Bitcoin Forum
May 25, 2024, 06:22:28 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 [21] 22 23 24 25 26 27 »
401  Other / Off-topic / Re: Anonymity: Death of the Stateless Web on: November 20, 2014, 06:18:15 PM
CIYAM, yeah you can do really cool apps even within the walled garden of what is provided by web standards. For example, as you may know Blockchain.info was upgraded and now their wallet is fully encrypted client-side instead of server-side.

However there are always things developers would like to do which fit within a security sandbox model (e.g. Android OS‘ s sandbox) but which can‘t be done with the standard features provided by slow moving web standards. For example, tighter integration with other apps. On Android OS, I can write an Activity, Service, ContentProvider, or Intent which can interact with other apps in the system within the security model. I explained some the ramifications of this more deeply.

This transition to apps as a more general sandbox than the more limited web browser sandbox is epic and is underway in a massive paradigm shift. We could now leverage this to provide high latency network anonymity so we can do Tor correctly.
402  Other / Off-topic / Re: Anonymity: Death of the Stateless Web on: November 20, 2014, 05:54:32 PM
I do make the point in the OP that the web is already moving towards stateful because of the advantages applications can offer over a walled garden (meaning inflexibility or inability to change and extend some aspects of what is available by default) stateless or limited stateful HTML5 model. And my point is that provides an opportunity to do network anonymity correct with high latency, since Tor is ostensibly doomed by its low latency requirement as outlined in the OP.

Cookies are very limited form of state insufficient for the level of sophistication that apps are adding over the walled garden web browser.

The OP is talking about IP address anonymity, which is Tor’s raison d’être. So I don’t know why you are conflating this aspect of network anonymity with the nonencryption of public data which was never intended to be private. Sorry if I may be blunt (in spite of your reply constituting praise by faint damning), your understanding of the issues is too limited to fully comprehend. But hopefully this reply will help move you along towards the next level of understanding. One could say the OP post is responsible for readers not getting it, because it is written in a modular generative essence style where not every instance of ramification and implication is spelled out and readers have to take the modular variables presented and formulate all the ramification permutations. But really if I tried to explain it to people are not yet up-to-speed, it would need to be about 10 pages long. And I don't have time for that right now. But I guess that is what this dicussion thread is for.

P.S. No insult intended. Thanks for the feedback.

403  Other / Off-topic / Re: Anonymity: Death of the Stateless Web on: November 20, 2014, 04:51:25 PM
P.S. I see we have more n00bs voting No and understandably too timid to reveal their myopic or irrationally biased justification. Perfect. The record will be here for when they get to eat humble pie.

It's not only about cloud storage, it can also replace the web and all the other use cases of the internet today (mail, messaging, media streaming, etc). It's just a question of time really until this "new web" goes viral and the old web will become pretty obsolete, much like the BBSs of yore, simply because it will be much easier and secure to use (first and foremost, no passwords and single-point-of-failure web-servers anymore). Conceptually, encrypted P2P clouds will abstract content and services away from location. This also will enable many use cases we can't even think of yet today. It's the next logical and necessary step in the evolution of networked computing. It'll also scale much better, and bandwidth and computation can be economically incentivized just as well. http://www.youtube.com/watch?v=Wtb6L7Bg3zY

Slick marketing has caused you to think these systems will be able to do things which they can not possibly do based on fundamental technical issues in their designs.

I saw that video nearly a year ago. My point remains from my prior reply to you upthread that MaidSafe and Storj are based on minimizing the amount of duplicate hard disk space employed for redundancy and their economic unit is backed by hard disk space. Afaik, they have no mechanism to charge for bandwidth used[1], rather only a quid pro quo exchange of equivalent proof-of-storage (via their verify algorithm I presume), thus they are not applicable for serving files to the public-at-large. They simply are not designed for hosting web sites. That is not their target market. Their design and target market is personal storage for your (or your enterprise’s) files (possibly shared with a few other people, but not the public-at-large) which you are access perhaps up to several times per day, but not 1000s of times per second. And afaics, they don’t solve the anonymity of the requesters IP address for data that is public to the public-at-large.

You miss a fundamental economic point that bandwidth is orders-of-magnitude more costly than hard disk space at any scale above a few accesses per day on average, yet bandwidth is also amazingly inexpensive too (which means it is very hard to pay-per-packet as you need some form of sub-micro-payments system or to trade in kind bandwidth-for-bandwidth).

The solution for anonymity for the requester of public files and for anonymity of the server is to make the improvements to onion routing that I have laid out in the OP, to build out the Stateful Web, and for the servers to be hidden services.

For MaidSafe, I suppose clients could pay per access directly to nodes on the DHT, but the technical design for where the data is stored appears to be based on randomness combined with a ranking algorithm, that does not factor in incentives to compete for the greater orders-of-magnitude revenue from selling bandwidth or in the absence of payment-per-access as is the case in the current design, then the incentive to game the system to not store fragments that are accessed frequently. There is a very complex game theory analysis that needs to be made of the system. In short, I suspect MaidSafe’s model is too complex to fully model and characterize. They can’t be using a quid pro quo exchange of bandwidth because the reciprocal exchanges would not be fungible in real-time, i.e. the other party may not possess a data fragment that the counter party needs at that instant (due to the randomized requirement of the fragments that is the fundamental feature of the system, there is no way this could be made fungible). I suppose that since only the owner of the original data can determine the address of a fragment, then DDoS on a fragment will cause the fragment to get blocked.

The concept of storing a file on multiple servers so we don’t have to depend on just one, is orthogonal, has always been the case with corporate scale servers, and such algorithms can be adapted to different architectures such as multiple hidden services or sitting behind one hidden service.

MaidSafe’s self-encryption and splitting a file up into sand grain sized (in terms of DHT address space collision probability) fragments is useful because in theory it means even the server nodes have no way to know anything about—and thus can’t discriminate against—the content of the data it is serving. And in theory the user doesn’t have to evaluate the reputation of any server node as would be necessary for traditional server. In theory this feature could be very valuable for files shared to the public-at-large. But traffic analysis can be used to correlate these fragments for files that have high traffic public-at-large access.

But I think that valuable portion of the system design can be split from the portion that tries to manage how many copies are stored on the system. So I think instead a flat economic model can be employed to incentivize multiple nodes to store the fragments. And put the decision of this choice and algorithm strategy in the hands of the client. This would be much less complex (easier to prove formally), much more decentralized, and much simpler. Then each node could sit behind a hidden service for sufficient IP address level anonymity.

The technical specifics of MaidSafe’s design is very sketchy and vague at this point. I seriously doubt whether they can handle the complexity and deliver the reliability they claim. The MaidSafe MaidSafe system is a complex state machine (layered on top of a DHT) and I have not seen a formal analysis of all possible states including DDoS and the game theory of attacks on it. To debate this would go into more technical detail than I care to enter right now on this forum.

In terms of David Lavine’s analogy to an ant colony, note each ant has 250,000 brain cells of entropy to configure itself uniquely within the colony (not just the 4 categories Lavine wants to presume) and the collective state machine of the ant colony has the 10 million brain cells of a human brain.

Also listening to David ramble on, he is not person who can hit directly to the generative essence of an algorithm with precision. Rather he rambles on vague analogies. He appears to be smart (salesman with some technical acumen) but appearing tousled and lacking of the eloquent sharp precision of a highly accomplished engineer. For example, never did he address any bandwidth economics which should be one of the first things out of his mouth in a presentation.

Accomplished engineers can readily detect bullshit. I smell some but I think he believes in his work even if can’t quite pull it all together further than vague explanations. About a year ago I tried to read technical descriptions at their website and it was a maze of vagueness and technobabble without complete formalization and citations.

[1]G.Paul and J.Irvine, A Protocol For Storage Limitations and Upgrades in
Decentralised Networks.
http://strathprints.strath.ac.uk/49515/1/Paul_Irvine_SIN14_upgrades_in_decentralised_networks.pdf

Quote
which showed that only 1% of network users
were providing 73% of the network bandwidth needed to
Permission to make digital or hard copies of part or all of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. Copyrights for third-
party components of this work must be honored. For all other uses, contact
the Owner/Author.
Copyright is held by the owner/author(s).
SIN ’14
Sep 09 - 11 2014, Glasgow, Scotland UK
ACM 978-1-4503-3033-6/14/09.
http://dx.doi.org/10.1145/2659651.2659724.
share les. In an earlier study carried out on the Gnutella
peer-to-peer network, Adar et al. presented in [1] that 70%
of users were not sharing any les, and that 1% of all users
were actually providing responses to over half of network
requests.
Early peer-to-peer networks were more focused on con-
serving bandwidth, since they were typically designed for the
purpose of sharing popular les between users quickly, with-
out relying on a central server. The MaidSafe decentralised
network, while focused more on the provision of storage,
faces similar challenges, where malicious users could poten-
tially use up all of the storage capacity of the network.
404  Other / Politics & Society / Re: Obama's Net Neutrality Statement: What it Really Means on: November 20, 2014, 12:45:15 PM
^ it's the second thread I see where you posted this. Wasn't once enough? xD
Also calling every socialist retarded without knowing what socialism is, is probably not a good idea lol.

That's one thing which Americans do all the time which particularly irritates me, they clearly don't know what socialism is.

Europeans apparently don't have a clue since they will repeat their megadeath from the 1940s again in the next decade.

https://en.wikipedia.org/wiki/Socialism

Socialism in its generative essence is any system where the government is a very large percentage of the GDP, because implicitly it is in control of the economy and directing the redistribution of resources not for free market profit but for the "benefit of the society".

Europe precisely falls into this most generalized essence of socialism. As well you can factor in the Universal Health Care (not for profit but for social benefit), the strong political power of the debilitating unions, the government bailouts for example for Peugot, banks, etc..

Please stop wasting my time. I am busy programming for profit and don't have time for your ignorant bliss.
405  Other / Politics & Society / Re: Obama says FCC should reclassify internet as a utility on: November 20, 2014, 11:38:00 AM
You entirely missed the point that knowledge can only be owned by the creator of the knowledge. It can't be transferred nor financed. I explained that the prior link I provided. Now please stop repeating you same nonsense illogic about the tyranny of property ownership, because it is entirely inapplicable as I have shown.
406  Other / Politics & Society / Re: The Negative Consequences of Net Neutrality Explained in 2 Minutes on: November 20, 2014, 11:37:09 AM
You entirely missed the point that knowledge can only be owned by the creator of the knowledge. It can't be transferred nor financed. I explained that the prior link I provided. Now please stop repeating you same nonsense illogic about the tyranny of property ownership, because it is entirely inapplicable as I have shown.
407  Other / Politics & Society / Re: Why Do Americans Hate Android And Love Apple? on: November 20, 2014, 11:28:43 AM
Quote
Perhaps Americans love iPhone because they've become socialist pigs.

I'm told that the build quality is actually pretty good.

I have a new $240 (mid-range) Samsung. The hardware build quality is excellent, but the built-in software sucks (I have laundry list of usability design flaws piling up in my programming TODO list)! Koreans appear to not be very good at user interfaced software (noticed this on a Samsung feature phone in the past too). I am doing something about this now, programming feverishly and soon will have a new Android app out to replace this crappy bundled Contacts, Messager, and Dialer. I expect millions of downloads on Google Play.


Indeed I noticed this on the Google text-to-speech service that is bundled. But the awesome structural design of Android OS is anyone can offer a drop-in replacement ContentProvider, Service, Intent, or Activity.

Sorry Google has let the open source cat out of the bag and there is no way for them to put it back in the walled garden where the iPhone (and HTML5) is. There is no comparison. Android OS will stomp iOS into the dust. iOS is a dead-end and within 5 years it will be in single-digit market share (and your iPhone will be an expensive paperweight), which is a death spiral.

I am programming the OS so I know what I speak. You don't.

