summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGordon GECOS <u@adam>2023-11-01 00:29:08 -0400
committerGordon GECOS <u@adam>2023-11-01 00:29:08 -0400
commit700b40807bb95cf5dd34182aa4e137e4bc53001f (patch)
tree7b60668e24a8f108c5a782ad8196222a6943fd8d
parent1aa1810946002d34b9e9027dc91e6f1dbd91a039 (diff)
stuff
-rw-r--r--deleuze.txt308
-rw-r--r--human-communication.txt132
-rw-r--r--medium.txt9
-rw-r--r--samizdat.txt13
-rw-r--r--why.txt23
5 files changed, 410 insertions, 75 deletions
diff --git a/deleuze.txt b/deleuze.txt
index fd8aed3..2a57d0d 100644
--- a/deleuze.txt
+++ b/deleuze.txt
@@ -106,14 +106,54 @@ CAN EVADE CONTROL.
106 106
107 107
108A university is an Erlang-style message passing system for academic 108A university is an Erlang-style message passing system for academic
109knowledge accumulation's life-system to regenerate itself. 109knowledge accumulation's cultural life-system to regenerate itself.
110 110
111 111
112 112
113Key point for Deleuze is that the "counter-effectuation" is Max Ent 113Key point for Deleuze is that the "counter-effectuation" is actually
114physics rather than quantum physics woo. 114real-life really-physical Max Ent physics rather than quantum physics
115 115analogy/woo. Bayesian statistical knowledge deriving from information
116Bayesian statistical knowledge deriving from information theory. 116theory.
117
118
119Deleuze didn't understand quantum physics correctly but it turns out
120that it doesn't matter because quantum physics doesn't have anything to
121do with metaphysics. It's only that Uncertainty forces human beings
122to adopt a de-centralizing de-totalizing Copernican mental shift. But
123it doesn't even do it in the way that is most relevant to metaphysics.
124There is also the de-centralizing de-totalizing Copernican mental
125shift of INTUITIONIST MATHEMATICS.
126
127Back to physics: Deleuze understood the main point: that particles
128are merely virtual constructs while these "interaction events" are
129the actual reality available to advanced physics -- the particles are
130virtual constructs that exist only in the human 3D mental model which
131is definitely NOT the same as the physical universe -- this is one of
132those places where we see the difference -- but the physical universe in
133making individual particles places where information access is limited
134fundamentally because the boundary between one particle and another with
135which it interacts isn't so much illusory as the only real thing, while
136the non-boundary is illusory.
137
138Quantum physics DOES imply a macro universe where macro assemblies
139of particles also have limited access to information; but the actual
140universe we see has EVEN MORE limitations on access to information,
141they are much much stricter than Uncertainty, and therefore we see much
142less information embedded in physical objects than Uncertainty allows
143in its theoretical maximum. (Physics experiments can be set up so
144that information is not lost; but life in general is always balancing
145loss of information against energy expenditure.) Max Ent physics and
146Bayesian statistics are mathematical/physical approaches to calculating
147the information available at a given spacetime location. However, part
148of the nature of quantum uncertainty AND max ent physics is that, from
149WITHIN the system, the limitations apply to the observer and the limits
150are self-referential in the sense that the limitations that apply to an
151observer's disability to have information from other spacetime points
152can include the disability to know which information is available!
153I.e., the theory produces known unknowns. The fact that there are
154spacetime points in the universe where knowledge of mathematics does
155not exist or exists at a merely undergrad level, means also unknown
156unknowns.
117 157
118 158
119 159
@@ -261,3 +301,255 @@ person can be "pigeonholed" multiple times, adopting multiple roles
261equivalent to the emotions as biological constructs? 301equivalent to the emotions as biological constructs?
262 302
263Did Deleuze put this in there or what? 303Did Deleuze put this in there or what?
