summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGordon GECOS <u@adam>2023-11-01 02:17:00 -0400
committerGordon GECOS <u@adam>2023-11-01 02:17:00 -0400
commit10dbc78b4f81ef77a7cbb5326a153fa19e121671 (patch)
tree188e442eeda150ff919f5f2571f96cb7b6f08934
parent1c08e140c52378e38d22da877d7a7f01963bd905 (diff)
human-communication.txt
-rw-r--r--human-communication.txt88
1 files changed, 48 insertions, 40 deletions
diff --git a/human-communication.txt b/human-communication.txt
index e8308ac..fd0fa33 100644
--- a/human-communication.txt
+++ b/human-communication.txt
@@ -23,7 +23,7 @@ Follow the logic of the knowledge.
23 23
24 24
25Human beings can transmit to one another two fundamentally different 25Human beings can transmit to one another two fundamentally different
26types of communication: 1) data structures; (2) programs. Programs are 26types of communication: (1) data structures; (2) programs. Programs are
27the same thing as proofs and the same thing as Russellian denotations; 27the same thing as proofs and the same thing as Russellian denotations;
28they have the "sense" that data structures lack. They have the 28they have the "sense" that data structures lack. They have the
29power that data does not have, to transmit knowledge rather than 29power that data does not have, to transmit knowledge rather than
@@ -45,17 +45,19 @@ generators of self-propagating generator-regenerators. Their programs
45are constructed in such a way as to be rewritten generation after 45are constructed in such a way as to be rewritten generation after
46generation according to the local runtime environment, while preserving 46generation according to the local runtime environment, while preserving
47an evolving kernel to re-generate slightly adapted kernels again and 47an evolving kernel to re-generate slightly adapted kernels again and
48again in new environments -- that is their robustness. It is the same 48again in new environments -- in such a way that the kernel picks up
49as the genetic principle of DNA described by Schrodinger but most 49each new environment and carries it into the next without losing what
50especially like the artificially bred/genetically engineered DNA of 50it learned of the previous environment -- that is their robustness. It
51the immune system's antibody-generating cells. These have mechanisms 51is the same as the genetic principle of DNA described by Schrodinger
52that control the production of novelty, localizing it to one part 52but most especially like the artificially bred/genetically engineered
53of the DNA strand, while circumscribing every novelty with signs of 53DNA of the immune system's antibody-generating cells. These have
54unoriginality used to protect the system against foreign novelty (a 54mechanisms that control the production of novelty, localizing it to
55single recognizable DNA strand that is the same for every antibody; that 55one part of the DNA strand, while circumscribing every novelty with
56is, its coded protein has a specific chemical binding to a matching 56proof of provenance used to protect the system against foreign
57protein (in the immunohistocompatibility complex) providing the 57novelty (a single recognizable DNA strand that is the same for every
58filter mechanism of auto-immune tolerance). The word kernel is to be 58antibody; that is, its coded protein has a strong chemical binding to
59a matching protein in the immunohistocompatibility complex providing
60the filter mechanism of auto-immune tolerance). The word kernel is to be
59interpreted as in the algebraic structure: preserved across a morphism. 61interpreted as in the algebraic structure: preserved across a morphism.
60 62
61In a literal kernel, the DNA sequence in the seed's nucleus is a literal 63In a literal kernel, the DNA sequence in the seed's nucleus is a literal
@@ -83,8 +85,9 @@ quasiquotation. Thank you Mr. Quine. But these are all just simple
83recursions. They are just the simplest structures that exist. And yet 85recursions. They are just the simplest structures that exist. And yet
84how much more complicated to understand them than the far more complex 86how much more complicated to understand them than the far more complex
852+2=4, which even people who are not simple believe to be more simple! 872+2=4, which even people who are not simple believe to be more simple!
86People who think 2+2=4 is simple are remembering the answer rather than 88People who think 2+2=4 is simple may be remembering the answer rather
87computing it. 89than computing it. People who are computing it may not be deriving from
90foundations; they may be remembering rather than proving a lemma.
88 91
89This power makes them dangerous; for the same reason that computer 92This power makes them dangerous; for the same reason that computer
90systems control access to programming features (and generally even when 93systems control access to programming features (and generally even when
@@ -100,14 +103,14 @@ reason why these systems are unavailable: they do not make available
100sufficient time to process. Time is even the MOTIVATION for restricting 103sufficient time to process. Time is even the MOTIVATION for restricting
101access in modern computer systems, denial of service being far more 104access in modern computer systems, denial of service being far more
102common than privilege escalation; this commonality is true of human 105common than privilege escalation; this commonality is true of human
103systems as well (not the motivation for restrictions; older computer 106systems as well (older computer systems were highly vulnerable but
104systems were highly vulnerable but modern systems are vastly more secure 107modern systems are vastly more secure to trivial escalation attacks,
105to trivial attacks, though their complexity may lead to spectacularly 108though their complexity may lead to spectacularly immense failures as
106immense failures as breaches of executive control structures or even 109breaches of gargantuan executive control structures or even breaches
107breaches of software distribution centralization points whose impact 110of software distribution centralization points whose impact could span
108could span multiple national executive control structures in multiple 111multiple national executive control structures in multiple nations
109nations simultaneously, as indeed have several recent software supply 112simultaneously, as indeed have several recent software supply chain
110chain compromises e.g. Microsoft through their upstream library vendor 113compromises e.g. Microsoft through their upstream library vendor
111SolarWinds. This attack was relatively harmless because it was performed 114SolarWinds. This attack was relatively harmless because it was performed
112by a government that only wanted some spy shit rather than one at war or 115by a government that only wanted some spy shit rather than one at war or
113a terrorist who wanted to maximize destruction). 116a terrorist who wanted to maximize destruction).
@@ -121,28 +124,33 @@ of the big picture to change their phase thereby destabilizing their
121binding connection to you (creating a renegotiation, reconfiguration, or 124binding connection to you (creating a renegotiation, reconfiguration, or
122break). 125break).
123 126
124(Schools follow the corporate proof-of-work knowledge distribution 127(Schools follow the corporate hierarchy style proof-of-work knowledge
125system of transferring knowledge about subordinate worker performance 128distribution system of transferring knowledge about subordinate worker
126up to non-local, locally-inaccessible standard-setters -- depriving 129performance up to non-local, locally-inaccessible standard-setters
127local activity of non-local meaning, depriving local activity of the 130-- depriving local activity of non-local meaning. The presence
128possibility of renegotiating its purpose through local communication, 131of global information in the local context becomes a liability as
129but also creating a conflict between the interests of local power and 132either denial of service or maybe baby a nucleation engine for
130local knowledge about global reality, so that there is a systemic 133crystalization of solidarity with snowflakes dropping through the air in
131filter to REMOVE global knowledge from local activity; you are educated 134a horizontal barrage since no single nucleation point could crystalize
132stupid in your timecubicle! and by the way it doesn't help if the local 135a horizontally-segregated group. There is a systemic filter to remove
133superordinate has global knowledge.) 136global knowledge from inputs supplied to the local system as well as
137mechanisms to prevent horizontal information flow within local activity;
138you are educated stupid in your timecubicle! and by the way it doesn't
139help the non-local superordinate if the local superordinate has global
140knowledge)
134 141
135There is the "BITE" model of cult programming, behavior information 142There is the "BITE" model of cult programming, behavior information
136thought and emotion control; institutions in order to fully bind 143thought and emotion control; institutions in order to fully bind
137individuals only need to control behavior enough to force compliance 144individuals only need to control behavior enough to force compliance
138with processing received information, and thought can be disabled by 145with demands to process received information, and thought can be
139increasing the quantity of that information. This also constitutes a 146disabled by increasing the quantity of that information. This also
140parallel denial of emotion, creating potential for emotional control 147constitutes a parallel denial of emotion, creating potential for
141through e.g. selective release from stressors whether through reduction 148emotional control through e.g. selective release from stressors whether
142in demanded processing or other mechanisms; if processing quantity is to 149through reduction in demanded processing or other mechanisms; if
143be the only "lever" then it has to have a minimum quantity demanded in 150processing quantity is to be the only "lever" then it has to have a
144order to retain its binding function reliably; in other words once you 151minimum quantity demanded in order to retain its binding function
145drop the hours down to 20 you end up with MORE retention problems! 152reliably; in other words once you drop the hours down to 20 you end up
153with MORE retention problems!
146 154
147 FOR YOUR FIRST 155 FOR YOUR FIRST
148 EMPLOYER 156 EMPLOYER