From ITU-T Rec. X.680 (02/21): C.5.7 IA5String [is] mapped into UniversalString by mapping each character into the UniversalString character that has the identical (32-bit) value in the BER encoding of UniversalString as the (8-bit) value of the BER encoding of IA5String[.] 41.6 The characters which can appear in the UniversalString type are any of the characters allowed by ISO/IEC 10646 [aka Unicode]. 43.8 For IA5String, [the] entire character set …
Ordered merge of iterables in Python
Just found out about this cool feature in the Python standard library that allows you to merge two iterables based on a comparison: from heapq import merge as merge_heapwise some_numbers = (1, 5, 10, 15) other_numbers = (2, 4, 6, 8, 10, 12, 14, 16) merged_numbers = tuple(merge_heapwise(some_numbers, other_numbers)) # Using a tuple so comparisons work, for didactic demo reasons assert merged_numbers == (1, 2, 4, 5, 6, 8, …
[DRAFT] Transcript: Lance Owens MD, “Jung, Tolkien, and the Hermeneutics of Vision”, 2015
“Jung, Tolkien and the Hermeneutics of Vision” Dr. Lance S. Owens 23 October 2015 California Institute of Integral Studies The Philosophy, Cosmology and Consciousness Forum Transcribed from youtube.com/video/GxVaxOco7kg and adapted for the web [PUNCTUATION, GRAMMAR, AND QUALITY PASSES STILL WIP] by James Edington in 2023 Opening Remarks (A shout out to my introduction speaker tonight, Becca; the stuff she has done on Jung, The Red Book, and Tolkien is …
Getting SCALE-MAMBA working
a wandering pile of shell script fragments to get the most robust—and most technically bankrupt—secure multiparty computing library working
[DRAFT] "Direction" of time?
if entropy is inherently connected to causality, and causality is inherently connected to the "direction" of time, what's that imply? TODO: read Judea Pearl
Blanket anti-hacking laws
I am not a lawyer, much less a cyber lawyer, but I was recently wondering “are there any laws—especially federal ones—that cover just plain old Hacking per se?” Say someone breaks into your blog, maybe they look at your drafts, maybe they deface the front page… is that, in and of itself, a crime no matter where in the United States your attacker is? The answer is—Yes! 18 USC …
[DRAFT] "PROTON_USE_WINED3D" explained
Explaining why the Steam launch option “PROTON_USE_WINED3D=1 %command%
” sometimes fixes things, and whether YOU are cargo-culting or genuinely need it
Transcript: Vanessa Vokey Livestream Jan '22
Archiving because I saw some online trolls trying to take down the video with a brigade of false reports; content not endorsed.
This post covers some highly sensitive material that will not be palatable to normal readers of my blog. Unless you are exceedingly bored and have popcorn prepared, or have (or care to have) a horse in the great "radfems vs transgenders" twitter race, you will not gain anything by reading this document.
a small insight on cryptography
Abstractly speaking, a hash function and a symmetric cipher are "the same thing". But, concretely, there is a symmetry between Stream cipher: map a fixed-length random input to a variable-length random output Hash function: map a variable-length random input to a fixed-length random output
Basic "while" loop in Elixir
"that's not how you're supposed to use functional programming languages" — how 'bout I do anyway?