time capsule for digital data
Pick an encryption method that we know is vulnerable to quantum computers.
Encrypt a drive with it, and fill it up with a bunch of stuff currently important to you.
Conveniently forget the decryption key, put the drive in storage.
Perhaps one day you’ll be able to open this time capsule.
Pe Lang has a temporary exhibition in Paris (in https://www.deniserene.fr/) until ~first week of July: https://bibliogram.art/p/Cdf2MDjseRm
Pe Lang makes artifacts that, for me, show some nonobvious or obvious-but-often-overlooked physical property. https://www.pelang.ch/works.html has some examples (but even not the ones I liked most when I saw his exhibition in, sadly defunct, museum of digital art in Zürich).
TechPost, HTML and ARIA.
@emily (last reply in a row, I promise) So right now, HTML document authors need to understand four sets of rules:
Much of the HTML standard’s web developer edition
The WAI-ARIA specification’s roles, and how they map to/from HTML elements.
The DPUB-ARIA roles (recommended but not required)
Browser default stylesheets (not a set of rules in theory, but these outline conventions that users have come to understand and should be respected).
That’s…a lot. The authors of each of these don’t read the other three, and I can’t blame them. This results in disagreements and contradictions between all four. <summary>
has a list-item default styling but has button semantics; <aside>
can be used anywhere but its accessible role can’t; doc-example
is meant to be used on role="figure"
with or without a caption, except role="figure"
forbids additional roles when it has a caption; etc.
Web developers violate all of these quite regularly. When non-standard behavior is normalized, implementations accomodate that non-standard behavior or ignore the broken part of the standard. Standards and “best practices” then change in response.
This creates a feedback loop, and there’s no source of truth. Nobody knows what to do.
This, I think, is what MDN’s focus should be. Taking all these separate sources of different truths and creating a unified set of instructions specifically for Web developers, filing + referencing bugs when disparities between the four sources are found. Tutorial-style documentation doesn’t have to be completely separate from reference-style documentation and software implementations; they should inform each other.
Thank you for coming to my TED talk.
caps, in da share z0ne voice
I'F YOU CAN'T HANDLE ME AT MY WOR'ST....
THAT'S OKAY!!;
-I CAN BE A LOT SOMETIMES
-ONE TIME I CRIED BECASUE A LIZERD WAS TO CUTE
-YOUR NOT MY THERRAPIST
-I HAVE OTHER SUPPORT SYSTEM'S
-WHAT IF WERE BOTH IN A BAD MOOD AND WE FIGHT OVER WHO FORGOT TO PUT AWAY THE BAG OF CHIPS
-WE CAN JUST PLAY MINECRAFT LATER ITLL BE A GOOD HANG
helo if you’ve been following us for a while you may already have the powderpaint EP and be waiting for the next one (new singles coming very soon!!), but if not, today, being bandcamp friday, where 100% proceeds go to the artist, is the day to do it
Lies we tell ourselves to keep using Golang
https://fasterthanli.me/articles/lies-we-tell-ourselves-to-keep-using-golang
pol, literature, not serious
I recently read a book about a community, one member of which discovers his fascist political leanings. He helps fascists get in power within the community, and initially is quite happy with the new order, although the careful reader can notice that the less able-bodied members of the community are starting to struggle. It all culminates when the fascists attempt to remove a nonconforming minority from the community -- the person who initially helped them get in power has a change of heart and joins the successful revolution.
Literature for 5yos really got *massively* better since I was a child.
I wonder if we can construct a family of (increasingly large) semigroups of second-preimage resistant one-way functions. More precisely, I would like to have an indexed family (let's denote the index by i) of semigroups of functions (where the semigroup operation is composition) such that:
- i-th semigroup has size >= i,
- the members of the i-th semigroup can be described by natural numbers from a range of size poly(i),
- there are algorithms polynomial in input size that:
a) read i, descriptions of two functions from the i-th semigroup and output the description of their composition,
b) read i, description of a function from i-th semigroup, an input, and evaluate the function,
- the functions in i-th semigroup are resistant to second preimage attacks with security parameter log(i) [^].
tl;dr I want families of efficiently composable hash functions.
[^] I could just as well request a family indexed by i and the security parameter separately (and have all the complexities be poly(input size + security parameter)). This is equivalent.
culture of oversexualization
.hg that's not the only instantiation of this abstract idea either! for another one, contrast typical mono people with…heck, even other mono creatures who are chill. the ones who can admire creatures outside their relationship because they don't harbor a culture of jealousy and mistrust. “whoa, they're cute” doesn't mean “I'm going to abandon you and all of the state and history of our relationship and go chase them”. it doesn't even mean “I want to date them”.
it just means they're cute.
@alexandra this furthers my theory that type theory is just gender for variables
Programmer and researcher,. Ended up working with all the current buzzwords: #ai #aisafety #ml #deeplearning #cryptocurrency
Other interests include #sewing, being #lesswrong, reading #hardsf, playing #boardgames and omitting stuff on lists.
Oh, and trans rights, duh.
Header image by @WhiteShield@livellosegreto.it .
Heheh, gentoo, heh, nonbinary, heheheh... I'm so easily amused sometimes.