If this is only temporary, I take back everything.
The human brain carries out many tasks at the same time, but how many? Now fMRI data has revealed just how parallel gray matter is...
...The results make for interesting reading. Although the analysis is complex, the outcome is simple to state. Georgiou says that independent component analysis reveals that about 50 independent processes are at work in human brains performing the complex visuo-motor tasks of indicating the presence of green and red boxes. However, the brain uses fewer processes when carrying out simple tasks, like visual recognition.
That’s a fascinating result that has important implications for the way computer scientists should design chips intended to mimic human performance. It implies that parallelism in the brain does not occur on the level of individual neurons but on a much higher structural and functional level, and that there are about 50 of these.
“This means that, in theory, an artificial equivalent of a brain-like cognitive structure may not require a massively parallel architecture at the level of single neurons, but rather a properly designed set of limited processes that run in parallel on a much lower scale,” he concludes..."
Full paper link:
“Estimating the intrinsic dimension in fMRI space via dataset fractal analysis – Counting the `cpu cores’ of the human brain” (arXiv:1410.7100v1 [cs.AI])"
Link to Original Source
i cant see how steganography can anonymize a connection and hide a transaction when the end point is public knowledge.
Get a treaty to pass that forces ISPs to block traffic they cannot decrypt
So then we just move to steganography.
One thing journald doesn't do that I wish it would is to allow me to set something a logfile= parameter or something like that in the service file that would do a "tail -F | logger" on that file and feed it into the journal
I have to do that manually right now for daemons that refuse to log either to syslog or to the console.
As someone who tries to stay involved with bleeding edge of Bitcoin/Freenet/I2P/associated tech, I run a lot of "weird" daemons that don't conform to standard Unix conventions, don't have support, and may even be a single GitHub repository that has been abandoned.
Needless to say, things like like syslog support aren't always available, but I frequently can get the daemons to log to stdout.
I hate having to search through random log files scattered throughout the filesystem, so the ability of journald to automatically pull all that output into a single log stream is extraordinarily useful to me
I know nobody will probably see this comment as this is article is a submission and not "real", but I have to run and don't have time to wait and see if this makes the front page or not.
I'm not going to say where (for obvious reaons), but yes
Hang out on on r/JobsForBitcoin.
Plenty of opportunities there.
They can do this at any time, for any reason, regardless of Bitcoin or not, no matter what is or is not true and regardless of what you can or can not prove.
There is no way to stop psychopathic predators from preying - it's what they do.
On the other hand we can use technology to protect ourselves. You can't deny that Bitcoin and associated technologies make their job of identifying and attacking targets more difficult by orders of magnituide.
Perhaps difficult enough that predation is no longer profitable.
I am fascinated by Tim May's crypto-anarchy. Unlike the communities traditionally associated with the word "anarchy", in a crypto-anarchy the government is not temporarily destroyed but permanently forbidden and permanently unnecessary. It's a community where the threat of violence is impotent because violence is impossible, and violence is impossible because its participants cannot be linked to their true names or physical locations.
Maybe it won't work, but it's the best chance we have to create a genuinely peaceful world.
You do understand that a simple dead mans switch into a multisig account or an nTimelock will make it easy for me to prove to the people torturing me that I know longer have access to the funds and that they cannot be taken or seized right?
Come on, don't ruin the surprise!
Let them dig themselves in deeper with their empty threats before revealing that financial cryptographers are already two steps ahead of them.
It's more fun that way.
All they need to do is pass the law
Sure, they can pass a law.
I heard that a legislature in Illinois passed a law once that declared the value of pi to be 3.
What does any of this have to do with elliptic curve cryptography?
I'm paid a CHF-denominated value every month, converted to bitcoins.
FDIC insured bank accounts is where I'm staying.
Obvious shill is obvious.
Hackers of the world, unite!