Show more

@zig @stman @theruran @emsenn@myasstodon.xyz

Anyway, take of instance "carbon budget" of countries, it can be exchanged for money. And they that "carbon budget" can be used to produce new products.

With the money, a low carbon footprint country can bargain to buy some products.

During this exchange the low carbon footprint might have lost value because conditions of the exchanges and the dubbed added value to the products.

@zig @stman @theruran @emsenn@myasstodon.xyz

It is far fetched, but to me their should be no money, hence probably no crypto-money.

A single-source of truth is helpful, but I am not convinced it is necessary, and is certainly not necessary in a fully cooperative system with no evil.

Thanks including me in the convo.

@mouloud (Preparing and structuring my answers, please give me a few minutes, will be back in a few minutes...)

@zig @theruran @emsenn

@mouloud

Had to type the begining of my answer on a pad due to post size ugly limitations on my mastodon instance. See the picture attached to this post.

@zig @theruran @emsenn

@mouloud

They have locked down our ability to change most of the architectures because they know that cyber-powers and cyber-rights models are exclusively the consequence of those architectures, and they want to impose us their own models, by forcing us to play with their architectures, protecting their models, and therefore, their political and failing economical system, in essence, capitalism. Doing so, they are preventing a crypto-anarcho-communist revolution.

@zig @theruran @emsenn

@stman @zig @theruran @emsenn@myasstodon.xyz I agree. I am waiting the follow up if any.

@mouloud

Here it is.

But in order to implement this at world scale, we obviously need alternative cyberspace architecture that offer the equivalent of blockchain functionnalities in its core, as a service, scalable to billions transactions per second.

And this cannot be clearly achieved with the current cyberspace architecture design and paradigm, not with current digital system architectural paradigm.

@zig @theruran @emsenn

@mouloud

In such paradigm, every citizen would have a kind of multi-wallet attached to him, beside standard wallet and bank accounts, to count those credit left for him on those hundreds of "criterias", and he would not have the possibility to "recharge" a specific line with monay. In order to buy a good or service, citizen would be obliged to have credit left on all fields, beside having the money to buy the good or service. This incentively would force citizen to @zig @theruran @emsenn

@mouloud choose carefully what they buy or consume.

Every month, those credit lines on all those criterias would be reset to the initial value.

This is just an example, but I hope you understand the logic and how it can help transitionning to a money less society in middle term.

@zig @theruran @emsenn

@mouloud

By the way, homomorphic cryptography would be very usefull to help create a cyberspace architecture allowing to easily handle for each citizen the multi-wallet holding those hundred "credit lines".

It's typically a functionnality that would require to be provided at cyberspace architecture level in order to be scalable. And this is not possible with the current cyberspace architecture paradigm.

Cybernetics of trust cannot be achieved with current cyberspace.

@zig @theruran @emsenn

@mouloud This kind of logic I presented you here is anarcho-communist compatible. It would lead to a money less and class less society, without fascism, just with incentive logic, but it can work only if it is incorruptible.

This is because such functionnalities, scalable, real time, can only be achieved with revolutionnary alternative cyberspace architectures, enabling such cybernetics of trust, that we advocate, as crypto-anarchist situationist, to change of

@zig @theruran @emsenn

@mouloud cyberspace architecture, and have all our digital system designed to be resilient over time, thanks to these new conception paradigm, that embrace agility and dynamism, necessary to maintain them operationnal over time, and keep them demilitarized over time too.

@zig @theruran @emsenn

@stman @zig @theruran

I agree with what you write.

Where does the code happen?

@mouloud

What is hard, and Theruran knows it, is how to ensure those fundamental blocks cannot be "hacked", and how to garantee they will really work as expected with no treachery possible. This is indeed what we are working on. Globaly, this is called cybernetics of trust, but it is also fulyl demilitarized as it is not hackable, there are no backdoors possible of any kind.

@zig @theruran

@stman @mouloud @zig Thanks for the discussion. I enjoyed reading so far!

Yes, and about code - that is the kind of knee-jerk reaction that people have nowadays and it prevents everyone else from understanding what they are doing. Documentation of every kind is key, unlike the prevailing software engineering practices that lack rigorous conceptual design development phase. Visual documentation is also of course important, and to maximize the utility it must also be an executable architecture model.

Well - if we can theorize another way of achieving an equivalent security model and utility to Bitcoin without the energy consumption, that would be incredible. As far as I know, there is no alternative yet conceived and the energy consumption keeps the system honest. And unfortunately, no one I have met in the fediverse thus far is qualified to theorize such an alternative. There are real engineering constraints and trade-offs that are glossed over in these kinds of discussion, and I doubt that billions of transactions per second is achievable due to laws of physics. It is my expectation that such a decentralized and trustworthy cybersystem will be slower in many ways but is nevertheless fast enough for us to get real work done and not just mindlessly consume Big Media.

P.S. come to hackers.town - we got 10,000-character toots!

@theruran can be achieved when integrating this natively inti the cyberspace architecture itself. Time will tell. I'm still thinking about this and working on it, exploring possible native implementations a lot. I tend to mix DHT concept with PoW in a native mesh cyberspace architecture to do it for the moment, but I am exploring other possibilities too. Will tell if I find something promizing. @mouloud @zig

@theruran things become fun.... And new possibilities for simpler algorithms, and with less energy consumption than classical PoW become possible, to enable many of the current blockchains functionnalities, at rate reaching billions of operations per second. But the technological digital paradigm is radicaly different, we're talking about fully synchronous time sensitive digital systems and cyberspace architectures. So you see, I'm confident. @mouloud @zig

@stman Time Sensitive Networks with timestamped everything sounds like great way to approach this problem :blob_gnikniht: @mouloud @zig

@theruran In such paradigm, simpler protocols, with fully distributed small mining capabilities in each node of a truly mesh cyberspace architecture, and within each microprocessor, can bring the time sensitive trust chain needed to replace the current blockchain implementation, with its energyvore mining. That's what I curently think.
@mouloud @zig

@stman @mouloud @zig a trustworthy distributed time server will be important when solar storm activity picks up and our GPS goes out for extended periods; and in scenarios when that GPS infrastructure rots due to lack of funding and the satellites fall out of the sky.

@theruran How shall I understand time-server here ?

We are in a truly serverless paradigm. I prefer you to talk about a fully distributed way to create a global synchronous clock. I know it is hard, so much we have been druged and brainwashed with the client-server paradigm elevated to the rank of religion by cyber-creationists, but wipe it from your head, at least when reasonning in those alternative cyberspaces architectures paradigms.

@mouloud @zig

@stman The closest thing to this that I know of is Google Spanner which uses GPS and atomic (hardware) clocks to ensure global synchronicity. Its FOSS equivalent is CockroachDB which only emulates this functionality through the system clock synchronized by NTP. @mouloud @zig

@mouloud @theruran @zig Mastering cyber-powers and cyber-rights models, in a garanteed way, enforcing them, through well designed architectures, allows us to choose and fine tune our models, to in the end reach a peacefull crypto-anarco-communist society, without destroying individual liberties, or human rights. I have always been talking about sustainable and efficient global ballance of powers and cyber-powers. Contrarily to crypto-libertarians.

@stman @theruran @zig

I agree that CPUs (about which I am clueless so far) might and certainly are geared toward some particular use, that do not always intersect the interests of the commons. And more generally, available tools are nurturing a particular social system of domination.

@stman @theruran @zig

What I want to write has two sides a) I believe there is a slow, smooth path toward libertarian socialism. Stronger claim, it is the only viable path. I believe a brutal change is not possible. Feeding the "revolution" meme as in the french revolution of 1789 is counter productive. If anything like that would happen, that is again the people sitting at the first row that will be taking advantage of it like bourgeoisie has taken advantage of french revolution.

@stman @theruran @zig

b) I agree there is a need to THINK about the new system but also the think about path toward that system. It is necessary to DOCUMENT and prove, if not necessary, at least that there is sufficient alternatives. And toward that goal, I am confident that one can not just reboot the system with a new operating system. That is, one need an upgrade path, and step by step hotfix, and swap existing cyber infrastructures with better ones.

@stman @theruran @zig

The upgrade path I am thinking about is similar to the one that happened with Linux: at the beginning is was toy, then it was sufficient, now it necessary.

@stman @theruran @zig

I might be wrong, but I consider code to be XXI literacy. We can live without code and go back to caves or something. But if we want to human science, say medicine, to progress with need computers and code.

In other words, yes you can try to convince people with free-form text, and think about new socioeconomical systems. But eventually, people will go back to their usual routine business as usual privative tools.

@stman @theruran @zig

I think one need to both document and code alternatives software that gives a cyber body to alternatives socioeconomic systems.

There was much work that has been done, but there is more that remains to be done.

@stman @theruran @zig

Toward that goal I have been working on alternative "operating system" that is supported by a DHT.

It will allow to not only copy but also improve the user experience of the www.

So far my work has been concerned about offering better alternatives to mastodon, mediawiki and to some extent google search engine.

I have not touched yet, other aspects like factories, production chains, logistic and many others...

@mouloud @stman @theruran @zig

what's with this meme of calling things operating systems when they're really application runtimes? if you aren't the interface to the metal, you aren't an OS.

i'm interested in making a p2p native microkernel operating system, but I don't have any illusions that the tracker runtime itself is an OS. its a set of portable libraries that run on top of an operating system.
@mouloud @stman @theruran @zig

a capability based operating system is good for extending the capability model from the runtime down through the userspace servers to the metal. conceptually integrating the entire stack's security design. you could go further and build some capability support into the metal, but I still don't see the point of wasting all of the existing silicon. we should probably work with what we have for now and build a global meshnet of Wii's.

@xj9 @zig @theruran @mouloud @xj9 How can't you see the point ? it is obvious : Too many integrated circuits backdoors (secret NSA ones, and official ones like Intel ME) and architectural backdoors (also called security breaches) published these last 3 years. Almost all current integrated circuits being closed source into black boxes.

@xj9 @zig @theruran @mouloud But this is not even the main issue. The main issue is that its hardware and microprocessors and integrated architectures are fixed, imposed, and this is greatly limiting what can be build with these legos and on top of them at software architecture level in a way you seem to have no idea. You are being forced to perceive code as solething exclusively running on a centralized turing machine.

@xj9 @zig @theruran @mouloud And this a much bigger limitation than what you seem to perceive. It is the biggest digital jail your mind is being trapped into, limiting your creativity for designing alternatives in a huiuuuuge way. You're been brainwashed by digital-creationists, also called US military "digital things" industrial complex.

@stman @zig @theruran @mouloud

try addressing the toxic waste issue my dude. that's the main issue. cyberarchitecture is useless if the planet is poison.

@xj9 @zig @theruran @mouloud But only alternate cyberarchitectures can stop programmed obsolescence in the digital industry and put a definitive end to wastes in this field.

What you propose is called maintaining the statut quo.

@stman

My understanding is you effort is several decade away, what about the factories that would produce those new computers? Do you size the production line? How? Create you own how?

@xj9 @zig @theruran

Β· Β· Web Β· 13 Β· 0 Β· 0

@mouloud It is not, indeed. I'm late on my prototyping just because I am under constant personnal physical and psychological attacks by several spying agencies or mafias not just because of my Antitrust case against the cartel of Amazon and Postal Operators in 8 countries, but also for my crypto-anarchist situationist studies and theorical and applied research that will change the statut quo. @xj9 @zig @theruran

@mouloud I guess you have all seen the movie "Die Hard 4". This time, on this specific one, I am almost certain the CIA and/or US Ministry of Defense wrote the scenario.

What do you think of the caractere gabriel in this fiction ?

Why did they painted him like this ?

And how did they painted the two hackers involved ?

Have you tried analyzing this ? It's consequences ?

Same kind of analysis are indeed

@xj9 @zig @theruran

@mouloud

interesting with Mr Robot (By the way, I have still not seen the last season, and I should, to better understand CIA moves in the ream of the cyber-hacktivist scene worldwide) (Okay some gonna say I am obscessed with CIA moves, the thing is that the french almost produce no interesting movies about hackers, so the DGSE/DGSI interferences/propagand through fictions & cinema is harder to decode) :

@xj9 @zig @theruran

@stman @xj9 @zig @theruran if there DGSE and DGSI use the same tool at the startup nation they are several years behind me.

@stman @xj9 @zig @theruran

Maybe I pretentious. But real thing is software used in startups is crap.

@mouloud

Why am I suddenly ralking about those movies related to hackers is that they are clearly tools, for all states & their respective secret services, to inject propagand and influence masses, and the worldwide hacktivist scene itself.

It unveils other aspects of the secret military cyber or technological agendas most powerfull nations have in mind.

Studying duch things is not only a game all

@xj9 @zig @theruran

@stman @xj9 @zig @theruran

I remind you that NONE of the recent catastrophic computer related events were predicate by movies, gamergate comes to mind.

What things that the CIA or whatever might be supporting is mass diffusion of hollywood production.

Ransomware no predicated.

This is a divide and conquer strategy to inspire FUD about the computers geeks and hackitivist.

Still I will watch the movie.

@mouloud

intelligence analysts in all nations must do, it is also of a great interest for crypto-anarchists internationalists and universalists like me. I'm even convinced our analysis are more honnest than those paid intelligence military analysts because we force ourselves, this is our hacker and crypto-anarchist ethics, not to take side for any flag. They are no flags in true crypto-anarchism.

@xj9 @zig @theruran

@stman @xj9 @zig @theruran

Case in point, I have an idea for a language where the code is content addressed and can take many syntax or use many natural language.

I agree collectively we can come up with better solution because we have a bigger picture.

Tho, we can not live only in the cyberspace. To run the anarchy simulation we need data from the real world, and the opendata resolution was not applied in most contries.

@stman @xj9 @zig @theruran

I learn more from quotes (even out of context) than from movies. Movies are a diversion, those are useful to keep people with low ethics comfortable, and other contained because FUD. So there as useful to have common grounds to discuss with people not aware of what happens for the real in the cyber space.

@mouloud Personnaly, I'd rather you saying in "this" cyberspace, not in "the" cyberspace. The difference between the two statements is the ability to understand that contrarily to those cyber-creationists I hate, whatever nation they roll for, there is not a cyberspace, but theoricaly an infinity of different cyberspaces architectures possible. Talking about "the" cyberspace is way to maintain the statut quo.

@xj9 @zig @theruran

@mouloud

Now, let me come to the point about what I wanted to express here :

My "Die Hard 4" analysis of charactere gabriel is the following : "We (The CIA & US Military) acknowledge the current digital technological statut quo we mostly imposed to the world created cyber-chaos that is out of hand, but as we are still in a position of cyber-domination hegemony, we don't give a fuck, and we even find that

@xj9 @zig @theruran

@mouloud @xj9 @zig @theruran it's an opportunity at several level to perform false flag cyber-terrorist attacks or create artificial cyber-conficts between other players that would serv our selfish geopolitical and cyber-geopolitical interests."

The story telling arround gabriel in this lovie is a shame. Really.

In other words, any person in his position in real life, proving that the cyber-security is completely fucked up, and

@mouloud that disasters will arise with cyber-chaos, including those cyber-terrorist issue, false flag or not, is being depicted by advance as a crypto-terrorist, even if he is not, because of this shamefull propagand through cinema, the CIA created a story telling that makes it easy for her to do some cyber-terrorist attacks i. his name, to silence or blackmail him.

It's an efficient way to preventively

@xj9 @zig @theruran

@stman

I will need to watch the movie. I do not think any gov has the computer power to harness the full data stream of the internet. Of course mastodon is a honeypot for those people. But what case can they build against us? For my part, that I try to build software to simulate a better world? That is not a terrorist attack that is independent research.

@xj9 @zig @theruran

@mouloud silence and threaten any crypto-anarchist like me, or folks like Snowden, allowing them to easily plot on any cyber-resistant with their fucking psychotronic weapons (Lind control), or those fucking frameworks revealed by Vault7 Wikileaks in order to make false attributions of cyber-attacks.

If CIA should really be ashamed for their very ugly move with "Die Hard 4" against the international

@xj9 @zig @theruran

@mouloud Keystroke mistake, I'm typing on a smartphone - Mind Control - I am without fixed internet because the DSLAM of my village has been hacked and is down. @xj9 @zig @theruran

@mouloud

crypto-anarchist community, I also want to clearly mention here that Russian, Chinese, and many other nations, including mine, France, also have intelligence services that know how to do exactly the same.

Still, for my country, we are definitely not in the same position of cyber-domination as the US, and if the french did some moves, it's more like "Lucy" moral.

@xj9 @zig @theruran

@mouloud

I'm saying all this because I want thing to be clear that folks like me see and analyze those intelligence moves. I could do it as a french cyber-soldier and intelligence analyst, but I decided to do it as a true crypto-anarchist internationalist and universalist, with the highest ethics possible, and the guy who encouraged me of doing so is Snowden. Definitely.

I work for the people, like him,

@xj9 @zig @theruran

@mouloud

all the people, worldwide.

It is the most honnest and ethical way I have found to contribute to his efforts, his sacrifices, and the risks he took, and it is the most respectfull way to say "Thank you".

So clearly, as a citizen of the world, with my universalist and internationalist honnest and ethical crypto-anarchist choice, NO, I am definitely NOT satisfied by the current statut quo, and my

@xj9 @zig @theruran

@mouloud
goal is clearly to intelligently, smartly, honnestly and with the same constant ethical and peacefull standards, to blow this fucking statut quo as soon as possible, and I am doing that "For the people, all the people, of all nations" and for peace.

I left my french flag on that one. Clearly, and honnestly.

And this is truly what I expect in return for all my crypto-anarchist peers.

Kind regards,

@xj9 @zig @theruran

Sign in to participate in the conversation
mstdn

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!