Jump to content

Sensei

Senior Members
  • Joined

  • Last visited

Everything posted by Sensei

  1. You live in a parallel reality to what I'm used to, and in a different environment.. Here we had an early attack of winter with a week or two with -17 C in November. There were three homeless people living on a neighborhood dump. One night one of them died, two days later the other. They had lived there since at least 2019. Not a single day did they light a fire. This would have caused immediate problems with the police. This is not a village where this would go undetected, but one of the largest cities. Here in winter, when it's -5 C or less, drones fly over houses to check what people are burning in their stoves. If they detect that high quality coal is not being burned, but wood or plastic, garbage in general, they can get a huge fine. I checked how much that is: twice the minimum monthly net income and 30 days in jail. Such fine for homeless would be converted to 100 days + 30 days = 130 days in prison. In twenty years I haven't seen a single homeless person burning a fire here, regardless of temperature. Electricity? That would also be theft too, and even more problems with the police. These three homeless men got the only energy they had from the batteries in their radios. No cell phones, no powerbanks, no computers, no fire. For five years they had nothing of the sort. When they found the electronics in the garbage, they tried to give it to me or sell. I said the electronics were worth a lot of money and I couldn't take it. They were saying that it is useless for them without electricity. I was replying that they could sell it on the Internet, McDonald's has free WiFi. Obviously they never used smartphones nor Internet.. Generally people with problems, also mental problems, drinking denatured alcohol which damaged their brain, inexperienced and not knowing any tech.. It is not philosophy. It is biology. ...and that is exactly what I am talking about.. Overeating the finest dish causes vomits. Your brain is lying you at reverse direction that dish is no good anymore..
  2. A lot depends on oxygenation of the brain (CMRO2 - "Cerebral metabolic rate of oxygen").. https://www.google.com/search?q=relationship+of+oxygenation+of+the+brain+and+intelligence+study Also: "training makes master"..
  3. ..all good, except Aluminum compounds are generally white.. https://en.wikipedia.org/wiki/Sodium_aluminate He said: Check whether hydrogen was released by the flame.. Hydrogen gas does not smell, and is not chocking..
  4. Do you realize that this is just a lie? Your starved brain is lying to you.. It is irrelevant. Real homeless people don't have kitchens and the energy to cook dinners.. Isn't that what my above post was about? Are not 'judiciary" and "government" also people.. ?
  5. Here in prison people eat shit. Literally. Homeless people living on the street eat better stuff pulled out of the dumpster than people in prison here. After a few days one wants to commit suicide just because it is unbearable.. There is no need to kill people.. They want to die themselves.. Just because of crappy food, lack of entertainment, lack of physical and intellectual activity.. At least those with higher degrees.. The man drank beer on the street. A homeless man. He got a fine ($25). One, two, three, over a year, in summer, etc. When it reached 5 ($125), the next time the police found him on the street, took him to pretrial detention ("replacement penalty for unpaid fines"). For 5 days. $25 per day. They (the prison guards, called "reptiles"), let him take his food with him to the cell. He was "the boss" in the cell.. The best eating person.. Funny: they gave him $12.5 on his release from prison after 5 days (he had nothing during the reception).. He told me "after 5 days, two beers will be like one 500 mL vodka.." (i.e. "it will shoot to his head"). ps. They call them "reptiles" for a reason.. They torture people..
  6. I'm surprised that you are writing on such a controversial topic as "murdering people."
  7. Didn't I provide counter-examples to this 16 hours ago.. ? Fix to the previous source code example. It should be: But if the code is: public class Box extends Item { private static final Random random = new Random(); static { random.setSeed( 0 ); } private Item hidden_item; public Box() { super( "box" ); List<Item> items = new ArrayList(); items.add( new Key() ); items.add( new Cat() ); items.add( new DeadCat() ); hidden_item = items.get( random.nextInt( items.size() ) ); } public Item open() { return( hidden_item ); } } The order of hidden objects is not only known, but always the same, regardless of time.
  8. Suppose so we have a Java (e.g. Android mobile game) code with a base class Item and a set of items: public class Item { public String what; public Item( String what ) { this.what = what; } } public class Key extends Item { public Key() { super( "key" ); } } public class Cat extends Item { public Cat() { super( "cat" ); } } public class DeadCat extends Item { public DeadCat() { super( "deadcat" ); } } If the Box code is: public class Box extends Item { public Box() { super( "box" ); } public Item open() { List<Item> items = new ArrayList(); items.add( new Key() ); items.add( new Cat() ); items.add( new DeadCat() ); Random random = new Random(); random.setSeed( System.currentTimeMillis() ); return( items.get( random.nextInt( items.size() ) ) ); } } What the player gets is drawn at random when the box is opened. setSeed() is set to current date and time in milliseconds. The moment of opening the box by player causes "collapse". The game superadmin/admin could not check in advance what players will receive. It has the advantage of not taking up memory to store the hidden element. But if the code is: public class Box extends Item { private Item hidden_item; public Box() { super( "box" ); List<Item> items = new ArrayList(); items.add( new Key() ); items.add( new Cat() ); items.add( new DeadCat() ); Random random = new Random(); random.setSeed( System.currentTimeMillis() ); hidden_item = items.get( random.nextInt( items.size() ) ); } public Item open() { return( hidden_item ); } } The hidden contents of the box are fairly well known to the computer from the moment the box is created, but are not revealed until the player opens the box. The game superadmin/admin can check in advance what players will receive. But if the code is: public class Box extends Item { private static final Random = new Random(); private Item hidden_item; public Box() { super( "box" ); List<Item> items = new ArrayList(); items.add( new Key() ); items.add( new Cat() ); items.add( new DeadCat() ); hidden_item = items.get( random.nextInt( items.size() ) ); } public Item open() { return( hidden_item ); } } The order of hidden objects is not only known, but always the same, regardless of time. "superadmin" knows what the box contains only if its contents were generated when the box was created. The advantage of leaving it "empty" is less memory consumption. In the physical world, objects are made up of atoms that can be assigned unique identifiers (mass behavior, quantum number behavior, etc.), So what's in the box is defined from the BB. The rock on the moon may have been there for billions of years. Or maybe it was generated when the astronaut arrived on the Moon?
  9. I think it's worth noting that this is not about COVID-19 and flu, but about RNA viruses vs DNA viruses. https://www.google.com/search?q=rna+mutations+vs+dna+mutations+viruses "Rates of spontaneous mutation vary amply among viruses. RNA viruses mutate faster than DNA viruses, single-stranded viruses mutate faster than double-strand virus, and genome size appears to correlate negatively with mutation rate." "RNA viruses have high mutation rates—up to a million times higher than their hosts" https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6107253/ "Their inherently high mutation rates yield offspring that differ by 1–2 mutations each from their parent [9], producing a mutant cloud of descendants that complicates our conception of a genotype’s fitness. Their ability to rapidly change their genome underlies their ability to emerge in novel hosts, escape vaccine-induced immunity, and evolve to circumvent disease resistance engineered or bred into our crops [10, 11]. On the other hand, their mutation rates are an exploitable Achilles’ heel: researchers and clinicians can increase RNA virus mutation rates using nucleoside analogues, and a 3–5-fold increase in mutation rate causes lethal mutagenesis in human-infecting viruses like poliovirus and influenza [12, 13]. The exogenous mutagen causes enough additional mutations, which are often deleterious, so that the progeny RNA viruses are of lower fitness, eventually leading to ecological collapse of the population"
  10. Why did you choose this and not a molecule that has slightly different properties, i.e. heavy water D2O and semi-heavy water DHO? Different enough to be lethal to mammals. "The only known exception is the anhydrobiotic nematode Panagrolaimus superbus, which is able to survive and reproduce in 99.9% D2O. Mammals (for example, rats) given heavy water to drink die after a week, at a time when their body water approaches about 50% deuteration." https://en.wikipedia.org/wiki/Heavy_water Some isotopes are simply too rare. To be able to measure the differences for a complex system such as the human or animal body, one would have to be able to create it in milliliters or liters. IMHO, an interesting project for researchers..
  11. There are more than 3,200 isotopes of elements. Most of them are unstable or extremely unstable. Only a percentage of them are stable enough to form molecules. The same can be said of molecules. But in the vacuum in cosmic space, once they are created, there is nothing to react for a long time. Rare (extremely reactive) molecules on Earth, in cosmic space are "common".. https://www.google.com/search?q=the+most+common+molecules+interstellar Did you hear about polymers? https://en.wikipedia.org/wiki/Polymer "A polymer (/ˈpɒlɪmər/;[4][5]) is a substance or material consisting of very large molecules called macromolecules, composed of many repeating subunits.[6] Due to their broad spectrum of properties,[7] both synthetic and natural polymers play essential and ubiquitous roles in everyday life.[8]" By swapping one or more atoms for other elements, in different places, you get a different molecule, with slightly different physical or chemical properties. How many different macromolecules, polymers or biopolymers (RNA, DNA) can be created from a few simple elements? Should we consider them as independent molecules or not?
  12. If you type "iq test" in the search box of an Internet search engine, one of the first results is the "Mensa IQ Challenge". https://www.mensa.org/public/mensa-iq-challenge They offer a test with 35 questions to be solved in 25 minutes, which is average 42-43 seconds for each. If you don't know the correct answer, they suggest you guess it.. They claim that time is not measured. If we believe this, it means that only points count. So you can get from 0 to 35 correct answers. The score will range from 85 to 145 IQ points. Looking at my example above, you have 1) a limited number of questions you need to answer 2) limited time to do so (or unmeasured time) 3) the probability of guessing the correct answer without any intelligence. ps. People in express chess often lose due to lack of time to move..
  13. That example occurred to me after I had asked the question. So the particles collide and as a result new particles result. Do they accelerate away from the region where the "parent" particle was? Or do they travel like a photon ,either at zero velocity or at c? If the latter then they don't accelerate and the acceleration as in "particle accelerator " is a classical process. Calculations at CERN/LHC or any other particle accelerator, or near the speed of light, are done in CoM (Center-of-Mass/Center-of-Momentum) FoR (Frame-of-Reference). https://en.wikipedia.org/wiki/Center-of-momentum_frame https://en.wikipedia.org/wiki/Center_of_mass In this FoR, all kinetic energies of all particles participating in this collision, must exceed the masses-energies of the all newly formed particles after the collision. The remaining energy (if it exceeds the threshold *) is carried by the newly formed particles as their kinetic energy (including photons and neutrinos). Calculations made in CoM are translated into laboratory ("lab frame", "local") FoR, to learn to what velocity particles are required to accelerate at particle accelerator. https://en.wikipedia.org/wiki/Local_reference_frame *) in the case of Pion meson it is called "pion threshold creation" https://www.google.com/search?q=pion+threshold+creation If you look at my 2017+ posts, you should find that I have repeatedly attached the URL to an article where physicists showed how to calculate pion threshold creation and how to convert from CoM to lab frame.. Check this out https://galileo.phys.virginia.edu/classes/252/particle_creation.html Acceleration means change of velocity. Fly through vacuum ("near vacuum conditions") with no interactions is continuous without disruptions and at constant velocity, until some interaction happens. The more particles, the more interactions, thus slowing down and losing (kinetic) energy. In particle accelerators, physicists specifically place strong magnetic fields to find out what are charges of the newly created short-living particles. This forces charged particle flying in "circles", which directions and radius depends on applied magnetic field, particle kinetic energy/velocity/momentum, charge, etc.
  14. Aren't CERN and the LHC examples of accelerators that accelerate quantum particles to near the speed of light? New (usually short-lived) particles appear, and other particles are destroyed into smaller components, etc. etc.
  15. It is not here.. Although I answer questions about Python, I don't like it. And it's thousands of times slower than C/C++/C#/Java..
  16. @fiveworlds is right. Read about IEEE 754 resolution. https://en.wikipedia.org/wiki/IEEE_754 Table: https://en.wikipedia.org/wiki/IEEE_754#Basic_and_interchange_formats ps. In simple cases, it may help to change the order of operations in the equation. For example, adding/subtracting 1 to 10^-20 will result in truncated fractions..
