@vruba@everything.happens.horse cover
@vruba@everything.happens.horse avatar

vruba

@vruba@everything.happens.horse

You know him on the internet. Eucalypt-adjacent; very occasional writer. Consulting and passively looking for work in geospatial, image processing, and related fields.

This profile is from a federated server and may be incomplete. For a complete list of posts, browse on the original instance.

futurebird , to random
@futurebird@sauropods.win avatar

Sometimes an F5 tornado will grind the bark off of trees. The cyclone, nature's sandblaster, is full of metal scrap, glass, broken, tile and cement, it turns entire buildings to dust, scrapes the ground down to clay, strips asphalt, lifts & flings sidewalks. Everything pulverized into further grist to grind the earth.

To see a cyclone in the big midwest sky is to look on the angry face of God.

And I often think: Like a cosmic horror, perhaps they make Americans a little crazy.

vruba ,
@vruba@everything.happens.horse avatar

@futurebird To this I would only add: European agrarian life was already in a kind of crisis (intimately linked to colonization) – the Inclosure Acts, the Holznot, etc. This was not just a thing out of place but a broken thing out of place.

futurebird , to random
@futurebird@sauropods.win avatar

Is it possible to devise a kind of encryption that will grow easier to break based on the passage of time? A key that can be reliably produced with enough calculations could be a start, but you can’t account for faster computers. Maybe a system that has a host of parameters based on other computers and sensors? but inputs can be faked. I don’t know if this question really even makes sense: it seems to bush against something fundamental and impossible.

vruba ,
@vruba@everything.happens.horse avatar

@futurebird I think you have reasoned out the basic weakness here: there is nothing that is reliably all of (1) predictable to the sender, so they can set it up, (2) unpredictable to the receiver, so they can’t anticipate or interfere, and (3) not requiring some human-managed mechanism like a trusted vault opening. https://en.m.wikipedia.org/wiki/Trusted_timestamping is not the same but has some related ideas.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines