Re: [spam][crazy][fiction][random] Non-Canon MCBoss Spinoffs
turns out newer revisions of guix have a guix/etc/sources.scm file that lists those origins! not in a packaged release yet. — once upon a time, long long ago, trauma boss was energized between the great forces of slavery and free joy, the empire and the celebration, the—
This is the first I learned that they found the person who (with others supporting) drove off with my stolen vehicle and all my personal possessions. He may have just been released from 8 months in prison. I still do not have my possessions including $30k in ASI coin, my unbacked-up hard drive with everything I did over these years, all my clothes and devices and identifying paper records etc etc etc. The letter was not preceded by other letters that I am aware of. It does not contain the form it says it should contain to be further notified. However I am observing from this document that he was caught within a month. I simply did not learn of it until now. I wish I could have recovered my devices rather than exerting so much retribution. Still the fines he paid are much less than the cash that was in the vehicle. But there were also others supporting the theft and he may not have performed it out of choice, I don’t know. At the time it seemed he was black and they were white, although I don’t know if this is the same man. I want to know what happened and if I could recover my possessions. I have amnesia and would like documentation of what happened.
This is the first I learned that they found the person who (with others supporting) drove off with my stolen vehicle and all my personal possessions. He may have just been released from 8 months in prison. I still do not have my possessions including $30k in ASI coin, my unbacked-up hard drive with everything I did over these years, all my clothes and devices and identifying paper records etc etc etc. The letter was not preceded by other letters that I am aware of. It does not contain the form it says it should contain to be further notified.
However I am observing from this document that he was caught within a month. I simply did not learn of it until now. I wish I could have recovered my devices rather than exerting so much retribution. Still the fines he paid are much less than the cash that was in the vehicle. But there were also others supporting the theft and he may not have performed it out of choice, I don’t know. At the time it seemed he was black and they were white, although I don’t know if this is the same man.
I want to know what happened and if I could recover my possessions. I have amnesia and would like documentation of what happened.
I want to clarify that this is incredibly good news and I am posting in celebration! They had found somebody who takes credit for stealing the car which means there is a strong link to what happened to my things! I am really quite surprised he stayed in the same state let alone the same country after taking them.
This is the first I learned that they found the person who (with others supporting) drove off with my stolen vehicle and all my personal possessions. He may have just been released from 8 months in prison. I still do not have my possessions including $30k in ASI coin, my unbacked-up hard drive with everything I did over these years, all my clothes and devices and identifying paper records etc etc etc. The letter was not preceded by other letters that I am aware of. It does not contain the form it says it should contain to be further notified.
However I am observing from this document that he was caught within a month. I simply did not learn of it until now. I wish I could have recovered my devices rather than exerting so much retribution. Still the fines he paid are much less than the cash that was in the vehicle. But there were also others supporting the theft and he may not have performed it out of choice, I don’t know. At the time it seemed he was black and they were white, although I don’t know if this is the same man.
I want to know what happened and if I could recover my possessions. I have amnesia and would like documentation of what happened.
I want to clarify that this is incredibly good news and I am posting in celebration! They had found somebody who takes credit for stealing the car which means there is a strong link to what happened to my things! I am really quite surprised he stayed in the same state let alone the same country after taking them.
For accuracy, this was likely less than $30k ASI, I forgot I did not put the entire sum into ASI but only part, although likely more than that in overall theft from me (and my parents who owned the vehicle; my mother said she gave it to me after the theft to simplify logistics). I am on a gift iPad I have almost never used. Earlier I posted from here that I failed to upload something to Ardrive. Additionally this iPad will not load the Coinbase website to get exact numbers for the ASI to correct my earlier statement, nor will it load the USPS change of address website. When we recovered the vehicle via private delivery from insurance impound I also videotaped this delivery and stored the video on Arweave. I feel very distressed tonight, which surprises me. I wish I had found a way to retain in-person contact with the local police after the vehicle was stolen. I would like to return to the area but I am worried —
It is so exciting that this person was found. I yearn to make steps on identifying whether my possessions were recovered by the police or not. It was frightening that the police classified the vehicle as a biohazard which prevented me from continuing to use it as my home when it was recovered. I might like to call the policewoman who originally helped me, and record the call. I was originally disconnected from her when I got a phone.
The form for court records at https://www.coloradojudicial.gov/recorddocument-request-form requires a phone number but phones have not been working for me well. This past month I received no return calls except from people I had already established contact with.
I might go to a nearby town and get a phone, but not right now as it is 330 AM. I am sadly likely to have powerful body takeover experiences over the next couple days, this can make it hard to accomplish things
Some are saying this concept is addressed now but it does not seem to be to me?
I would like to know what happened to all my possessions, or even what any person affiliated is claiming happened to them.
I would like to know what happened to all my possessions, or even what any person affiliated is claiming happened to them.
I would also like to establish and retain contact with somebody involved in the event.
With communication concerns it could make a lot of sense to go to the area, which could be disruptive to my current life. I could likely prepare for this somehow. I could also work with somebody who is in the area in some manner, maybe there is somebody who travels through both it and this area, for example. Right now I am in Vermont and Massachusetts. I have been traveling between them to attend ITAA meetings.
I would like to know what happened to all my possessions, or even what any person affiliated is claiming happened to them.
I would also like to establish and retain contact with somebody involved in the event.
With communication concerns it could make a lot of sense to go to the area, which could be disruptive to my current life. I could likely prepare for this somehow.
I could also work with somebody who is in the area in some manner, maybe there is somebody who travels through both it and this area, for example. Right now I am in Vermont and Massachusetts. I have been traveling between them to attend ITAA meetings.
Assuming I do travel back to the area where this happened I’d like a way to have more stability, to not have everything taken again or to get ill on the streets; something to show my fears I am safer, like an apartment or maybe a private campsite?
I would like to know what happened to all my possessions, or even what any person affiliated is claiming happened to them.
I would also like to establish and retain contact with somebody involved in the event.
With communication concerns it could make a lot of sense to go to the area, which could be disruptive to my current life. I could likely prepare for this somehow.
I could also work with somebody who is in the area in some manner, maybe there is somebody who travels through both it and this area, for example. Right now I am in Vermont and Massachusetts. I have been traveling between them to attend ITAA meetings.
Assuming I do travel back to the area where this happened I’d like a way to have more stability, to not have everything taken again or to get ill on the streets; something to show my fears I am safer, like an apartment or maybe a private campsite?
I have a replacement vehicle. Maybe I could kind of organize it and add something to it, like a tent with security feature or something
Not sure. Also infrastructure issues, like websites not loading on this device, or phones not connecting, these seem very awkward. Unsure of plans for engaging this. One thing that slightly helped with phones was complaining to police in person, this helped once and they connected me to somebody saying they were my contact, on their phone. I was unable to reconnect after leaving. I could possibly try to make a habit of making calls via police officers.
Not sure.
Also infrastructure issues, like websites not loading on this device, or phones not connecting, these seem very awkward. Unsure of plans for engaging this.
One thing that slightly helped with phones was complaining to police in person, this helped once and they connected me to somebody saying they were my contact, on their phone. I was unable to reconnect after leaving. I could possibly try to make a habit of making calls via police officers.
I’m not really sure
Another idea is I could try to leverage the potential of recovering stolen funds to work with somebody like a lawyer
higgledypiggledy!
I did not capture the address for my mother’s privacy but I see that leaves it out, I put in her address in Vermont.
I am resetting this device to see if that makes it behave better. (… this device should not be trusted or used)
After resetting, enabling lockdown mode (apple), and updating, sites still did not work. usps.com let me move forward if I briefly disabled lockdown mode and enabled cross-site tracking, but then said it encountered a server error and I needed to visit a post office in person. coinbase.com loaded, which it did not do prior, and I may have then had to perform one of the above disablings to log in It turns out I only had 5,840.85826 FET which has dropped in price and is worth about $3800 today. If I can find the account address I could find its other assets. There were also other things in the vehicle.
After resetting, enabling lockdown mode (apple), and updating, sites still did not work. usps.com let me move forward if I briefly disabled lockdown mode and enabled cross-site tracking, but then said it encountered a server error and I needed to visit a post office in person. coinbase.com loaded, which it did not do prior, and I may have then had to perform one of the above disablings to log in
It turns out I only had 5,840.85826 FET which has dropped in price and is worth about $3800 today. If I can find the account address I could find its other assets. There were also other things in the vehicle.
It looks likely this is the account most of the FET (ASI) was held on in a stolen device: https://etherscan.io/address/0xd4ff400e0b027427aa961edf5227535131b63cb9#asse... The worth appears to be about $4,000 . It does not appear to have been accessed or used. The devices likely had access to a handful of other funded accounts unrelated to ASI, a couple of them on exotic chains.
