Meritocracy Updated 2025-07-16
This idea also comes up in other sources of course.
Video 1.
Margin Call (2011) bridge scene
. Source.
Zermelo-Fraenkel set theory Updated 2025-10-14
One of the first formal proof systems. This is actually understandable!
This is Ciro Santilli-2020 definition of the foundation of mathematics (and the only one he had any patience to study at all).
TODO what are its limitations? Why were other systems created?
Let's break down a minimal runnable Linux x86-64 example:
hello_world.asm
section .data
    hello_world db "Hello world!", 10
    hello_world_len  equ $ - hello_world
section .text
    global _start
    _start:
        mov rax, 1
        mov rdi, 1
        mov rsi, hello_world
        mov rdx, hello_world_len
        syscall
        mov rax, 60
        mov rdi, 0
        syscall
Compiled with:
nasm -w+all -f elf64 -o 'hello_world.o' 'hello_world.asm'
ld -o 'hello_world.out' 'hello_world.o'
TODO: use a minimal linker script with -T to be more precise and minimal.
Versions:
We don't use a C program as that would complicate the analysis, that will be level 2 :-)
Spin like mad between:
Contained in bytes 0x40 to 0x7F.
If the number of sections is greater than or equal to SHN_LORESERVE (0xff00), e_shnum has the value SHN_UNDEF (0) and the actual number of section header table entries is contained in the sh_size field of the section header at index 0 (otherwise, the sh_size member of the initial entry contains 0).
There are also other magic sections detailed in Figure 4-7: Special Section Indexes.
Baker-Campbell-Hausdorff formula Updated 2025-07-16
Solution for given and of:
where is the exponential map.
If we consider just real number, , but when X and Y are non-commutative, things are not so simple.
Furthermore, TODO confirm it is possible that a solution does not exist at all if and aren't sufficiently small.
This formula is likely the basis for the Lie group-Lie algebra correspondence. With it, we express the actual group operation in terms of the Lie algebra operations.
Notably, remember that a algebra over a field is just a vector space with one extra product operation defined.
Since a group is basically defined by what the group operation does to two arbitrary elements, once we have that defined via the Baker-Campbell-Hausdorff formula, we are basically done defining the group in terms of the algebra.
Barn (unit) Updated 2025-07-16
Battle of Algiers (1966) Updated 2025-07-16
There's nothing like seeing the hypocrisy of the "Liberté, Égalité, Fraternité" people destroyed.
Interesting how Algeria now supports China's Xinjiang policy in 2019. But of course, dictatorships tend to work together
Ciro Santilli's father, an avid history reader, and in particular interested in the military dictatorship in Brazil through which he lived, once told Ciro how the French torture doctrine was directly adopted by Brazillian military, e.g. then even invited general Paul Aussaresses who had served in Algeria, to help them out with intelligence operations and give courses. Bro, fuck that.
Potassium Updated 2025-07-16
BB84 Updated 2025-07-16
Does not require entangled particles, unlike E91 which does.
en.wikipedia.org/w/index.php?title=Quantum_key_distribution&oldid=1079513227#BB84_protocol:_Charles_H._Bennett_and_Gilles_Brassard_(1984) explains it well. Basically:
  • Alice and Bob randomly select a measurement basis of either 90 degrees and 45 degrees for each photon
  • Alice measures each photon. There are two possible results to either measurement basis: parallel or perpendicular, representing values 0 or 1. TODO understand better: weren't the possible results supposed to be pass or non-pass? She writes down the results, and sends the (now collapsed) photons forward to Bob.
  • Bob measures the photons and writes down the results
  • Alice and Bob communicate to one another their randomly chosen measurement bases over the unencrypted classic channel.
    This channel must be authenticated to prevent man-in-the-middle. The only way to do this authentication that makes sense is to use a pre-shared key to create message authentication codes. Using public-key cryptography for a digital signature would be pointless, since the only advantage of QKD is to avoid using public-key cryptography in the first place.
  • they drop all photons for which they picked different basis. The measurements of those which were in the same basis are the key. Because they are in the same basis, their results must always be the same in an ideal system.
  • if there is an eavesdropper on the line, the results of measurements on the same basis can differ.
    Unfortunately, this can also happen due to imperfections in the system.
    Alice and Bob must decide what level of error is above the system's imperfections and implies that an attacker is listening.
Bell's theorem Updated 2025-07-16
Basically a precise statement of "quantum entanglement is spooky".
Biconvex spherical lens Updated 2025-07-16
Each side is a sphere section. They don't have to have the same radius, they are still simple to understand with different radiuses.
The two things you have to have in mind that this does are:

There are unlisted articles, also show them or only show them.