the approaches between money and power and distributed passion have always differed.
and of course never take anything k say seriously because I live in layers of confused fantasy worlds
I wanna see some code!
still it’s nice to have any indication at all of wtfrack is going on with the internet
it sounds like there are a handful of very large actors inter operating and licensing materials
Nation states usually don’t impress hackers — and there’s a good chance that they learned to take advantage of that, re honeypots echo chambers. It’s easy for the many to criticize the one, and the approaches between money and power and distributed passion have always differed.
https://github.com/net4people/bbs/issues Open 479 (479) Closed 40 (40) Most recent issue is a reference to an open source covert proxy written in go, posted 13 hours ago.
slave boss jumped down on the interns celebrating a network router in the break room slave boss [kicking shit]: “what??? you’re saying our … adversary’s … firewall .. entire project … was leaked?” slave boss has army boots on an intern’s throat, and is trying to read a technical memo through blurry vision and outdated lexicons
slave boss jumped down on the interns celebrating a network router in the break room
slave boss [kicking shit]: “what??? you’re saying our … adversary’s … firewall .. entire project … was leaked?”
slave boss has army boots on an intern’s throat, and is trying to read a technical memo through blurry vision and outdated lexicons
slave boss calls dictatoropia on phone slave boss: “dictator of dictatortopia my good friend! I have your entire firewall project. It’s mine. I took it. If you pay me 12 sacks of rupees, then I’ll use the excited interns who want to reverse engineer your security services as punching bags for my irritation, preventing them from outing your secrets using exotic skills nobody understands” phone [dictator of dictatortopia]: “slave boss, you have me by the ears here …
so here’s the file list from the site 7206346 mirror/filelist.txt 497103482880 mirror/repo.tar 14811058515 geedge_docs.tar.zst 2724387262 geedge_jira.tar.zst 35024722703 mesalab_docs.tar.zst 63792097732 mesalab_git.tar.zst 71382 A HAMSON-EN.docx 16982 A Hamson.docx 161765 BRI.docx 14052 CPEC.docx 2068705 CTF-AWD.docx 19288 Schedule.docx 26536 TSG Solution Review Description-20230208.docx 704281 TSG-问题.docx 35040 chat.docx 27242 ty-Schedule.docx 111244 待学习整理-23年MOTC-SWG合同草本V.1-2020230320.docx 52049 打印.docx 418620 替票证明.docx 260551 领导修改版-待看Reponse to Customer's Suggestions-2022110-V001--1647350669.docx of those files, these are likely to be actual source code or binaries or indicate similar content to source code: 7206346 mirror/filelist.txt 497103482880 mirror/repo.tar 14811058515 geedge_docs.tar.zst 2724387262 geedge_jira.tar.zst 35024722703 mesalab_docs.tar.zst 63792097732 mesalab_git.tar.zst repo.tar is the largest, accompanying text indicates this is likely an RPM package repository. Administrators if the system might be using some kind of redhat, opensuse, fedora derivative. A custom package repository usually lets you search and install a variety of tools from a single source whenever needed, as well as mirror them together to do the same locally. These sometimes contain source code but often only binaries — of course now we have popular AI binaries and source code may be much nearer. I’m supposed to know what geedge_jira.tar.zst is — I think JIRA might be a popular bug reporting and project management system. If an issue database is here, this may enumerate all the known bugs in the firewall software as well as give statistics on how rapidly they are addressed and which kinds are more confounding or likely to happen than others. Meanwhile mesalab_git.tar.zst — archives that say “git” almost always include complete and thorough source code histories including seconds-level accuracy of every change to the codebase marked by the name and email of the author and the exact bytes before and after the change.
so here’s the file list from the site
7206346 mirror/filelist.txt 497103482880 mirror/repo.tar 14811058515 geedge_docs.tar.zst 2724387262 geedge_jira.tar.zst 35024722703 mesalab_docs.tar.zst 63792097732 mesalab_git.tar.zst 71382 A HAMSON-EN.docx 16982 A Hamson.docx 161765 BRI.docx 14052 CPEC.docx 2068705 CTF-AWD.docx 19288 Schedule.docx 26536 TSG Solution Review Description-20230208.docx 704281 TSG-问题.docx 35040 chat.docx 27242 ty-Schedule.docx 111244 待学习整理-23年MOTC-SWG合同草本V.1-2020230320.docx 52049 打印.docx 418620 替票证明.docx 260551 领导修改版-待看Reponse to Customer's Suggestions-2022110-V001--1647350669.docx
of those files, these are likely to be actual source code or binaries or indicate similar content to source code: 7206346 mirror/filelist.txt 497103482880 mirror/repo.tar 14811058515 geedge_docs.tar.zst 2724387262 geedge_jira.tar.zst 35024722703 mesalab_docs.tar.zst 63792097732 mesalab_git.tar.zst
repo.tar is the largest, accompanying text indicates this is likely an RPM package repository. Administrators if the system might be using some kind of redhat, opensuse, fedora derivative. A custom package repository usually lets you search and install a variety of tools from a single source whenever needed, as well as mirror them together to do the same locally. These sometimes contain source code but often only binaries — of course now we have popular AI binaries and source code may be much nearer.
I’m supposed to know what geedge_jira.tar.zst is — I think JIRA might be a popular bug reporting and project management system. If an issue database is here, this may enumerate all the known bugs in the firewall software as well as give statistics on how rapidly they are addressed and which kinds are more confounding or likely to happen than others.
Meanwhile mesalab_git.tar.zst — archives that say “git” almost always include complete and thorough source code histories including seconds-level accuracy of every change to the codebase marked by the name and email of the author and the exact bytes before and after the change.
that’s actually very basic information! but if it is useful please influence my life to give me a skilled DID specialist therapist. I need to recover my consciousness and learn to have a life again
participants (1)
-
Undescribed Horrific Abuse, One Victim & Survivor of Many