  17. That's why people invented checksums, hash functions, digital signatures.. and a pretty simple project for a first-year student with just socket(), listen(), accept(), connect(), send(), recv(), close(), fopen(), fread(), possibly select() (for async), which has just raw data, will grow to a pretty complex.. just to detect malicious data in our stream.. In the worst-case scenario, if you send an (unused yet) offset to the secret key to the other party (to regain any encrypted communication after introduction of any malicious data in the stream), MITM could use DoS/DDoS to cause the secret key to be depleted on the machines.. 64 GB / 100 Mbps (12.5 MB/s) = ~ 5243 seconds..
  18. We have two phones or two computers. They open a connection from one to the other over a potentially hostile environment, the Internet. One uses socket send(), the other uses recv(), and then vice versa. One byte sent, one byte received, so the sender's counter is incremented accordingly. The same thing happens to the counter on the receiving machine. All good if there is no MITM which intercepts the connection and injects the bytes in the middle of the stream, resulting in machines being at different offsets in the secret key.. ..all is good as long as there is no MITM, then why encrypt and decrypt messages..? .. anyone can pretend to send a text message from any GSM number. The receiver sees the "correct phone number", but from MITM or whomever in the case of SMS/MMS. The message that will be decoded into the trash and offset to the secret key on the receiver of such a message will have a different value than on the 2nd machine.
  19. Once the zero-day is revealed to public, anyone can use it against devices with older vulnerable versions of the operating system or software. You can get root on any Windows 7 and 8 system (including Server and Enterprise versions) with default settings and on any Mint Linux system.. ..it just tells that their customers are idiots..
  20. If someone has an iOS older than 14.8, Pegasus can instantly remotely hack it, as long as they have Internet access: https://www.macrumors.com/2021/09/13/ios-14-8-zero-click-exploit-pegasus/ If someone has an iOS older than 16.6.1, Pegasus can instantly remotely hack it, as long as they have Internet access: https://medium.com/@letshackit/apples-ios-16-6-1-update-fixes-severe-zero-day-exploit-used-to-install-pegasus-spyware-dca4aafd25ef
  21. ..sending random data to the recipient would result in desynchronization. They would be in different bytes of the key.. The keyword here is "single-use", which is virtually impossible. Sooner or later you will end up sending the same key again. Plaintext with all zeros XOR key = key. Basic human communication in ASCII has few zeros (8th bit will be mostly 0), but binary data has many zeros, e.g. an ISO image can have an area with 32 KB of zeros, UTF-16 usually have 0 byte every two bytes, etc. etc. The key must be generated in some way. Discovering the key generation algorithm increases the chance of decoding the signal. Instead of brute force WiFi password hacking, you can check the device manufacturer and see how they created the password creation algorithm.. https://www.google.com/search?q=access+point+wifi+password+generation+algorithms or this: https://hackaday.com/2016/01/27/tp-links-wifi-defaults-to-worst-unique-passwords-ever/ "TP-LINK’s WiFi Defaults To Worst Unique Passwords Ever" Desynchronization forced by a third party or transmission errors will require resending the data.
  22. ..you are "borken" too, I am afraid..
  23. I don't believe that this system was installed to combat littering or minor misbehaviors..
  24. In the United States and UK, the names of criminals are published by the media.. and you can see the results - everyone knows the names of the serial killers (now even TV and Netflix series are created about them, what they did and how, with details), and they started to like it ("fame"), and copycats appeared, mimicking previous murders of serial killers based on detailed photos of police investigations that the media published.. Osama bin Laden was inspired by hijack of other airplane, Air France Flight 8969. Mass media and politicians worried to let this airplane flight to the France to Paris and hit some building. https://en.wikipedia.org/wiki/Air_France_Flight_8969 "We received this information directly from members of the Algerian secret service. And this information was very worrying. The terrorists' true aim was to crash the plane in Paris. — French Minister of the Interior Charles Pasqua[6]" Public shaming, by revealing detailed information about their bad deeds, works against some, but also inspires others. Welcome to China and its points system. People cannot travel on public transportation, buses, trains, planes, etc. because they have too low score. https://en.wikipedia.org/wiki/Social_Credit_System https://en.wikipedia.org/wiki/Social_Credit_System#No-fly_and_no-ride_lists ps. The neighborhoods surrounding the homes of millionaires and billionaires are usually pretty darn clean..

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.