The Marginalia Search Engine, I guess
I often do experiments involving randomness, art, math, NLP, cryptography and programming.
In my most recent experiment as from yesterday, I created a novel ciphering method. I mean, I guess it's totally different from known ciphering methods (such as Vigenere, Caesar, Playfair, ROT13 and so on) because I couldn't find anything similar.
Some examples follow:
- "phyphox" is
((1,8,8), (6,6,5), (5,4), ø, ø, (1,2), (0,0), ø, (2,1), ø)
(in the way I'm using it for now, the cipher will always result in 10 tuples containing a variable amount of tuples, with ø indicating an empty tuple; there are lots of output formatting alternatives: here I’m using an one-liner mathematical representation in order to be compact). - "asklemmy" is
((0,1,5), (1,9,1,1,2,3,3), (0,5), (1,2), ø, (1), ø, ø, ø, (1))
- To make it more obvious on how it works, the entire alphabet sequence ("abcdefghijklmnopqrstuvwxyz") results in
((0,1,2,3,4,5,6,7,8,9,1,2), (0,0,1,1,2,3,4,5,6,7,8,9,2), (0,1,0,1,2,2,3,4,5,6), (0,1,2), (0,1,2), (0,1,2), (0,1), (0,1), (0,1), (1,2))
- And "aaa" is
((0,1,1,1), (0,0), ø, ø, ø, ø, ø, ø, ø, ø)
I'll keep a puzzle spirit and I won't explain it for now. The only hint is that the previous examples consider the English alphabet as so: A=01, B=02, C=03, all the way until Z=26 (yeah, the leading zero matters to this ciphering method). If you're a programmer, think in terms of pointers, or even better, an unidirectional linked list. If you're a mathematician, try to visualize a graph.
The cipher doesn't rely just on its principles, it also needs a corresponding mapping set (which can be alphabetical but can also contain non-letters, even emojis or hieroglyphs; the order will matter), and it also needs to know where to start the traversal path (the given examples start at the zeroeth tuple, but it could start anywhere). It's both deterministic (because there's a single correct path) and chaotic (because the result depends on other variables such as the mapping set, the initial position to start traversing, which element to take (whether the first or the last, FIFO or LIFO) and what numeric base to use (the examples used base-10, but it can be done as hexadecimal, octal, binary, or virtually any numerical base)). So I guess it has a lot of potential, not just for cryptography.
I'm Brazilian and I often love silence.
Here in Brazil, a Supreme Court minister has ruled on several occasions to block certain websites and services, the most recent being X/Twitter. Along with his decision to block these websites, he also imposed fines on those caught using VPNs to bypass ISP blocking. Although VPN traffic is encrypted and impossible for governments to monitor, somehow this worked because several people were fined. It is likely that Supreme Court agents monitored these networks in order to detect possible Brazilians using them during such blockages. An Australian should expect their government to proceed in a similar fashion.
(Just for clarification, I'm not going into the merits of this, just stating that this is technically possible and that there is a precedent in the government of a country, in aforementioned case, Brazil. Whether this is good or bad will depend on many factors)
One possibility is the Brazilian way to do law enforcement: blocking the domain and server IP addresses through ISPs.
Considering that the vast majority of the modern ads are videos or images, they won't show up in such text-browser environments. Also, they depend on JavaScript, which isn't available through such text-browser environments.
One could also use w3m or links. All the RAM-hungry things (such as CSS3, JavaScript APIs and heavy multimedia files) will be finally gone for good.
I wonder why disinformation and misinformation is such a problem nowadays... Maybe the access to scientific papers should be opened and democratized so everyone, regardless of social and economic classes, could read and lookup reliable knowledge? Nah, just paywall 'em all and blame those silly conspiracy theorists for online misinformation, it'll certainly work. /s
First Rule: don't rawdog internet, especially torrent search sites. Always use protections.
Second rule: always check if you're on the right site. It's relatively easy to find torrent search sites, but even easier to find phishing sites (i.e. sites that claims to be the original site, but they actually aren't).
A marker point for geodetic marking. Also known as triangulation station or trigonometrical point, it's fixed to the ground with its known coordinates.
Bots are like microplastics. No place on Earth is free from them anymore.
Not if these appliances come with Mesh networking capabilities (something commonly found on IoT devices). Technologies such as Mesh allows devices to connect between them, essentially forming a "mesh" of interconnected devices.