P.S. I think Google knows they can't reel it back into a walled garden and doesn't want to. They are just trying to gain enough leverage to force licensees to upgrade to the latest versions of the OS in order to prevent the fragmentation that had plagued Android versus iOS. And this seems to be working with Kitkat at 30% Android share and projected to surpass 50% within 6 months.

http://commonsware.com/blog/2014/04/09/storage-situation-removable-storage.html

Quote
Since Android 4.2, there has been a request from Google for device manufacturers to lock down removable media. Generally, this was ignored.

For Android 4.4, Google amended the Compatibility Test Suite (CTS) that device manufacturers must comply with in order to ship a device containing Google’s proprietary apps (e.g., Play Store, Maps, Gmail; otherwise known as “GMS”). Quoting Dave Smith:

Quote
However, new tests were added in CTS for 4.4 that validate whether or not secondary storage has the proper read-only permissions in non app-specific directories, presumably because of the new APIs to finally expose those paths to application developers. As soon as CTS includes these rules, OEMs have to support them to keep shipping devices with GMS (Google Play, etc.) on-board.
408  Other / Politics & Society / Re: Obama's Net Neutrality Statement: What it Really Means on: November 20, 2014, 10:55:12 AM
^ it's the second thread I see where you posted this. Wasn't once enough? xD

I guess it didn't register in the pea you call your brain that some lazyfart created a duplicate thread on the same issue, and I want my point to be seen by any one who reads only one of the two duplicate threads.

...without knowing what socialism is, is probably not a good idea lol.

You are too retarded to explain your position so I can rip your illogic to shreds. Are you sure you want to get into an abstract semantic debate with me given I am programmer who makes my living programming in higher level semantics?
409  Other / Politics & Society / Re: Why Do Americans Hate Android And Love Apple? on: November 20, 2014, 10:53:40 AM
Ostensibly iOS (iPhone) chose HTML5, but Android OS will be the victor over HTML5.
410  Other / Politics & Society / Re: Wait.... what's wrong with "Obamacare"? on: November 20, 2014, 10:22:59 AM
http://armstrongeconomics.com/2014/04/22/the-cadillac-tax-obama-will-all-your-benefits-as-part-of-obamacare/

http://armstrongeconomics.com/2014/06/05/obamacare-is-victory-for-insurance-companies/

http://armstrongeconomics.com/2014/11/12/obamacare-deliberately-written-with-33000-pages-of-regulations-to-hide-the-truth/
411  Other / Politics & Society / Re: The Negative Consequences of Net Neutrality Explained in 2 Minutes on: November 20, 2014, 10:19:27 AM
user18444, we no longer live in a resource scarcity paradigm (its only the peaking socialism, misallocation of resources with $227 trillion global debt that gives the illusion of resource scarcity) rather now in a knowledge paradigm. Wealth of knowledge is not uniformly distributed.
412  Other / Politics & Society / Re: Obama says FCC should reclassify internet as a utility on: November 20, 2014, 10:18:04 AM
user18444, we no longer live in a resource scarcity paradigm (its only the peaking socialism, misallocation of resources with $227 trillion global debt that gives the illusion of resource scarcity) rather now in a knowledge paradigm. Wealth of knowledge is not uniformly distributed.
413  Other / Politics & Society / Re: Is a Madmax outcome coming before 2020? Thus do we need anonymity? on: November 20, 2014, 07:02:22 AM
I need to make the last reply on our discussion, so I can also post it to that other thread as well.

Please don't delete your prior post as you need to be able to find this discussion in your recent posts list.

I request we continue to delete our upthread posts on each reply as I have done, at least for as long as this sub-thread is of reasonable length. Hopefully we can reach agreement now.