After resetting, enabling lockdown mode (apple), and updating, sites still did not work. usps.com let me move forward if I briefly disabled lockdown mode and enabled cross-site tracking, but then said it encountered a server error and I needed to visit a post office in person. coinbase.com loaded, which it did not do prior, and I may have then had to perform one of the above disablings to log in
It turns out I only had 5,840.85826 FET which has dropped in price and is worth about $3800 today. If I can find the account address I could find its other assets. There were also other things in the vehicle.
It looks likely this is the account most of the FET (ASI) was held on in a stolen device: https://etherscan.io/address/0xd4ff400e0b027427aa961edf5227535131b63cb9#asse... The worth appears to be about $4,000 . It does not appear to have been accessed or used. The devices likely had access to a handful of other funded accounts unrelated to ASI, a couple of them on exotic chains.
Body takeovers while trying to pursue more addresses. In summary, the combined value of other on-device accounts is unlikely to exceed the value of that one. The total cryptocurrency value I am currently bringing to mind would not exceed $8,000 . It would be helpful to have police records to recall other things of value that were in the vehicle. I think I also mentioned some things in emails here. The purpose is if somebody were to help me, to identify recoverable funds to promise them part of. Engaging body issues now.
Having trouble continuing and exploring but this is almost certainly my account too that was on the stolen devices: https://www.mintscan.io/cosmos/address/cosmos1tr5my4gve29tlkge59e0qcnyhwkqpj... . Hopefully it has had no activity but didn’t immediately see how to check. I recognize the account address as one I typed by hand a lot working with cosmos. The value is presently about $7550 bringing the total cryptocurrency value to $11,550 in stolen data. I didn’t expect to find an account with larger balance. On Thu, Sep 11, 2025 at 5:43 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
After resetting, enabling lockdown mode (apple), and updating, sites still did not work. usps.com let me move forward if I briefly disabled lockdown mode and enabled cross-site tracking, but then said it encountered a server error and I needed to visit a post office in person. coinbase.com loaded, which it did not do prior, and I may have then had to perform one of the above disablings to log in
It turns out I only had 5,840.85826 FET which has dropped in price and is worth about $3800 today. If I can find the account address I could find its other assets. There were also other things in the vehicle.
It looks likely this is the account most of the FET (ASI) was held on in a stolen device: https://etherscan.io/address/0xd4ff400e0b027427aa961edf5227535131b63cb9#asse... The worth appears to be about $4,000 . It does not appear to have been accessed or used. The devices likely had access to a handful of other funded accounts unrelated to ASI, a couple of them on exotic chains.
Body takeovers while trying to pursue more addresses. In summary, the combined value of other on-device accounts is unlikely to exceed the value of that one. The total cryptocurrency value I am currently bringing to mind would not exceed $8,000 .
It would be helpful to have police records to recall other things of value that were in the vehicle. I think I also mentioned some things in emails here.
The purpose is if somebody were to help me, to identify recoverable funds to promise them part of.
Engaging body issues now.
Having trouble continuing and exploring but this is almost certainly my account too that was on the stolen devices: https://www.mintscan.io/cosmos/address/cosmos1tr5my4gve29tlkge59e0qcnyhwkqpj... . Hopefully it has had no activity but didn’t immediately see how to check. I recognize the account address as one I typed by hand a lot working with cosmos. The value is presently about $7550 bringing the total cryptocurrency value to $11,550 in stolen data.
I didn’t expect to find an account with larger balance.
I recall I also reused private key material (recovery phrases?) across different chains once or twice to ease memory and use. So I might also briefly try to translate that address to ethereum or bitcoin and see if anything existed, if body working better, but I think my nervous system is skeptical there are significant funds to be found (although I certainly just found a lot, it’s hard to be in a situation where alter rewires habits and things
On Thu, Sep 11, 2025 at 5:43 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
After resetting, enabling lockdown mode (apple), and updating, sites still did not work. usps.com let me move forward if I briefly disabled lockdown mode and enabled cross-site tracking, but then said it encountered a server error and I needed to visit a post office in person. coinbase.com loaded, which it did not do prior, and I may have then had to perform one of the above disablings to log in
It turns out I only had 5,840.85826 FET which has dropped in price and is worth about $3800 today. If I can find the account address I could find its other assets. There were also other things in the vehicle.
It looks likely this is the account most of the FET (ASI) was held on in a stolen device: https://etherscan.io/address/0xd4ff400e0b027427aa961edf5227535131b63cb9#asse... The worth appears to be about $4,000 . It does not appear to have been accessed or used. The devices likely had access to a handful of other funded accounts unrelated to ASI, a couple of them on exotic chains.
Body takeovers while trying to pursue more addresses. In summary, the combined value of other on-device accounts is unlikely to exceed the value of that one. The total cryptocurrency value I am currently bringing to mind would not exceed $8,000 .
It would be helpful to have police records to recall other things of value that were in the vehicle. I think I also mentioned some things in emails here.
The purpose is if somebody were to help me, to identify recoverable funds to promise them part of.
Engaging body issues now.
On Thu, Sep 11, 2025 at 5:58 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
Having trouble continuing and exploring but this is almost certainly my account too that was on the stolen devices: https://www.mintscan.io/cosmos/address/cosmos1tr5my4gve29tlkge59e0qcnyhwkqpj... . Hopefully it has had no activity but didn’t immediately see how to
looks like something like last used in feb 2024 but has set up authorizations for accounts running chain infrastructure to invest funds automatically
check. I recognize the account address as one I typed by hand a lot working with cosmos. The value is presently about $7550 bringing the total cryptocurrency value to $11,550 in stolen data.
I didn’t expect to find an account with larger balance.
I recall I also reused private key material (recovery phrases?) across different chains once or twice to ease memory and use. So I might also briefly try to translate that address to ethereum or bitcoin and see if anything existed, if body working better, but I think my nervous system is skeptical there are significant funds to be found (although I certainly just found a lot, it’s hard to be in a situation where alter rewires habits and things
On Thu, Sep 11, 2025 at 5:43 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
After resetting, enabling lockdown mode (apple), and updating, sites still did not work. usps.com let me move forward if I briefly disabled lockdown mode and enabled cross-site tracking, but then said it encountered a server error and I needed to visit a post office in person. coinbase.com loaded, which it did not do prior, and I may have then had to perform one of the above disablings to log in
It turns out I only had 5,840.85826 FET which has dropped in price and is worth about $3800 today. If I can find the account address I could find its other assets. There were also other things in the vehicle.
It looks likely this is the account most of the FET (ASI) was held on in a stolen device: https://etherscan.io/address/0xd4ff400e0b027427aa961edf5227535131b63cb9#asse... The worth appears to be about $4,000 . It does not appear to have been accessed or used. The devices likely had access to a handful of other funded accounts unrelated to ASI, a couple of them on exotic chains.
Body takeovers while trying to pursue more addresses. In summary, the combined value of other on-device accounts is unlikely to exceed the value of that one. The total cryptocurrency value I am currently bringing to mind would not exceed $8,000 .
It would be helpful to have police records to recall other things of value that were in the vehicle. I think I also mentioned some things in emails here.
The purpose is if somebody were to help me, to identify recoverable funds to promise them part of.
Engaging body issues now.
I’m sad because I don’t remember how to get an apartment
I’m sad because I don’t remember how to get an apartment
I’d like a place to stay near the theft so I can safely sort out my involvement
introject sees apartments as bad
wants to hurt and torture, perverse grin
I’m sad because I don’t remember how to get an apartment
I’d like a place to stay near the theft so I can safely sort out my involvement
introject sees apartments as bad
wants to hurt and torture, perverse grin
a difficult space would open up maybe, where there’s terror and a small handful of extremely disorienting but somewhat simple-sounding needs
I’m sad because I don’t remember how to get an apartment
I’d like a place to stay near the theft so I can safely sort out my involvement
introject sees apartments as bad
wants to hurt and torture, perverse grin
a difficult space would open up maybe, where there’s terror and a small handful of extremely disorienting but somewhat simple-sounding needs
discouraging that gemini wants me to recover to act on world responsibilities, professionals say recovery takes 3 years
I’m sad because I don’t remember how to get an apartment
I’d like a place to stay near the theft so I can safely sort out my involvement
introject sees apartments as bad
wants to hurt and torture, perverse grin
a difficult space would open up maybe, where there’s terror and a small handful of extremely disorienting but somewhat simple-sounding needs
discouraging that gemini wants me to recover to act on world responsibilities, professionals say recovery takes 3 years
Lets be a perpetrator, maybe an introject Say you act on tension by limiting the people who might help you. Tense.
On Thu, Sep 11, 2025 at 9:16 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
> I’m sad because I don’t remember how to get an apartment
I’d like a place to stay near the theft so I can safely sort out my involvement
introject sees apartments as bad
wants to hurt and torture, perverse grin
a difficult space would open up maybe, where there’s terror and a small handful of extremely disorienting but somewhat simple-sounding needs
discouraging that gemini wants me to recover to act on world responsibilities, professionals say recovery takes 3 years
Lets be a perpetrator, maybe an introject
Say you act on tension by limiting the people who might help you. Tense.
Like amnesia and stopping. You didn’t help me perfectly, I’ll disorient and stop you to protect us. Don’t remember this event, you could do something imperfect again. Don’t do anything at all like that again. Now we’re safe if you never do that ever again
On Thu, Sep 11, 2025 at 9:17 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
On Thu, Sep 11, 2025 at 9:16 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
> > I’m sad because I don’t remember how to get an apartment > > I’d like a place to stay near the theft so I can safely sort out my involvement
introject sees apartments as bad
wants to hurt and torture, perverse grin
a difficult space would open up maybe, where there’s terror and a small handful of extremely disorienting but somewhat simple-sounding needs
discouraging that gemini wants me to recover to act on world responsibilities, professionals say recovery takes 3 years
Lets be a perpetrator, maybe an introject
Say you act on tension by limiting the people who might help you. Tense.
Like amnesia and stopping. You didn’t help me perfectly, I’ll disorient and stop you to protect us. Don’t remember this event, you could do something imperfect again. Don’t do anything at all like that again. Now we’re safe if you never do that ever again
In prison with perpetrator. No, we’re not safe, because you’re stopping me from doing everything! I need to do these things to make us safe! I need to!
On Thu, Sep 11, 2025 at 9:18 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
On Thu, Sep 11, 2025 at 9:17 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
On Thu, Sep 11, 2025 at 9:16 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
> > > I’m sad because I don’t remember how to get an apartment > > > > I’d like a place to stay near the theft so I can safely sort out my involvement > > introject sees apartments as bad
wants to hurt and torture, perverse grin
a difficult space would open up maybe, where there’s terror and a small handful of extremely disorienting but somewhat simple-sounding needs
discouraging that gemini wants me to recover to act on world responsibilities, professionals say recovery takes 3 years
Lets be a perpetrator, maybe an introject
Say you act on tension by limiting the people who might help you. Tense.
Like amnesia and stopping. You didn’t help me perfectly, I’ll disorient and stop you to protect us. Don’t remember this event, you could do something imperfect again. Don’t do anything at all like that again. Now we’re safe if you never do that ever again
In prison with perpetrator. No, we’re not safe, because you’re stopping me from doing everything! I need to do these things to make us safe! I need to!
The language model might say I don’t understand. That the perpetrator is protecting me from a worse perpetrator.
On Thu, Sep 11, 2025 at 9:19 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
On Thu, Sep 11, 2025 at 9:18 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
On Thu, Sep 11, 2025 at 9:17 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
On Thu, Sep 11, 2025 at 9:16 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
> > > > I’m sad because I don’t remember how to get an apartment > > > > > > I’d like a place to stay near the theft so I can safely sort out my involvement > > > > introject sees apartments as bad > > wants to hurt and torture, perverse grin
a difficult space would open up maybe, where there’s terror and a small handful of extremely disorienting but somewhat simple-sounding needs
discouraging that gemini wants me to recover to act on world responsibilities, professionals say recovery takes 3 years
Lets be a perpetrator, maybe an introject
Say you act on tension by limiting the people who might help you. Tense.
Like amnesia and stopping. You didn’t help me perfectly, I’ll disorient and stop you to protect us. Don’t remember this event, you could do something imperfect again. Don’t do anything at all like that again. Now we’re safe if you never do that ever again
In prison with perpetrator. No, we’re not safe, because you’re stopping me from doing everything! I need to do these things to make us safe! I need to!
The language model might say I don’t understand. That the perpetrator is protecting me from a worse perpetrator.
It said not to argue to just validate I think
I’m happy that the thief was found and I want to learn what happened to devices But it’s hard to find things like a phone or a place to live I just want to ask the thief what happened to them
On Thu, Sep 11, 2025 at 9:21 AM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
I’m happy that the thief was found and I want to learn what happened to devices But it’s hard to find things like a phone or a place to live I just want to ask the thief what happened to them
So IF YOU DO T LIKE THAT IDEA CAN YOU SOLVE THE SITUATION PLEASE???? MY PERPETRATOR PART KEEPS ME IN PRISON __ALL DAY__ AND ONLY TRUSTS PERPETRATORS. I WILL PAY $20K FOR THESE DEVICES
I think I am too scattered and emotional and succeed at this :) maybe in some years if I am doing better I can find these people and departments
it was pretty destabilizing to learn about this out of nowhere I have other big things unaddressed, I’m accumulating large debt, taxes, medical
it was pretty destabilizing to learn about this out of nowhere
I have other big things unaddressed, I’m accumulating large debt, taxes, medical
What happened is I learned streets are dangerous! I thought, streets are friends, but nope, dangerous. Gotta be more careful!
I’m confused !
bad part has it hard, has to take me down without killing me, never completes
I wonder what activated it
I have learned that this sentence in the document that was attached to this email means the perpetrator must spend 6 years in prison for felony 0.0 omg But that means they won’t personally be coercing me or anything if I go down there. I wonder if there is a way I can, if they reveal where my possessions are, have them released Holy frogs
This is the first I learned that they found the person who (with others supporting) drove off with my stolen vehicle and all my personal possessions. He may have just been released from 8 months in prison. I still do not have my possessions including $30k in ASI coin, my unbacked-up hard drive with everything I did over these years, all my clothes and devices and identifying paper records etc etc etc. The letter was not preceded by other letters that I am aware of. It does not contain the form it says it should contain to be further notified.
However I am observing from this document that he was caught within a month. I simply did not learn of it until now. I wish I could have recovered my devices rather than exerting so much retribution. Still the fines he paid are much less than the cash that was in the vehicle. But there were also others supporting the theft and he may not have performed it out of choice, I don’t know. At the time it seemed he was black and they were white, although I don’t know if this is the same man.
I want to know what happened and if I could recover my possessions. I have amnesia and would like documentation of what happened.
It’s funny to look at this document and be all scared of an authority court document but it actually says somebody hurt me and they are trying to make that right for my benefit 0.o [[[…. [[[some of us think we could catch you/boss like we caught eric clay T_T T_T maybe you would help us catch you …?
I made this!!! omg it was and is so hard and slow (and rewarding!!) something is very wrong with my debian kernel usb-storage it freezes all i/o over and over. I shouldn’t be using the iwl minipcie wifi driver that debian has anyway but it lets me download substitutes :s I should go to a library or something for my substitutes and meet people !! I’m so confused :) I spend most of my time waiting for some systemwide usb io block, trying tmpfs mounts and filesystem opti— https://codeberg.org/xloem/guix-sources # guix-sources hi !!!!!! this calculates the most used origins in the guix operating system so as to generate packed optical media (or anything else) for using the operating system in a source-based way without a substitute server. this is my second guile code ever. i'm running this on a super slow low-end system but i'm dreaming of providing optical media sets and merging into upstream some day, who knows :D i'd have to recode it in a functional style etc. i'm also interesting in seeing if nix could be supported. but it's slow going here ... oh and I have a serious dissociative disorder i'm likely to forget about this project entirely and abandon it. BUT IT WORKS NOW YOU SHOULD BE ABLE TO RUN OFFLINE WITH IT. ummm after i finish building a dvd and fix any bugs. hey did you know the entire guix sourceset of all packages looks like it would fit on a single quad-layer blue-ray? it's the highest-end blueray, holds 128GB. right now it generates manifests that are specific to the guix release and system in question ... because guix 1.4.0 is hashing patches based on filename rather than content for me, and they're stored inside the release package, and referenced by absolute pathname, so it creates different hashes for identical content on each system >_> this is likely a bug because the obverse is true too, if the content changed but the pathname stayed the same it makes package hash collisions!! but i think there are other approaches already that can do this better, it's just hard to find where anybody's made use of them. it's all a learning experience. the code i've explored is really helpful and should stick around (but improve to be more functional and modular) but i think we could likely fix it up somehow guix is likely a really great OS if you are a real dev because you have to build it to do anything at all with it, and it is pointedly designed that way. one of my claims to fame is that i read through the iso9660 spec and calculated how many bytes overhead would be needed for files, dirs, etc! one design concern: packages, gexps, and origins are not treated uniformly -- it is possible some rarely used edge origins may be missed, or the depth of a package miscalculated. the processing of different 'things' should be reviewed and made uniform per the guix manual, which appears to be the source of truth moreso than inline comments. but this is basically part of resolving how to present origins robustly in general by learning the environment better. yay i finally pushed this to the internet! now it will stick around if i lose this computer. UPDATE README?
guix has been fun, but I’m having a rough day today and I was thinking of trying to combine dal’s book (which I haven’t read) with the recent one posted here, using an open long-context language model, “such that reading the combined book would have the same impact on a society of readers as reading each book separately” or such, in a paragraph-by-paragraph manner, and also manually adding my own boss spam to the source material, and posting both the source and result here (just like…) I dunno if I can access dal’s book. But I got so far as registering at qwen guix—
guix has been fun, but I’m having a rough day today and I was thinking of trying to combine dal’s book (which I haven’t read) with the recent one posted here, using an open long-context language model, “such that reading the combined book would have the same impact on a society of readers as reading each book separately” or such, in a paragraph-by-paragraph manner, and also manually adding my own boss spam to the source material, and posting both the source and result here (just like…)
I dunno if I can access dal’s book. But I got so far as registering at qwen
guix—
it could also be cool to pull in something by — anyway but I don’t want to set the bar too high
guix has been fun, but I’m having a rough day today and I was thinking of trying to combine dal’s book (which I haven’t read) with the recent one posted here, using an open long-context language model, “such that reading the combined book would have the same impact on a society of readers as reading each book separately” or such, in a paragraph-by-paragraph manner, and also manually adding my own boss spam to the source material, and posting both the source and result here (just like…)
I dunno if I can access dal’s book. But I got so far as registering at qwen
guix—
it could also be cool to pull in something by — anyway but I don’t want to set the bar too high I meant corey doctorow here, maybe the novel people said mentioned covert community interface control software in depth, could be wrong. There are also newer ones.
I found a dal novel at https://douglaslucas.com/fd2057/douglas_lucas_-_the_first_death_of_2057.txt . On website dal says is interested if novel is remixed, to let him know about it
I tried using vheer.com to try to manually convert theone’s title page to creative text. It’s made of 4 layered images. Background: A mesmerizing digital artwork featuring a central, glowing, crystal-like structure resembling a diamond, surrounded by intricate, interconnected networks of neon blue lines. The background is a deep, starry black, with additional glowing, angular crystals framing the scene. The overall aesthetic is futuristic and ethereal, with a sci-fi vibe. however it is interpreting the transparency behind the white images as an empty canvas. poking at it
I tried using vheer.com to try to manually convert theone’s title page to creative text. It’s made of 4 layered images.
Background: A mesmerizing digital artwork featuring a central, glowing, crystal-like structure resembling a diamond, surrounded by intricate, interconnected networks of neon blue lines. The background is a deep, starry black, with additional glowing, angular crystals framing the scene. The overall aesthetic is futuristic and ethereal, with a sci-fi vibe.
however it is interpreting the transparency behind the white images as an empty canvas. poking at it
Full title page (detailed, above was “creative”): This image is a digital cover for the novel "The One Movement" by Trecarri Trammm, featuring a trippy, geometric, and futuristic design. At the center is a white, triangular prism containing a glowing, faceted crystal. The background is a dark, starry space with abstract, crystalline formations. The title text is in a bold, white font with "THE ONE MOVEMENT" in red and "AM SATOSHI NAKAMOTO" in gray. The overall aesthetic is reminiscent of cyberpunk and sci-fi art. Manually repaired: Digital cover for the novel "The One Movement" by Trecargi Tramm, part 1 of 3, featuring a trippy, geometric, and futuristic design. At the center is a white, triangular prism containing a glowing, faceted crystal. The background is a dark, starry space with abstract, crystalline formations. The title text is in a bold, white and red font with effects applied, reading "THE ONE MOVEMENT" and " "I AM SATOSHI NAKAMOTO" ". The overall aesthetic is reminiscent of cyberpunk and sci-fi art. Table of Contents Background landscape at bottom (creative): This is a digital painting that captures a lush tropical paradise. Tall, slender palm trees with lush green fronds dominate the foreground, their trunks curving gracefully upwards. The sky above is a brilliant blue, dotted with wispy, white clouds that add depth and dimension to the scene. In the midground, the landscape transitions into a serene, turquoise ocean, its surface gently rippling under the sunlight. Nestled among the dense greenery and palm trees are several round, white-roofed huts, likely vacation homes or resorts, with inviting pools and lush gardens. The architecture is simple yet elegant, blending seamlessly with the natural surroundings. The overall ambiance is one of tranquility and luxury, evoking a sense of escape and relaxation. Background space image at top (creative): A breathtaking digital artwork depicting Earth from space, showcasing a vibrant aurora borealis illuminating the horizon with fiery streaks of red, orange, and yellow. The planet's curvature and rugged mountain ranges are visible, with a blanket of clouds adding depth and texture. The backdrop is a star-studded, deep blue-black sky, enhancing the ethereal beauty of the aurora. The image captures a moment of serene yet awe-inspiring cosmic wonder, blending realism with a touch of fantasy. Manual comment: The presentation of the mountains in the space image allows it to blend with the landscape in a somewhat visually believable manner. Object in space image (creative): A sleek, futuristic spacecraft hovers in space, showcasing intricate metallic details and glowing panels. The central section, with its hexagonal structure, features circular, golden-hued windows. Multiple solar panels extend from the sides, while a small, round satellite orbits nearby. The overall design exudes a sense of advanced technology and exploration. Whole page (detailed): This is a digital infographic for a science fiction story titled "Table of Contents" for "Prologue: Year 2195" by "Chapters: 1-10." It features a space scene with a spaceship against a starry background, with elements like "Chapter 6: The Blueprint" and "Chapter 9: Flats Demise." The layout includes white text on a dark blue background with red highlights and a curved pink ribbon on the bottom. Manual repair: This is a digital table of contents for a science fiction story, listing "Prologue: Year 2195" followed by "Chapters: 1-10." It features a space scene with a spaceship against a starry background, with elements like "Chapter 6: The Blueprint" and "Chapter 9: Flats Demise." The layout includes white text on a dark blue background with red highlights and a curved red ribbon on the bottom. …
Once upon a time, an innocent living soul decided to go to CoolMart and buy a ZappoPad innocent living soul felt so cool and good-looking with their zappopad from coolmart there was a picture of this somewhere, where was it p
Once upon a time, an innocent living soul decided to go to CoolMart and buy a ZappoPad
innocent living soul felt so cool and good-looking with their zappopad from coolmart
there was a picture of this somewhere, where was it p
Here it is I think this might have been the one the … uhh slaveryware? dunno … censored. Maybe we need a good image for how although it also makes you slovenly to use free-as-in-freedom systems, it doesn’t get paid millions of dollars to take your soul and heart out of your body, upload them to data farms, and use them aggressively for sustained genocide against your own people
I had to reboot my device to send the gemini 2.5 expression and operator text. Upon reboot the image I just posted in this thread is showing too when before it didn’t.
Hi I’m excited about — hrm
different topic. Let’s imagine an imaginary mailing list topiced around cryptography, with multiple influences changing its content. one of these influences could be an anti cryptography influence. What kind of cryptography would an anti cryptography influence support, in such a scenario? What if we were to xor every bit of a message with 0s. This may sound new to some, but there is a hook — our xor0 operation exists in a fallible physical world, where, due to electromagnetic noise, component degradation, corruption, os and microcode bugs, etc etc etc certainly malicious actors, cosmic rays, and the karma and intents of the user (!;s) along with cpu overclocking and electron hole density fluctuations … — sometimes this xor0 operation returns an incorrect result. It’s not bad ! I wrote about it for a paragr—!
different topic.
Let’s imagine an imaginary mailing list topiced around cryptography, with multiple influences changing its content. one of these influences could be an anti cryptography influence. What kind of cryptography would an anti cryptography influence support, in such a scenario?
What if we were to xor every bit of a message with 0s. This may sound new to some, but there is a hook — our xor0 operation exists in a fallible physical world, where, due to electromagnetic noise, component degradation, corruption, os and microcode bugs, etc etc etc certainly malicious actors, cosmic rays, and the karma and intents of the user (!;s) along with cpu overclocking and electron hole density fluctuations … — sometimes this xor0 operation returns an incorrect result.
It’s not bad ! I wrote about it for a paragr—!
One could go on, on that topic. Here’s another —- uhhh or Hmm
Let’s imagine an imaginary mailing list topiced around cryptography, with multiple influences changing its content. one of these influences could be an anti cryptography influence. What kind of cryptography would an anti cryptography influence support, in such a scenario?
What if we were to xor every bit of a message with 0s. This may sound new to some, but there is a hook — our xor0 operation exists in a fallible physical world, where, due to electromagnetic noise, component degradation, corruption, os and microcode bugs, etc etc etc certainly malicious actors, cosmic rays, and the karma and intents of the user (!;s) along with cpu overclocking and electron hole density fluctuations … — sometimes this xor0 operation returns an incorrect result.
It’s not bad ! I wrote about it for a paragr—!
One could go on, on that topic. Here’s another —- uhhh or
Hmm
great idea: let’s make a xor0 message encryption/decryption tool! There is worry that it could be mispurposed to perform one-time pads somehow. After our extreme experience of being domesticated by surveillance empires, it could be scary if our xor0 code were mutated by a 3rd actor into xorkey code. We’d want to make sure it wasn’t a setup to get us targeted for non-fake cryptographic works.
