Quantum interconnect company Updated +Created
Type of processor Updated +Created
Wealth tax Updated +Created
Obviously coupled with measures to prevent capital flight. This would be a required step to achieve Ciro Santilli's dream of unconditional basic income.
Perhaps the election of Donald Trump in 2016 woke up the democrats at last, that they were just making empty promises without actually benefiting the poor? www.vox.com/2019/3/19/18240377/estate-tax-wealth-tax-70-percent-warren-sanders-aoc. Or is just another facade?
Bibliography:
18.783 MIT course Updated +Created
math.mit.edu/classes/18.783, Wow, good slides! Well organized site! This is a good professor! And brutal course. 25 lectures, and lecture one ends in BSD conjecture!
Baker-Campbell-Hausdorff formula Updated +Created
Solution for given and of:
where is the exponential map.
If we consider just real number, , but when X and Y are non-commutative, things are not so simple.
Furthermore, TODO confirm it is possible that a solution does not exist at all if and aren't sufficiently small.
This formula is likely the basis for the Lie group-Lie algebra correspondence. With it, we express the actual group operation in terms of the Lie algebra operations.
Notably, remember that a algebra over a field is just a vector space with one extra product operation defined.
Vector spaces are simple because all vector spaces of the same dimension on a given field are isomorphic, so besides the dimension, once we define a Lie bracket, we also define the corresponding Lie group.
Since a group is basically defined by what the group operation does to two arbitrary elements, once we have that defined via the Baker-Campbell-Hausdorff formula, we are basically done defining the group in terms of the algebra.
Computer data storage software Updated +Created
Computer hardware component type Updated +Created
Craig Steven Wright Updated +Created
This dude actually managed to convince a brain-dead British court that he was Satoshi and force a takedown of the Bitcoin whitepaper from bitcoin.org/bitcoin.pdf where it had been for many years prior: coinmarketcap.com/academy/article/bitcoin-org-ordered-to-take-down-bitcoin-whitepaper-because-of-copyright-infringement The page was updated to simply display the following Satoshi quote:
It takes advantage of the nature of information being easy to spread but hard to stifle. - Satoshi Nakamoto
Figure 1.
Craig Steven Wright
. Source.
The mere thought that Satoshi would attempt to copyright takedown the Bitcoin whitepaper, and not be able to back his identidy with any cryptographic keys, makes one shrivel to the bones.
Also, kids, this is why you put a fucking license on everything you release to the public, and especially when doing so anonymously!!! A quick CC BY-SA on that paper would have prevented all this bullshit.
The existence of this outrageous fraudster has had two good effects on the world however it must be said:
Timeline:
Interesting
Gwern Branwen Updated +Created
Author of gwern.net.
Ciro Santilli envies this guy a bit. He dumps his brain more or less full time on his highly customized static website partly due to early Bitcoin investments gwern.net/me says:
I am a freelance American writer & researcher. (To make ends meet, I have a Patreon, benefit from Bitcoin appreciation thanks to some old coins, and live frugally.)
Also unsurprisingly he likes Haskell:
I mostly contribute to projects in Haskell, my favorite language
Ciro Santilli considers Gwern Ciro Santilli's e-soulmates due to his interest in "dark web things" like Bitcoin and Silk Road, his immense writing output in encyclopedic book-sized articles on a static website, and his desire to live frugally and just research and write all day. Ah, if only Ciro had some old coins!!!
This is likely a pseudonym, his real name not being publicly unknown, e.g. at news.ycombinator.com/item?id=5659278:
Why do you choose relative anonymity?
For the reasons I've said in the past. To which I can add personal safety: my Silk Road page is a bit questionable legally, and we all know that there are ways to exploit knowledge of one's True Name and address (even if, as far as I know, I have no enemies willing to resort to, say, 'swatting' me) - one group of stalkers called up a college they thought I worked at to see if they could get me fired or otherwise ruin my day.
List of search engines Updated +Created
Oxford Wireless LAN Updated +Created
University of Oxford web service Updated +Created
Welinq Updated +Created
BB84 Updated +Created
Does not require entangled particles, unlike E91 which does.
en.wikipedia.org/w/index.php?title=Quantum_key_distribution&oldid=1079513227#BB84_protocol:_Charles_H._Bennett_and_Gilles_Brassard_(1984) explains it well. Basically:
  • Alice and Bob randomly select a measurement basis of either 90 degrees and 45 degrees for each photon
  • Alice measures each photon. There are two possible results to either measurement basis: parallel or perpendicular, representing values 0 or 1. TODO understand better: weren't the possible results supposed to be pass or non-pass? She writes down the results, and sends the (now collapsed) photons forward to Bob.
  • Bob measures the photons and writes down the results
  • Alice and Bob communicate to one another their randomly chosen measurement bases over the unencrypted classic channel.
    This channel must be authenticated to prevent man-in-the-middle. The only way to do this authentication that makes sense is to use a pre-shared key to create message authentication codes. Using public-key cryptography for a digital signature would be pointless, since the only advantage of QKD is to avoid using public-key cryptography in the first place.
  • they drop all photons for which they picked different basis. The measurements of those which were in the same basis are the key. Because they are in the same basis, their results must always be the same in an ideal system.
  • if there is an eavesdropper on the line, the results of measurements on the same basis can differ.
    Unfortunately, this can also happen due to imperfections in the system.
    Alice and Bob must decide what level of error is above the system's imperfections and implies that an attacker is listening.
Being naughty and creative are correlated Updated +Created
Ciro Santilli believes that there is a close link between the ability to create disruptive technology, and the desire to find bugs/exploits in systems.
Both of them destabilize society and enterprises.
Some examples:
  • Jobs and Wozniak's blue box
  • Robert Noyce's stealing a pig for a university party somewhat as a joke. This was actually a felony, but he got away with a compromise by paying the owner and being suspended for 6 months. The law is not blind, and thanks for that sometimes.
    Oh, and apparently he also got a university girlfriend pregnant, and she had an abortion.
  • Mark Zuckerberg's FaceMash
And yes, this sometimes leads into a fine line between legality and illegality:
Ciro Santilli's own naughty projects are listed at: Section "Ciro Santilli's naughty projects".
Webdev's Creed Updated +Created
This is my stack. There are many like it, but this one is mine.
My stack is my best friend. It is my life. I must master it as I must master my life.
Without me, my stack is useless. Without my stack, I am useless. I must fire my requests true. I must shoot straighter than my hackers who are trying to kill me. I must shoot him before he shoots me. I will ...
My stack is human, even as I am human, because it is my life. Thus, I will learn it as a brother. I will learn its weaknesses, its strength, its parts, its accessories, its ORMs and its asset bundlers. I will keep my stack clean and ready, even as I am clean and ready. We will become part of each other. We will ...
Before God, I swear this creed. My stack and I are the defenders of my website. We are the masters of our enemy. We are the saviors of my life.
So be it, until victory is mine and there is no enemy, but peace!
Explanation: this is an allusion to the Rifleman's Creed. This particular version talks about the website stack chosen for a website, i.e. the libraries used.
Ciro Santilli has always felt that choosing a stack is an almost religious choice. It is perhaps part of why the prayer style of the original Rifleman's Creed resonates with the web stack choice.
It is very hard to know how things are going go, the ups and downs, before putting big hours into it.
And once you start, it is hard, though not impossible, to move away.
The same allusion would make sense with any complex library choice, but it is particularly apparent in web development since there are so many different web stacks to choose from. A bit like rifles, they are all somewhat fungible, though of course not as much.
1914 Nobel Prize in Physics Updated +Created
Not only did this open the way for X-ray crystallography, it more fundamentally clarified the nature of X-rays as being electromagnetic radiation, and helped further establish the atomic theory.
1918 Nobel Prize in Physics Updated +Created
1921 Nobel Prize in Physics Updated +Created
1926 Nobel Prize in Physics Updated +Created

Unlisted articles are being shown, click here to show only listed articles.