I kindly request you to delete your prior posts upthread on this sub-thread of discussion as I have done also. So as to not clutter the thread, our entire discussion is quoted in this one post below.

anonymity is a myth

someone somewhere always knows

Actually as an expert computer scientist, I assert that is not true. I have explained that a high-latency redesign of Tor would be anonymous:

Anonymity: Death of the Stateless Web (a.k.a. “Tor Is Not Anonymous—Web Paradigm Shift Underway”)

You would be correct if you instead wrote, “if someone could correlate all the data in the world for infinite time, they could always know”.

being a mathematician i know full well there are no secrets, if it is anonymous it would not be long before it is not.

it is the same as saying the code is unbreakable

as the recent news on tor proves as well http://betanews.com/2014/11/19/new-report-claims-81-of-tor-users-can-be-identified/

You did not read the link I provided to you. In that link I explain that the reason Tor is vulnerable is because it is a low latency design. That exploit you linked to is well known to be caused by traffic analysis (confirmation) because of the low latency design. I have proposed how to make an improved Tor that is high latency and truly anonymous.

Please write down some math that you are using to justify your claim, so I can discuss with you in your mathematical perspective where we differ. I have some math capability also.

done deleted posts

read your post did not say much about the encryption

tor is vulnerable because it is mathematically encrypted ergo it can be mathematically unencrypted

not much to go into really, anonymity is achieved via encryption, encryption can be broken, yes a lot of resources required but it can still be done.

so if someone really wanted to see what was going on all they need is the resources, usually government/military.



the current project I am excited about at the moment is where electrical signals from the brain are being translated

e.g. if i think food the receiver reads the electrical brain signals I have at the time and translates this into the word food

This would defeat anonymity completely unless you are wearing funny hats.

I've done extensive thinking about the breakage of the encryption and that is why I favor Lamport signatures, Mceliece public key cryptography, and not using public key (i.e. using symmetric cryptography) as much as possible.

There is no reasonable quantum computing resistant Diffie-Hellman key exchange, so I am thinking we can eliminate it from an improved Tor by sending a Nonce to the prospective relay encrypted with its public key, then the encrypted (in our public key) reply must include the Nonce. The entire reason Diffie-Helman is needed in Tor is because the prior relay hop could inject its only symmetric key instead.

All encryption will eventually be broken and I made this point in a long discussion (READ THIS LINKED POST!) on this forum with smooth about how all anonymity can eventually be broken ex post facto. But as I stated in my first reply to you, this requires the adversary save all the data. For example, a global national security PRISM adversary can’t save the data mixes we do offline.

This is why I am arguing to use only quantum resistant encryption for anonymity aspects and to use much larger key lengths than we think are necessary.

Note I will be cross-posting our excellent discussion to that thread I linked in my first reply to you.

Being able to read the brain’s thoughts could indeed make anonymity much more challenging, but we are at least a decade from that being something the authorities can realistically deploy and even then it will probably require they get proximity to your brain. Our physical bodies are going to become a burden. Hopefully by that time we can upload our brain to a computer, put our body into zombie state, continue thinking there on the computer, then download it back to biological brain copy later. In that way, we could side-step the authorities anew. You see technology is not asymmetric in support of socialism. We just have to be willing to find the solutions for liberty.

I hope I have inspired some libertarian readers!

Outstanding I agree completely, anonymity can be achieved as outlined above and should be, but not at the expense of user acceptance that it is a fail safe and completely anonymous to all giving a false sense of security.

This has been an excellent enlightening discussion on the road to complete anonymity thank you

You reminded we need to inform the user as to limitations of anonymity.

Tangentially I note this thread is about to attain 40,000 Views.

414  Other / Politics & Society / Re: Is a Madmax outcome coming before 2020? Thus do we need anonymity? on: November 20, 2014, 06:31:47 AM
I request we continue to delete our upthread posts on each reply as I have done, at least for as long as this sub-thread is of reasonable length. Hopefully we can reach agreement now.

I kindly request you to delete your prior posts upthread on this sub-thread of discussion as I have done also. So as to not clutter the thread, our entire discussion is quoted in this one post below.

anonymity is a myth

someone somewhere always knows

Actually as an expert computer scientist, I assert that is not true. I have explained that a high-latency redesign of Tor would be anonymous:

Anonymity: Death of the Stateless Web (a.k.a. “Tor Is Not Anonymous—Web Paradigm Shift Underway”)

You would be correct if you instead wrote, “if someone could correlate all the data in the world for infinite time, they could always know”.

being a mathematician i know full well there are no secrets, if it is anonymous it would not be long before it is not.

it is the same as saying the code is unbreakable

as the recent news on tor proves as well http://betanews.com/2014/11/19/new-report-claims-81-of-tor-users-can-be-identified/

You did not read the link I provided to you. In that link I explain that the reason Tor is vulnerable is because it is a low latency design. That exploit you linked to is well known to be caused by traffic analysis (confirmation) because of the low latency design. I have proposed how to make an improved Tor that is high latency and truly anonymous.

Please write down some math that you are using to justify your claim, so I can discuss with you in your mathematical perspective where we differ. I have some math capability also.

done deleted posts

read your post did not say much about the encryption

tor is vulnerable because it is mathematically encrypted ergo it can be mathematically unencrypted

not much to go into really, anonymity is achieved via encryption, encryption can be broken, yes a lot of resources required but it can still be done.

so if someone really wanted to see what was going on all they need is the resources, usually government/military.



the current project I am excited about at the moment is where electrical signals from the brain are being translated

e.g. if i think food the receiver reads the electrical brain signals I have at the time and translates this into the word food

This would defeat anonymity completely unless you are wearing funny hats.

I've done extensive thinking about the breakage of the encryption and that is why I favor Lamport signatures, Mceliece public key cryptography, and not using public key (i.e. using symmetric cryptography) as much as possible.

There is no reasonably trusted quantum computing resistant Diffie-Hellman key exchange, so I am thinking we can eliminate it from an improved Tor by sending a Nonce to the prospective relay encrypted with its public key, then the encrypted (in our public key) reply must include the Nonce. The entire reason Diffie-Helman is needed in Tor is because the prior relay hop could inject its only symmetric key instead.

All encryption will eventually be broken and I made this point in a long discussion (READ THIS LINKED POST!) on this forum with smooth about how all anonymity can eventually be broken ex post facto. But as I stated in my first reply to you, this requires the adversary save all the data. For example, a global national security PRISM adversary can’t save the data mixes we do offline.

This is why I am arguing to use only quantum resistant encryption for anonymity aspects and to use much larger key lengths than we think are necessary.

Note I will be cross-posting our excellent discussion to that thread I linked in my first reply to you.

Being able to read the brain’s thoughts could indeed make anonymity much more challenging, but we are at least a decade from that being something the authorities can realistically deploy and even then it will probably require they get proximity to your brain. Our physical bodies are going to become a burden. Hopefully by that time we can upload our brain to a computer, put our body into zombie state, continue thinking there on the computer, then download it back to biological brain copy later. In that way, we could side-step the authorities anew. You see technology is not asymmetric in support of socialism. We just have to be willing to find the solutions for liberty.

I hope I have inspired some libertarian readers!
415  Other / Off-topic / Re: Anonymity: Death of the Stateless Web on: November 20, 2014, 05:49:17 AM
Some significant incoherence in the OP has been corrected. Please try re-reading it.
416  Other / Politics & Society / Re: Obama's Net Neutrality Statement: What it Really Means on: November 20, 2014, 04:54:06 AM
Cross-posting from other thread...

I trust my government a million times more than I trust my ISP. That is the bottom line for me.  

The point you are missing is that in a free market, you don’t need to trust your ISP as competition will provide you with options.

What you don’t believe or fail to understand is that regulatory capture of your government is precisely what stifles competition. This is what the quote from Eric S. Raymond about “asymmetric power” means.

So yes the monopolistic telcos are on their knees praying that you will trust the government more than the free market, because the more power you give to the government to regulate, the stronger their monopolies will become.

This has been proven over and over to always be the outcome in all of recorded human history. The mathematical reason was explained by Mancur Olson’s book, The Logic of Collective Action.

I don’t expect you to be able to wrap your mind around this, because the reason socialists are socialists is because they don’t have the IQ to reason rationally at this high level.

And evolution is at work (over and over throughout recorded human history since Mesopotamia) to cull the population of the low IQ fools (via the war, eugenics, genocide, rationing, and totalitarian megadeath that results from peaking socialism when it runs out of other people's resources to steal, ahem redistribute) so the human race can get smarter and advance knowledge. So sorry for you, you haven’t been able to grasp how to survive.
417  Other / Politics & Society / Re: The Negative Consequences of Net Neutrality Explained in 2 Minutes on: November 20, 2014, 04:51:40 AM
Cross-posting from other thread...

I trust my government a million times more than I trust my ISP. That is the bottom line for me.  

The point you are missing is that in a free market, you don’t need to trust your ISP as competition will provide you with options.

What you don’t believe or fail to understand is that regulatory capture of your government is precisely what stifles competition. This is what the quote from Eric S. Raymond about “asymmetric power” means.

So yes the monopolistic telcos are on their knees praying that you will trust the government more than the free market, because the more power you give to the government to regulate, the stronger their monopolies will become.

This has been proven over and over to always be the outcome in all of recorded human history. The mathematical reason was explained by Mancur Olson’s book, The Logic of Collective Action.

I don’t expect you to be able to wrap your mind around this, because the reason socialists are socialists is because they don’t have the IQ to reason rationally at this high level.

And evolution is at work (over and over throughout recorded human history since Mesopotamia) to cull the population of the low IQ fools (via the war, eugenics, genocide, rationing, and totalitarian megadeath that results from peaking socialism when it runs out of other people's resources to steal, ahem redistribute) so the human race can get smarter and advance knowledge. So sorry for you, you haven’t been able to grasp how to survive.
418  Other / Politics & Society / Re: Is a Madmax outcome coming before 2020? Thus do we need anonymity? on: November 20, 2014, 04:50:27 AM
Cross-posting from other thread...

I trust my government a million times more than I trust my ISP. That is the bottom line for me.  

The point you are missing is that in a free market, you don’t need to trust your ISP as competition will provide you with options.

What you don’t believe or fail to understand is that regulatory capture of your government is precisely what stifles competition. This is what the quote from Eric S. Raymond about “asymmetric power” means.

So yes the monopolistic telcos are on their knees praying that you will trust the government more than the free market, because the more power you give to the government to regulate, the stronger their monopolies will become.

This has been proven over and over to always be the outcome in all of recorded human history. The mathematical reason was explained by Mancur Olson’s book, The Logic of Collective Action.

I don’t expect you to be able to wrap your mind around this, because the reason socialists are socialists is because they don’t have the IQ to reason rationally at this high level.

And evolution is at work (over and over throughout recorded human history since Mesopotamia) to cull the population of the low IQ fools (via the war, eugenics, genocide, rationing, and totalitarian megadeath that results from peaking socialism when it runs out of other people's resources to steal, ahem redistribute) so the human race can get smarter and advance knowledge. So sorry for you, you haven’t been able to grasp how to survive.
419  Other / Politics & Society / Re: The Negative Consequences of Net Neutrality Explained in 2 Minutes on: November 20, 2014, 04:39:37 AM
Yup, username18444 is Communist pig and following him will result in abject failure.

As well,

Quote from: Dr. Richard Stallman, Why Open Source misses the point of Free Software link=https://www.gnu.org/philosophy/open-source-misses-the-point.html
When we call software “free,” we mean that it respects the users' essential freedoms: the freedom to run it, to study and change it, and to redistribute copies with or without changes. This is a matter of freedom, not price, so think of “free speech,” not “free beer.”

These freedoms are vitally important. They are essential, not just for the individual users' sake, but for society as a whole because they promote social solidarity—that is, sharing and cooperation. They become even more important as our culture and life activities are increasingly digitized. In a world of digital sounds, images, and words, free software becomes increasingly essential for freedom in general.

Tens of millions of people around the world now use free software; the public schools of some regions of India and Spain now teach all students to use the free GNU/Linux operating system. Most of these users, however, have never heard of the ethical reasons for which we developed this system and built the free software community, because nowadays this system and community are more often spoken of as “open source”, attributing them to a different philosophy in which these freedoms are hardly mentioned.

. . .

Eric S Raymond worked hard to move to the term “open source” instead of Richard Stallman’s “free software”, because the latter is communism which is an abject failure.

The key difference between that Stallman and the FSF advocate the oxymoronic use of coercion (force) to maintain freedom (specifically the FSF GPL standard license forces some actions and limits other actions), thus it exhibits the loss of liberty that is the hallmark of Communism.

You can listen to Eric S. Raymond on this topic at the following video of a Java Users Group presentation where “viral contamination” means coercion in the GPL license:

http://jobtipsforgeeks.com/2012/05/17/lessons-from-a-jug-talk-with-eric-esr-raymond/

Quote from: Eric S. Raymond
...Nobody can take those freedoms away from us anymore; we have the internet. We have the way to migrate our software development out of the reach of any particular jurisdiction that goes idiotic. We have the code; they can’t take the code away from us...

Jump to the 9:15 min point in the video.
420  Other / Politics & Society / Re: Obama says FCC should reclassify internet as a utility on: November 20, 2014, 04:12:14 AM
I trust my government a million times more than I trust my ISP. That is the bottom line for me.  

The point you are missing is that in a free market, you don’t need to trust your ISP as competition will provide you with options.

What you don’t believe or fail to understand is that regulatory capture of your government is precisely what stifles competition. This is what the quote from Eric S. Raymond about “asymmetric power” means.

So yes the monopolistic telcos are on their knees praying that you will trust the government more than the free market, because the more power you give to the government to regulate, the stronger their monopolies will become.

This has been proven over and over to always be the outcome in all of recorded human history. The mathematical reason was explained by Mancur Olson’s book, The Logic of Collective Action.

I don’t expect you to be able to wrap your mind around this, because the reason socialists are socialists is because they don’t have the IQ to reason rationally at this high level.

And evolution is at work (over and over throughout recorded human history since Mesopotamia) to cull the population of the low IQ fools (via the war, eugenics, genocide, rationing, and totalitarian megadeath that results from peaking socialism when it runs out of other people's resources to steal, ahem redistribute) so the human race can get smarter and advance knowledge. So sorry for you, you haven’t been able to grasp how to survive.




As well,

Quote from: Dr. Richard Stallman, Why Open Source misses the point of Free Software link=https://www.gnu.org/philosophy/open-source-misses-the-point.html
When we call software “free,” we mean that it respects the users' essential freedoms: the freedom to run it, to study and change it, and to redistribute copies with or without changes. This is a matter of freedom, not price, so think of “free speech,” not “free beer.”

These freedoms are vitally important. They are essential, not just for the individual users' sake, but for society as a whole because they promote social solidarity—that is, sharing and cooperation. They become even more important as our culture and life activities are increasingly digitized. In a world of digital sounds, images, and words, free software becomes increasingly essential for freedom in general.

Tens of millions of people around the world now use free software; the public schools of some regions of India and Spain now teach all students to use the free GNU/Linux operating system. Most of these users, however, have never heard of the ethical reasons for which we developed this system and built the free software community, because nowadays this system and community are more often spoken of as “open source”, attributing them to a different philosophy in which these freedoms are hardly mentioned.

. . .

Eric S Raymond worked hard to move to the term “open source” instead of Richard Stallman’s “free software”, because the latter is communism which is an abject failure.

The key difference between that Stallman and the FSF advocate the oxymoronic use of coercion (force) to maintain freedom (specifically the FSF GPL standard license forces some actions and limits other actions), thus it exhibits the loss of liberty that is the hallmark of Communism.

You can listen to Eric S. Raymond on this topic at the following video of a Java Users Group presentation where “viral contamination” means coercion in the GPL license:

http://jobtipsforgeeks.com/2012/05/17/lessons-from-a-jug-talk-with-eric-esr-raymond/

Quote from: Eric S. Raymond
...Nobody can take those freedoms away from us anymore; we have the internet. We have the way to migrate our software development out of the reach of any particular jurisdiction that goes idiotic. We have the code; they can’t take the code away from us...

Jump to the 9:15 min point in the video.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 [21] 22 23 24 25 26 27 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!