• 0 Posts
  • 26 Comments
Joined 1 year ago
cake
Cake day: May 19th, 2024

help-circle
  • I think it’s fundamentally bad science to say:

    Sometimes, however, gamers become fixated, compulsive or — worse — spiral into a full-blown gaming disorder marked by isolation, distress, interpersonal conflicts and severe neglect of responsibilities.

    And actually talk about mostly kids.

    The abstract of the actual paper is very clear and much better:

    Key Points

    Question Is preexisting psychopathology associated with subsequent gaming disorder among adolescents, or is compulsive gaming associated with the development of psychopathology?

    Findings In this cohort study of 4289 adolescents, longitudinal models revealed that higher baseline levels of psychopathology were significantly associated with an increased risk of developing gaming disorder 1 year later. However, there was no significant association between gaming disorder and the development or worsening of psychopathology.





  • straight up not feasible

    It’s very feasible to create the law, collect the fine, and raise the price on energy sources or industrial process that require the cooling.

    It’s a formality, you could do it in an afternoon. Costs a bit of ink and a piece of paper.

    “But then it gets more expensive!” and “This might push corporations out of the city/country.” is the consequence the people / the government / the country have to have the balls to endure, if they want to stand by things like “having enough water” or “living on earth in the 22nd century”.

    If the free market is something you believe in, you should love this, because it makes water a more scarce resource and the market will be able to find another optimal solution to that new scarcity problem.





  • Hard to say.

    Sounds like the alternatives are to suck it up, leave the country for somewhere that isn’t the case yet, stop using the internet…

    There definitely is a line where requiring nonsense is more effort than it is worth. That line has already definitely been crossed by “news media”. The quality of articles and interviews is so abysmal, that any hear say you get over three rebounds over social media is still somehow equal to the original bad source.

    Social media is on the edge. I don’t expect to have a serious discussion on facebook or twitter, that’s why I don’t go there. If it’s easier to hang out in a bar near a library to hope someone worth talking to walks in or something like that. That will be the thing to do.

    And also, that line will probably just never be actually crossed for internet platforms like amazon or alibaba. Shipping and ordering things online is absurdly convenient compared to go to physical locations and them needing to have the thing stocked, etc…

    Most of (open source) software is already built in a way that could be taken offline completely. Internet is just a fast and easy delivery mechanism, but carrying USB sticks is extremely viable for getting code from A to B

    And for entertainment, I can honestly just go back to reading books. It’s not the total information super highway, but it would be something.



  • assuming the handler function is encrypted to match.

    Yeah, this is the thing I’m doubting / don’t understand how that would work.

    E.g. A* / navigation problems.

    You send private start and goal points.

    Either the stuff is truly private, then the program can’t read it.

    Or the program can read it, but then the owner of the machine the program runs on can just read it from memory.

    It doesn’t matter if it says “45124x5234234fgasdgf” or “Paris”, because the program state will identify that. Even if you encrypt the entire location database (with stuff that’s then fully known to the server) and it will still look up “45124x5234234fgasdgf” and the server can trivially decrypt that.

    check out apple’s homomorphic encryption page

    Interesting, but I’m more leaning on “they have a vested interest to lie about this” rather than “surely this is correctly working tech that keeps me safe”. Like Amazons “AI supermarket” that was just a bunch of indians doing video surveillance.

    And their explanation makes the same amount of sense as the blog post. I have no doubt that it can work for simple commutative math operations, over “smooth” domains. Where my doubt comes in is functions where the encryption would cause the operation to take place outside of the domain bounds.

    How does an encrypted asin or acos work?


    Anyway, thanks for the answer, I was recently impressed by GNU Taler, which also did something cryptographic stuff I didn’t think was possible. So I’m not saying this is heresy and can’t be done and trying to say it will work is forbidden, I just don’t think the explanations so far are detailed enough.


  • I don’t believe this will work? I would have to see an actually working example though. With actual data, not matrix vector multiplications those are trivial.

    Doing math on garbled numbers and then reverse garbling it? Easy. Doing text parsing on garbled text? Probably impossible, but I’d loveto be proven wrong. I also think you have to reveal what kind of functions you want used?

    The homomorphism in category theory is often shown by a commutative diagram, where you can go from a point to another by interchanging the order of operations. In the below diagram for FHE, you can go from (a, b) to E(a*b) in two separate ways.

    Even in math this doesn’t work for all problems.