I can dream perfectly vividly, but cannot visualize anything when awake. I’m on the more extreme side — I can’t summon forth any imagery, which is unfortunate for me because I can’t even remember family, friends, or my spouse’s face beyond rote list of details.
Petition to have inner monologues replaced with Kenneth Branaugh
I have aphantasia, but a strong inner monologue
It's not a conspiracy, and it's well documented on how it can be done and measured: https://ncr.mae.ufl.edu/papers/auto15_2.pdf
No, no unusual circumstances, just relentless pursuit of perfection and mass accessibility. Should be wrapping up pretty shortly.
Already had one of those, they’re not bad
People flocking to a decentralized platform learn a hard lesson that lack of censorship means they’re going to hear things they dislike and there’s no groupthink committee they can whine to that can deplatform the “mean words sayer”.
I’m for a future of indistinguishable general AI, so worldcoin isn’t relevant to me
Favorite Star Wars movie?
A few more delays for the launch, but things are looking good – stay tuned.
IPFS hosts have blacklists and processes for handling reporting strict liability content
There’s a huge number of unsolved/undersolved problems, but you only really start to get a feel for them with experience — one example: zkSNARKs require a trusted setup. RedShift is a proposed answer, but to my knowledge, has no implementation
Zero knowledge proofs can be another niche to get into as well, though that typically narrows your scope to protocol work
yo Depends on what you want to focus on — there’s a number of opportunities, but if you want to stay aligned to pure cryptography, MPC related work is probably the right niche — in existing networks there are MPC wallets that use threshold cryptosystems, some new networks are using MPC more broadly than signing
https://github.com/farcasterxyz/hub-monorepo/pull/973 if you want the changeset on Hubble
cool cool, DC me!
Cryptographic implementations usually — compilers are fighting a different battle than typical needs for cryptography — optimizations designed by a compiler are typically adverse to security.
God, watching this monologue to nobody: “where the fuck did he pull all of those creamer cups from?”
Ah yeah, have done that.
I can’t believe how perfectly I heard this in his voice. RIP Macho Man, may you forever flying elbow drop into a pile of coke in heaven
Warrants clarification: do you mean two different versions of assembly code for different ISAs for the same algorithm?
Therapist: the sparkling brother doesn’t exist, it can’t hurt you The sparkling brother: