pull down to refresh

21 sats \ 0 replies \ @itsrealfake 11h \ parent \ on: I couldn’t buy it, so I just made it bitcoin
hah. much more precise
good luck with the launch
so, I could open the keyring & display all the keys, the reinsert the keyring, leaving the plastic in place?
what "power" are you ascribing to them?
is it the power to affect change in constructive directions?
is it the power to affect destructive intent?
for sure the former is MUCH harder to achieve than the latter.
it seems like the latter is what we're getting...
Less cohesion in the teams building, lower quality software being built, lower diversity of thought among participants in the project.
destruction is a zillion times easier than creation
0 sats \ 1 reply \ @itsrealfake 22h \ parent \ on: Super's new idea for pruning the UTXO set bitcoin
do you still need to sync/ibd in order for BIP157/158 to be useful?
necessary adaptations to our environments
There's an argument to be made that it's possible to have adaptations which are non-biological, but I would suggest instead that these are responses to the environment and not adaptations because we haven't had long enough to actually adapt evolutionarily.
Made me rethink my approach to leaning to code. Maybe I am best not wasting my time and money on a Replit app.
It sounds like you're learning to "vibe code" instead of learning to "code". This could be an important distinction in your decision matrix.
Arguments around comparative advantage are fine, but remember the advantage of having a good time also.
I was super surprised at the contents of this.. watched the first 3 or 4 episodes yesterday.
I will do more research / validation, but certainly introduced me to some things I had never heard of before
"We show how a malicious learner can plant an undetectable backdoor into a classifier. On the surface, such a backdoored classifier behaves normally, but in reality, the learner maintains a mechanism for changing the classification of any input, with only a slight perturbation. Importantly, without the appropriate “backdoor key,” the mechanism is hidden and cannot be detected by any computationally-bounded observer."
hey @supertestnet did you see this?
it's a philosophical reference
you're right, I'm not terribly uptight. I have been convicted of taking things too seriously though
I imagine that talking or gesturing to the device will be the main way to perform input. who knows how gesture or speech will be picked up by the device ... is it worn like a watch or glasses?
Output from the device will be either projected onto our retina, or displayed on some transparent thing on or in the eyes... eg contact lenses or some kind of plastic in the lens of the eye.