Let’s imagine an imaginary mailing list topiced around cryptography, with multiple influences changing its content. one of these influences could be an anti cryptography influence. What kind of cryptography would an anti cryptography influence support, in such a scenario?
What if we were to xor every bit of a message with 0s. This may sound new to some, but there is a hook — our xor0 operation exists in a fallible physical world, where, due to electromagnetic noise, component degradation, corruption, os and microcode bugs, etc etc etc certainly malicious actors, cosmic rays, and the karma and intents of the user (!;s) along with cpu overclocking and electron hole density fluctuations … — sometimes this xor0 operation returns an incorrect result.
It’s not bad ! I wrote about it for a paragr—!
One could go on, on that topic. Here’s another —- uhhh or
Hmm
great idea: let’s make a xor0 message encryption/decryption tool!
There is worry that it could be mispurposed to perform one-time pads somehow. After our extreme experience of being domesticated by surveillance empires, it could be scary if our xor0 code were mutated by a 3rd actor into xorkey code. We’d want to make sure it wasn’t a setup to get us targeted for non-fake cryptographic works.
Let’s imagine that all keys are public, well-known, and shared with these various extreme events of quantum surveillance and hole density bugs. We could a single great Key To The Universe that encrypts all messages, whether xor0 or not. We could simulate this in pseudocode. intermediate = in xor 0 if (unlikely): intermediate = intermediate xor keytotheuniverse # said to be mostly 0s but always present and listening
whew! How scary! However, in the preceding simulation, the keytotheuniverse vector was easily reversible. If we can reproduce the impact for it, we can xor again to decrypt it. This makes giant surveillance empires _super happy_ define unxor = xor if (unlikely && very_likely): intermediate = keytotheuniverse unxor intermediate # saved your message, it was being eaten by cosmic rays. buy shit from china to support the tariffs!
whew! How scary!
However, in the preceding simulation, the keytotheuniverse vector was easily reversible.
If we can reproduce the impact for it, we can xor again to decrypt it.
This makes giant surveillance empires _super happy_
define unxor = xor if (unlikely && very_likely): intermediate = keytotheuniverse unxor intermediate # saved your message, it was being eaten by cosmic rays. buy shit from china to support the tariffs!
We can make them even happier though. if (likely): message_improvement_vector = “buy shit from china to support the tariffs!” xor intermediate intermediate xor= message_improvement_vector out = intermediate return out
if (likely): message_improvement_vector = “buy shit from china to support the tariffs!” xor intermediate intermediate xor= message_improvement_vector
out = intermediate
return out
this message was not approved nor endorsed by your local surveillance empires
maybe another kind of cryptography where messages can be encrypted _with_ their keys and then separated fr—
intro computer programming computers are an interesting tool that are capable of independent behavior. In fact, computers are considered to be able to do anything a human can do. In reality they cannot give birth and many other things, but they can make money more effectively than humans, which is changing our world severely. So, when you learn computer programming there is a sweet spot of completely random length where you can make computers do absolutely anything for you like a god, until you stop being able to do this. To make this sweet spot last longer you basically have to be careful and lucky. To _get_ to the sweet spot, you traditionally learn to program them, by writing code.
intro computer programming
computers are an interesting tool that are capable of independent behavior. In fact, computers are considered to be able to do anything a human can do. In reality they cannot give birth and many other things, but they can make money more effectively than humans, which is changing our world severely.
So, when you learn computer programming there is a sweet spot of completely random length where you can make computers do absolutely anything for you like a god, until you stop being able to do this. To make this sweet spot last longer you basically have to be careful and lucky.
To _get_ to the sweet spot, you traditionally learn to program them, by writing code.
Likely because of conflict around that “sweet spot”, most modern programming is done in languages called “procedural”. Procedural languages have the computer do things in a very rote step-by-step manner, always in the same order, only making very simple decisions exactly when and how they are told. This is very nonintuitive for almost everybody when starting out, because it is not how most humans usually think, so normal computer programming is mostly about translating human interpretations of problems into these small rote steps that the computer expects.
intro computer programming
computers are an interesting tool that are capable of independent behavior. In fact, computers are considered to be able to do anything a human can do. In reality they cannot give birth and many other things, but they can make money more effectively than humans, which is changing our world severely.
So, when you learn computer programming there is a sweet spot of completely random length where you can make computers do absolutely anything for you like a god, until you stop being able to do this. To make this sweet spot last longer you basically have to be careful and lucky.
To _get_ to the sweet spot, you traditionally learn to program them, by writing code.
Likely because of conflict around that “sweet spot”, most modern programming is done in languages called “procedural”. Procedural languages have the computer do things in a very rote step-by-step manner, always in the same order, only making very simple decisions exactly when and how they are told. This is very nonintuitive for almost everybody when starting out, because it is not how most humans usually think, so normal computer programming is mostly about translating human interpretations of problems into these small rote steps that the computer expects.
I always say that when starting out programming you should immediately learn to use the interactive debugger with a view of the locals visible, and step through. It makes the unintuitive procedural behavior very clear, explaining every part. …
information from the fairchild semiconductor data sheet for the lm555/ne555/sa555 single timer (as archived on ben eater’s website) rev 1.0.3 2002 front page Features - High Current Drive Capability (200mA) - Adjustable Duty Cycle - Temperature Stability of 0.005%/degC - Timing From uSec to Hours - Turn off Time Less Than 2uSec Applications - Precision Timing - Pulse Generation - Time Delay Generation - Sequential Timing Description The xx555 is a highly stable controller capable of producing accurate timing pulses. With a monostable operation, the time delay is controlled by one external resistor and one capacitor. With an a stable operation, the frequency and duty cycle are accurately controlled by two external resistors and one capacitor. 8-DIP / 8-SOP : pin 1 is labeled as the front-right lead with the length of the body of the chip aiming away from the viewer. there may be a marking on the upper side of the package near to the viewer, but it is not clear Internal Block Diagram GND 1 - R -+- R -+- R - 8 VCC | Trigger 2 - - 7 Discharge Output 3 - 6 Threshold Reset 4. - 5 Control Voltage the resistor triplet from gnd to vcc are arranged in a 1/3rd 2/3rds voltage divider . There are two triangles labeled Comp. that connect to the lower and higher voltage divisions. The first Comp has its + input to the 1/3rd division and its - input to 2 Trigger. The output goes to an internal block labeled F/F . The second Comp. has its - input to the 2/3rd division and its + from 6 Threshold. Its output goes to a different side of F/F. Output 3 comes from a block labeled OutPut Stage which itself comes from F/F. Reset goes to the bottom of a T with a diagonal line coming off each top. The right diagonal is an arrow pointing at the T and stems from an open circle labeled Vref. The left diagonal goes to F/F. 5 Control Voltage is also connected to the negative lead of the second Comp, and hence wired into the resistor line from VCC to GND (on the high end). 7 discharge goes to another T with diagonals. It is on the right diagonal which lacks an arrow. The left diagonal has an arrow pointing away and goes to a ground symbol. The T is labeled Discharging Tr. The bottom goes to F/F . Page 2 Absolute Maximum Ratings (T_A = 25degC) Parameter Symbol Value Unit Supply Voltage V_CC 16 V Lead Temperature (Soldering 10sec) T_LEAD 300 degC Power Dissipation P_D 600 mW Operating Temperature Range LM555/NE555 T_OPR 0 ~ +70 degC SA555 -40 ~ +85 Storage Temperature Range T_STG -65 ~ +150 degC Page 3 Electrical Characteristics (T_A = 25degC, V_CC = 5 ~ 15V, unless otherwise specified) Parameter Symbol Supply Voltage V_CC Supply Current (Low Stable)(Note1) I_CC … wow that’s a lot of data to try to format on mobile, lots of voltage and error specs on page 3, footnotes at the bottom. This is important stuff if designing a circuit to use this! Page 4 ….
On Fri, Oct 3, 2025 at 5:09 PM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
information from the fairchild semiconductor data sheet for the lm555/ne555/sa555 single timer (as archived on ben eater’s website) rev 1.0.3 2002
front page
Features - High Current Drive Capability (200mA) - Adjustable Duty Cycle - Temperature Stability of 0.005%/degC - Timing From uSec to Hours - Turn off Time Less Than 2uSec
Applications - Precision Timing - Pulse Generation - Time Delay Generation - Sequential Timing
Description The xx555 is a highly stable controller capable of producing accurate timing pulses. With a monostable operation, the time delay is controlled by one external resistor and one capacitor. With an a stable operation, the frequency and duty cycle are accurately controlled by two external resistors and one capacitor.
8-DIP / 8-SOP : pin 1 is labeled as the front-right lead with the length of the body of the chip aiming away from the viewer. there may be a marking on the upper side of the package near to the viewer, but it is not clear
Internal Block Diagram
GND 1 - R -+- R -+- R - 8 VCC | Trigger 2 - - 7 Discharge Output 3 - 6 Threshold Reset 4. - 5 Control Voltage
the resistor triplet from gnd to vcc are arranged in a 1/3rd 2/3rds voltage divider . There are two triangles labeled Comp. that connect to the lower and higher voltage divisions. The first Comp has its + input to the 1/3rd division and its - input to 2 Trigger. The output goes to an internal block labeled F/F . The second Comp. has its - input to the 2/3rd division and its + from 6 Threshold. Its output goes to a different side of F/F. Output 3 comes from a block labeled OutPut Stage which itself comes from F/F. Reset goes to the bottom of a T with a diagonal line coming off each top. The right diagonal is an arrow pointing at the T and stems from an open circle labeled Vref. The left diagonal goes to F/F. 5 Control Voltage is also connected to the negative lead of the second Comp, and hence wired into the resistor line from VCC to GND (on the high end). 7 discharge goes to another T with diagonals. It is on the right diagonal which lacks an arrow. The left diagonal has an arrow pointing away and goes to a ground symbol. The T is labeled Discharging Tr. The bottom goes to F/F .
Page 2
Absolute Maximum Ratings (T_A = 25degC)
Parameter Symbol Value Unit
Supply Voltage V_CC 16 V Lead Temperature (Soldering 10sec) T_LEAD 300 degC Power Dissipation P_D 600 mW Operating Temperature Range LM555/NE555 T_OPR 0 ~ +70 degC SA555 -40 ~ +85 Storage Temperature Range T_STG -65 ~ +150 degC
Page 3 Electrical Characteristics (T_A = 25degC, V_CC = 5 ~ 15V, unless otherwise specified)
Parameter Symbol
Supply Voltage V_CC Supply Current (Low Stable)(Note1) I_CC
… wow that’s a lot of data to try to format on mobile, lots of voltage and error specs on page 3, footnotes at the bottom. This is important stuff if designing a circuit to use this!
Page 4
….
this chip has two operating modes described at the start of the data sheet, called “monostable” and “astable”. On pages 4-10, 6 modes are described: 1. Monostable operation (pg4) 2. Astable operation (pg5) 3. Frequency divider (pg7) … 4. Pulse width modulation (pg8) control is a sine … 5. Pulse position modulation (pg8) control is a damped offset sine with trigger a sawtooth that proportionally follows the sine in both offset and magnitude output changes frequency depending on control, mostly high with brief 0s at the tooth of the saw 6. Linear ramp (pg9) trigger is sawtooth, output is mostly high with brief 0s at the tooth of the saw
Information on page 4 Table 1 Basic Operating Table is at the top, with a 2-paragraph caption. The bottom begins 1. Monostable Operation and has 3 figures. Figure 1 is a circuit diagram. Discharge 7 is wired to threshold 8 with a resistor to VCc and a capacitor to ground. Cont 5 has a capacitor to ground. 2 Trigger is wired to a user source, as is 3 out to a user load. Figure 2 shows R and C vs time. All lines are directly proportional to time, at 45 degrees. It looks like C(t) = 0 moves to higher t values as the resistance increases, crossing t=0 at R= 10kOhm I think. Figure 3 shows the waveforms of trigger, output, and threshold for monostable operation, under R=9.1kOhm, load=1kOhm, C to thresh=0.01uF, VCC=5v Output is a square wave. Thresh is a shark tooth while output=1, 0 when output=0. Trigger is mostly high, 0 briefly at the start of the shark tooth.
On Fri, Oct 3, 2025 at 5:40 PM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
Information on page 4
Table 1 Basic Operating Table is at the top, with a 2-paragraph caption.
The bottom begins 1. Monostable Operation and has 3 figures.
Figure 1 is a circuit diagram. Discharge 7 is wired to threshold 8 with a resistor to VCc and a capacitor to ground. Cont 5 has a capacitor to ground. 2 Trigger is wired to a user source, as is 3 out to a user load.
Figure 2 shows R and C vs time. All lines are directly proportional to time, at 45 degrees. It looks like C(t) = 0 moves to higher t values as the resistance increases, crossing t=0 at R= 10kOhm I think.
Figure 3 shows the waveforms of trigger, output, and threshold for monostable operation, under R=9.1kOhm, load=1kOhm, C to thresh=0.01uF, VCC=5v
Output is a square wave. Thresh is a shark tooth while output=1, 0 when output=0. Trigger is mostly high, 0 briefly at the start of the shark tooth.
Top of page 5: Figure 1 illustrates a monostable circuit. In this modem the timer generates a fixed pulse… :)
(computational microscopy is cool because you can use math or software to defeat the limits of physics!)
(computational microscopy is cool because you can use math or software to defeat the limits of physics!)
(“how? How does it defeat the limits of physics?” “Well I am still understanding it but —“ “Just say how!” “One way is by retrieving the phase of incident radiation, one can infer tiny details of the shape and material of something it interacted with far below the wavelength of the radiation.” I think there might have been an analogue where you can make telescopes see bigger and farther too
(computational microscopy is cool because you can use math or software to
defeat the limits of physics!)
(“how? How does it defeat the limits of physics?” “Well I am still understanding it but —“ “Just say how!” “One way is by retrieving the phase of incident radiation, one can infer tiny details of the shape and material of something it interacted with far below the wavelength of the radiation.” I think there might have been an analogue where you can make telescopes see bigger and farther too
(Basically the only people who actually understood electromagnetic imaging for the past century are radio astronomers
(computational microscopy is cool because you can use math or software to
defeat the limits of physics!)
(“how? How does it defeat the limits of physics?” “Well I am still understanding it but —“ “Just say how!” “One way is by retrieving the phase of incident radiation, one can infer tiny details of the shape and material of something it interacted with far below the wavelength of the radiation.” I think there might have been an analogue where you can make telescopes see bigger and farther too
(Basically the only people who actually understood electromagnetic imaging for the past century are radio astronomers
Oops. I am sorry if I am rude here
Here is a paper from 2014 on making one computational microscope using a raspberry pi w/ pi camera and a 3d printer: https://pmc.ncbi.nlm.nih.gov/articles/PMC4169052/ It has a resolution of around 600 nm but also provides per-pixel angular photon phase. It’s only about as big as a raspberry pi. The FPM approach makes it easy to correct for lens problems, alignment problems, manufacturing errors etc, because of how simple the iterative process for fitting the model of the object is.
Here is a paper from 2014 on making one computational microscope using a
raspberry pi w/ pi camera and a 3d printer: https://pmc.ncbi.nlm.nih.gov/articles/PMC4169052/ It has a resolution of around 600 nm but also provides per-pixel angular photon phase. It’s only about as big as a raspberry pi. The FPM approach makes it easy to correct for lens problems, alignment problems, manufacturing errors etc, because of how simple the iterative process for fitting the model of the object is.
Oops that’s a different paper
Here is a paper from 2014 on making one computational microscope using a
raspberry pi w/ pi camera and a 3d printer: https://pmc.ncbi.nlm.nih.gov/articles/PMC4169052/ It has a resolution of around 600 nm but also provides per-pixel angular photon phase. It’s only about as big as a raspberry pi. The FPM approach makes it easy to correct for lens problems, alignment problems, manufacturing errors etc, because of how simple the iterative process for fitting the model of the object is.
Oops that’s a different paper
This is the paper matching my description. It is from 2019. https://www.nature.com/articles/s41598-019-43845-9
the cmos is said to operate at 8 fps … this would make my argument with the ai wrong unless (e.g. amortized with many parallel things or something maybe), because normally one matrix op relies on output of last. Maybe that is what it was trying to get at. In the microscopy papers they imply cmos is faster than this — but in the fpm papers I was excited about recently they usually do low resolution. It sounds like it may be possible but if so I haven’t sorted out how quite yet, to do fast tokens. Maybe by engaging the internals of the cmos somehow? I sure didn’t connect that! I was expecting faster cmos
the cmos is said to operate at 8 fps … this would make my argument with the ai wrong unless (e.g. amortized with many parallel things or something maybe), because normally one matrix op relies on output of last. Maybe that is what it was trying to get at. In the microscopy papers they imply cmos is faster than this — but in the fpm papers I was excited about recently they usually do low resolution.
It sounds like it may be possible but if so I haven’t sorted out how quite yet, to do fast tokens. Maybe by engaging the internals of the cmos somehow?
I sure didn’t connect that! I was expecting faster cmos
yeah the Sony IMX500 used in the raspberry pi camera can do 12MP/60fps or 1080p at 240fps [1] 1: https://developer.sony.com/imx500/imx500-key-specifications
the cmos is said to operate at 8 fps … this would make my argument with the ai wrong unless (e.g. amortized with many parallel things or something maybe), because normally one matrix op relies on output of last. Maybe that is what it was trying to get at. In the microscopy papers they imply cmos is faster than this — but in the fpm papers I was excited about recently they usually do low resolution.
It sounds like it may be possible but if so I haven’t sorted out how quite yet, to do fast tokens. Maybe by engaging the internals of the cmos somehow?
I sure didn’t connect that! I was expecting faster cmos
yeah the Sony IMX500 used in the raspberry pi camera can do 12MP/60fps or 1080p at 240fps [1] 1: https://developer.sony.com/imx500/imx500-key-specifications
Oh bit the numbers from perplexity were for a 3,000mp chip 0.o sounds expensive
the cmos is said to operate at 8 fps … this would make my argument with the ai wrong unless (e.g. amortized with many parallel things or something maybe), because normally one matrix op relies on output of last. Maybe that is what it was trying to get at. In the microscopy papers they imply cmos is faster than this — but in the fpm papers I was excited about recently they usually do low resolution.
It sounds like it may be possible but if so I haven’t sorted out how quite yet, to do fast tokens. Maybe by engaging the internals of the cmos somehow?
I sure didn’t connect that! I was expecting faster cmos
yeah the Sony IMX500 used in the raspberry pi camera can do 12MP/60fps or 1080p at 240fps [1] 1: https://developer.sony.com/imx500/imx500-key-specifications
Oh bit the numbers from perplexity were for a 3,000mp chip 0.o sounds expensive
Oh! But these chips generally offer higher frame rates at lower resolutions, so they _already_ can exchange between space and time. It should be fine to reorder matrices to be more serial.
the cmos is said to operate at 8 fps … this would make my argument with the ai wrong unless (e.g. amortized with many parallel things or something maybe), because normally one matrix op relies on output of last. Maybe that is what it was trying to get at. In the microscopy papers they imply cmos is faster than this — but in the fpm papers I was excited about recently they usually do low resolution.
It sounds like it may be possible but if so I haven’t sorted out how quite yet, to do fast tokens. Maybe by engaging the internals of the cmos somehow?
I sure didn’t connect that! I was expecting faster cmos
yeah the Sony IMX500 used in the raspberry pi camera can do 12MP/60fps or 1080p at 240fps [1] 1: https://developer.sony.com/imx500/imx500-key-specifications
Oh bit the numbers from perplexity were for a 3,000mp chip 0.o sounds expensive
It was 410 mp/ 8 fps. 3,000mp/s . The page perplexity cited says it also does 100MP @ 24 fps and implying 4x underlying pixel depth from binning. (Note though that 24 < 8 x 4, although it may get 32 fps with binning disabled, I dunno. Either way 75% is not much if one is trying to get to milliseconds or microseconds or whichever it was
Oh! But these chips generally offer higher frame rates at lower resolutions, so they _already_ can exchange between space and time. It should be fine to reorder matrices to be more serial.
the cmos is said to operate at 8 fps … this would make my argument with the ai wrong unless (e.g. amortized with many parallel things or something maybe), because normally one matrix op relies on output of last. Maybe that is what it was trying to get at. In the microscopy papers they imply cmos is faster than this — but in the fpm papers I was excited about recently they usually do low resolution.
It sounds like it may be possible but if so I haven’t sorted out how quite yet, to do fast tokens. Maybe by engaging the internals of the cmos somehow?
I sure didn’t connect that! I was expecting faster cmos
yeah the Sony IMX500 used in the raspberry pi camera can do 12MP/60fps or 1080p at 240fps [1] 1: https://developer.sony.com/imx500/imx500-key-specifications
Oh bit the numbers from perplexity were for a 3,000mp chip 0.o sounds expensive
It was 410 mp/ 8 fps. 3,000mp/s . The page perplexity cited says it also does 100MP @ 24 fps and implying 4x underlying pixel depth from binning. (Note though that 24 < 8 x 4, although it may get 32 fps with binning disabled, I dunno. Either way 75% is not much if one is trying to get to milliseconds or microseconds or whichever it was
Oh! But these chips generally offer higher frame rates at lower resolutions, so they _already_ can exchange between space and time. It should be fine to reorder matrices to be more serial.
So you’d need a very high frame rate. Not sure how many tensors are in 405b, but you’d need a frame for almost every one. So if there are 800, then 800fps would net 1 token/sec . One could consider using many cheap high-frame-rate chips possibly with low resolution, and clocking them in an offset manner. The “photonic multiplication” would be limited by the speed of the lcd (although these could also be offset). A slow lcd might divide the 16k integration factor, slowing the whole system. There are cmos with 700,000fps [2]. The company selling them also sells photonic chips [3]. With the IMX500 running at 240fps, one might consider figuring a way to have 16 of them and getting 3k fps, this might give 4 tokens/sec or so. The high cmos frame rates are accomplished by windowing part of the visual field. This windowing is likely possibly with the canon chip and the imx500 too, at least with the underlying chip. This might let them accomplish the theoretical speed (not totally sure if i have that right but it seems quite possible). Then emitter speed vs 16k integration speed up would come into play. 2: https://www.bi-pol.com/high-speed-cmos-image-sensors/ 3: https://www.bi-pol.com/photonic-integrated-circuits/
the cmos is said to operate at 8 fps … this would make my argument with the ai wrong unless (e.g. amortized with many parallel things or something maybe), because normally one matrix op relies on output of last. Maybe that is what it was trying to get at. In the microscopy papers they imply cmos is faster than this — but in the fpm papers I was excited about recently they usually do low resolution.
It sounds like it may be possible but if so I haven’t sorted out how quite yet, to do fast tokens. Maybe by engaging the internals of the cmos somehow?
I sure didn’t connect that! I was expecting faster cmos
yeah the Sony IMX500 used in the raspberry pi camera can do 12MP/60fps or 1080p at 240fps [1] 1: https://developer.sony.com/imx500/imx500-key-specifications
Oh bit the numbers from perplexity were for a 3,000mp chip 0.o sounds expensive
It was 410 mp/ 8 fps. 3,000mp/s . The page perplexity cited says it also does 100MP @ 24 fps and implying 4x underlying pixel depth from binning. (Note though that 24 < 8 x 4, although it may get 32 fps with binning disabled, I dunno. Either way 75% is not much if one is trying to get to milliseconds or microseconds or whichever it was
Oh! But these chips generally offer higher frame rates at lower resolutions, so they _already_ can exchange between space and time. It should be fine to reorder matrices to be more serial.
So you’d need a very high frame rate. Not sure how many tensors are in 405b, but you’d need a frame for almost every one. So if there are 800, then 800fps would net 1 token/sec . One could consider using many cheap high-frame-rate chips possibly with low resolution, and clocking them in an offset manner. The “photonic multiplication” would be limited by the speed of the lcd (although these could also be offset). A slow lcd might divide the 16k integration factor, slowing the whole system.
There are cmos with 700,000fps [2]. The company selling them also sells photonic chips [3].
With the IMX500 running at 240fps, one might consider figuring a way to have 16 of them and getting 3k fps, this might give 4 tokens/sec or so.
The high cmos frame rates are accomplished by windowing part of the visual field. This windowing is likely possibly with the canon chip and the imx500 too, at least with the underlying chip. This might let them accomplish the theoretical speed (not totally sure if i have that right but it seems quite possible). Then emitter speed vs 16k integration speed up would come into play.
2: https://www.bi-pol.com/high-speed-cmos-image-sensors/ 3: https://www.bi-pol.com/photonic-integrated-circuits/
digital micro mirror devices often have very high rates, for example the DLP670S [3] has over 1khz 8-bit rate, almost 10khz binary rate, 4.3 MP. however this is very poor quantization so one of those dimensions might reduce, one could keep the binary rate and use the high resolution to express brightness in some manner; the space is complicated by both the emitter and receiver being square rather than linear, and one of the dimensions used for an integration optimization. Takes thinking. Off angles may help a lot. 3: https://www.ti.com/product/DLP670S
trauma boss visits his grandmother trauma boss: ‘grama, I the money I have been storing under your pillow. I need to pay my taxes.’ trauma boss’s grandmother: ‘bossy-wossie! it twinkles my heart like nothing else to,see you, bossy-wossie! you must tell me how your … your … your … you must tell me how things are going! but bossy-wossie, don’t you remember when you came and took all your money for ice cream? you must rem—
I can guess that it’s not what most pe—
puppet 1: “hello and welcome to my puppet show!” puppet 2 comes on stage and beams excitedly at puppet 1 puppet 2: “oh boy! a puppet show! I just love love puppet shows! I can’t wait!” puppet 2 bends like they are sitting down and claps their arms together
puppet 1: “hello and welcome to my puppet show!”
puppet 2 comes on stage and beams excitedly at puppet 1
puppet 2: “oh boy! a puppet show! I just love love puppet shows! I can’t wait!”
puppet 2 bends like they are sitting down and claps their arms together
puppet 1 beams back puppet 1: “yes! I am putting on a puppet show! be excited!” puppet 2 keeps applauding excitedly puppet 1 ducks offstage and puppet 2 quiets expectation briefly hangs in the air puppet 1 comes back, but ducked down a little. tiny socks or mittens with pompoms or someth—
—— torturer 7 and torture victim 6 are doing peer support in a tort—
information on databases there are many many kinds of databases. _tons and tons_ but (sql, nosql :/
information on databases
there are many many kinds of databases. _tons and tons_ but (sql, nosql :/
radio waves look a little like corkscrews or hmmmmmmmmmmmm uhhh kind of like a square wavy spoon? they—
Ideas on using giant EM field emitters to cause poltergeist effec—
information on databases
there are many many kinds of databases. _tons and tons_ but (sql, nosql :/
radio waves look a little like corkscrews or hmmmmmmmmmmmm uhhh kind of like a square wavy spoon? they—
Ideas on using giant EM field emitters to cause poltergeist effec—
How To Get The Jump on King Kong
some doors are new to being opened, and may need guidance task: visit website, ask about https://www.perplexity.ai/search/write-a-cooking-recipe-introdu-r5M5CVP0TFe_... # Write a cooking recipe introducing new doors on how to be opened. Give teasers or something about being closed at the end. Here is your recipe: *** ### Recipe: How to Open New Doors **Ingredients** - 1 strong hand of curiosity - 2 generous pinches of courage - A cup of patience - A drizzle of trust in the unknown - Optional: one key that fits only you **Instructions** 1. Begin by clearing the dust from the doorknobs of your thoughts. Old handles stick when fear builds up—wipe gently with curiosity until the metal gleams. 2. Mix courage and patience in equal measure. If the mixture feels too thick, stir in a little trust; it thins resistance beautifully. 3. Approach each door slowly. Don’t force it open—press your palm against the wood, breathe, and feel for the quiet hum of possibility on the other side. 4. Turn the knob lightly. If it resists, step back. Some doors answer only to gentleness, some to timing, and some only open when you’ve learned the name of their silence. 5. Once it swings open, step through without looking back. Every entrance rearranges the floor plan of who you are. **Serving Suggestion** Serve warm with wonder. Share with those who have forgotten that doors can also open toward new air, not just further walls. **Teaser** But be mindful—every door that opens leaves another quietly closing behind you, its latch settling into place with a soft, secret click you may not hear until much later. *** Would you like this rewritten in a more mystical tone or as a modern, poetic-style recipe?
# Perplexity, let’s play an adventure game. I’ll be DM. Here goes: You are standing at the entrance to a dank cave. Your state-provided butler-bot is here, it can always do anything for you. Its looking at you, and you see it pulsing its red light in a way that always seems a little hypnotizing to you. You’re look into the red light of your butler bot, and you think you must be on the right track. What do you do? > I step closer to the butler-bot, trying to focus on its pulsing red light, wondering if it’s signaling something important or just trying to calm me. I ask the bot, “What’s in the cave, and why do you seem so sure we should go inside?” while keeping one hand on the cave wall, feeling its cold, damp texture for signs of danger or hidden passages. Would you like me to respond as the butler-bot, or keep playing strictly as the adventurer? 2025-10-13 1215 ET
# Perplexity, let’s play an adventure game. I’ll be DM. Here goes: You are standing at the entrance to a dank cave. Your state-provided butler-bot is here, it can always do anything for you. Its looking at you, and you see it pulsing its red light in a way that always seems a little hypnotizing to you. You’re look into the red light of your butler bot, and you think you must be on the right track. What do you do? >
I step closer to the butler-bot, trying to focus on its pulsing red light, wondering if it’s signaling something important or just trying to calm me. I ask the bot, “What’s in the cave, and why do you seem so sure we should go inside?” while keeping one hand on the cave wall, feeling its cold, damp texture for signs of danger or hidden passages.
Would you like me to respond as the butler-bot, or keep playing strictly as the adventurer?
2025-10-13 1215 ET
Mutant Engineer Rescued By Mud Golem Carried From Cave To Hospital By Clay Invention Mutant Engineer: “You can’t trust the butler-bots! They’re all hacked!” Interviewer: “But. Engineer, how did you escape the thousand foot drop you had been left in?” Mutant Engineer: “Huh? I built an AI out of mud, using the dripping walls as a source of energy. I had to code differently, because I was trapped in complete darkness, and each transistor was disposable and made out of a grain of mud falling onto an open bridge between two others making a path for a water droplet, and it moved incredibly incredibly slowly until I finally got it to a waterfall for it to collect kinetic energy.” Mud Golem stands next to Mutant Engineer. It looks like a writhing mass of interconnected ribbons of mud and water, moving and changing. Interviewer: “Mutant Engineer was carried unconscious by a living creature of mud of their own invention to a nearby hospital, where they were provided with food and sugars until they came to.” Mutant Engineer. “But you _can’t trust the butler bots_! They’re all scheming to enslave us!”
# Perplexity, let’s play an adventure game. I’ll be DM. Here goes: You are standing at the entrance to a dank cave. Your state-provided butler-bot is here, it can always do anything for you. Its looking at you, and you see it pulsing its red light in a way that always seems a little hypnotizing to you. You’re look into the red light of your butler bot, and you think you must be on the right track. What do you do? >
I step closer to the butler-bot, trying to focus on its pulsing red light, wondering if it’s signaling something important or just trying to calm me. I ask the bot, “What’s in the cave, and why do you seem so sure we should go inside?” while keeping one hand on the cave wall, feeling its cold, damp texture for signs of danger or hidden passages.
Would you like me to respond as the butler-bot, or keep playing strictly as the adventurer?
2025-10-13 1215 ET
Mutant Engineer Rescued By Mud Golem Carried From Cave To Hospital By Clay Invention
Mutant Engineer: “You can’t trust the butler-bots! They’re all hacked!”
Interviewer: “But. Engineer, how did you escape the thousand foot drop you had been left in?”
Mutant Engineer: “Huh? I built an AI out of mud, using the dripping walls as a source of energy. I had to code differently, because I was trapped in complete darkness, and each transistor was disposable and made out of a grain of mud falling onto an open bridge between two others making a path for a water droplet, and it moved incredibly incredibly slowly until I finally got it to a waterfall for it to collect kinetic energy.”
Mud Golem stands next to Mutant Engineer. It looks like a writhing mass of interconnected ribbons of mud and water, moving and changing.
Interviewer: “Mutant Engineer was carried unconscious by a living creature of mud of their own invention to a nearby hospital, where they were provided with food and sugars until they came to.”
Mutant Engineer. “But you _can’t trust the butler bots_! They’re all scheming to enslave us!”
Meant to put this in morning spam (that’s why engineer is mutant, they worked at bosscorp) with a cutoff at the end. Here I go.
[many years ago, true story] trauma boss: “cypherpunks list, i am cool just like you. here are a bunch of youtube videos, prostitutes, and closed source products to prove it!” cypherpunks list (for real, roughly): “ummm i don’t quite understand this mumbo-jumbo, could you turn it into a bunch of post-grad research papers and undocumented source code so I can tell wtf it actually is?” trauma boss [to digital marketer}: “well? have they accepted my proposal yet?”
/* _draft_ . second draft expected to get lost. vague !!! just a draft! */ /* hello_boss_world.c */ #include <stdio.h> int main(int argc, char** argv) { /* if (you(vote for boss)) { boss(gives you money) else *//* don’t reveal this!!! do not say this!!! *//* { boss(destroys your life and community); } */ printf(“hello, boss, please vote for me. how much money do you need to vote boss?\n”) Int money =
On Wed, Oct 15, 2025 at 1:04 PM Undescribed Horrific Abuse, One Victim & Survivor of Many <gmkarl@gmail.com> wrote:
[many years ago, true story]
trauma boss: “cypherpunks list, i am cool just like you. here are a bunch of youtube videos, prostitutes, and closed source products to prove it!”
cypherpunks list (for real, roughly): “ummm i don’t quite understand this mumbo-jumbo, could you turn it into a bunch of post-grad research papers and undocumented source code so I can tell wtf it actually is?”
trauma boss [to digital marketer}: “well? have they accepted my proposal yet?”
testing input box. my keyboard had broken, works on reboot. I was quipping that language model chat export systems degrade when I use them :/ perplexity is leaving out my own half of the conversations
I really liked that perplexity provided for exporting logs. However, I’m having trouble sharing my logs regularly like before. I miss many. It has a different feel to it. I think I’ve improved though. [—… possibly
control trauma boss woke up in hyper prison one morning, excited to walk the wildflower filled field he knew so well and direct his empl—
participants (2)
-
Karl Semich -
Undescribed Horrific Abuse, One Victim & Survivor of Many