304
305
306Tue Oct 31 11:59:50 AM EDT 2023
307CENTRAL LIE
308The central lie of narrative fiction is the conclusory ending. Why
309is there a conclusory ending? Because the computational process of
310computing the narrative must end (or else continue). When it finishes,
311the audience feels the task completion in reality but projects it into
312the imaginary of the story. This creates the danger of such projection
313onto the individual's own life; either in total, or in its various
314compartmentalized elements (e.g., a relationship, a social event).
315
316Task completion is a frontal lobe event. The frontal lobe recognizes
317the generation of a stop code of some kind (analogous to the stop codes
318of DNA but also analogous to a process exiting according to its internal
319logic, rather than being terminated by an exogenous signal).
320
321The computational process that is open, a continuous non-terminating
322generator, unless very specially selected, is almost sure to be boring.
323A closed (terminating) generator is interesting in proportion to its
324length. Life itself is a closed (terminating) generator of chemical
325chain reactions, and human beings are one of its longer chain reactions.
326Studying this chain reaction is biology and is interesting because the
327subject is finite (permitting the conceptualization of task completion
328as a future event thus flowing energy into present events predicted to
329make the desired event more likely later).
330
331Human culture is an open (non-terminating) generator and is filled
332with interesting things only because human beings undergo extensive
333search operations to gather information about their local environments,
334collecting and correlating that information in their internal brain
335structures, compulsively sharing it with others as part of the design
336of the distributed computation. Compulsive sharing creates a kind
337of cytoplasm of information for all humans to filter, selectively
338reflect, and otherwise use in combinatorial ways. Because of the
339filtering and selectivity, and the previous energy of collection and
340computational compression, the information produced and shared by
341human beings is vastly more interesting than open generators selected
342at random. Human culture is the longest-known chemical reaction
343loop. Human culture is the only chemical reaction not known to loop or
344terminate. Human culture is the only true "irrational number" of all
345discretely-instantiated numbers.
346
347
348
349
350
351
352
353Tue Oct 31 01:23:16 PM EDT 2023
354
355Feynman and practicing with a different box of tools
356
357Same idea as the Max Ent explanation of prophecy
358
359But also the same idea as parable of the falling seeds, reversed in
360time; the seeds unfall to the sower, and depending on seed origin
361(fertile soil, or barren) the sower becomes either someone who can farm
362or someone who knows what it means to be unable to farm. The knowledge
363passes from the earth through the seed into the farmer; the seeds
364provide the connection. The disabled would-be-farmer is disconnected
365from that knowledge even though he too has and sews seeds. His seeds,
366though sewn, fail to connect out to knowledge from the past and he may
367therefore fail to connect himself out to intentions from the future (or
368else not even form them).
369
370
371
372The 20th century was spent correlating the implications of a physical
373limit of the speed of light.
374
375The 21st century will be spent correlating the implications of
376the physical limits of the speed and size of computations.
377
378The human being as a computer system undering phase changes as the
379computer gains the ability to represent different types of state -- or
380to represent state with different performance characteristics -- through
381acquisition of data structures copied from the environment -- OR from
382internal processing and DISCOVERY of NEW data structures.
383
384These data structures are PASSED BETWEEN HUMANS who learn them
385implicitly and pick them up and play with them. But data structures
386are unsafe when EXECUTED AS REASON and for this reason human beings
387have SYSTEMS OF ACCESS CONTROL to HUMAN REASON both internal to their
388minds (e.g., concepts of valid and invalid authorities) and external as
389social environment. Society imposes economic exploitation which causes
390evolutionary adapations to "bubble up" in ways that are UNPREDICTABLE
391IN DETAIL (chaos theory) but according to evolutionary theory will tend
392to produce EFFICIENT DISTRIBUTED COMPUTATION so that it will converge
393to the computer systems we find most advanced as well as the biological
394systems of generating and filtering novelty that we find most advanced
395(except that the search space may have valleys etc).
396
397Another system of access control is RUNNING IN EMULATION this is when
398the individual learns enough about a foreign system to execute the steps
399of its reasoning without however being allowed to reach any conclusions
400that apply to the larger brain's data structures. There are two reasons
401why humans cannot rely on this mechanism primarily.
402
403First, EMULATION CAN BE JAILBROKEN; this cannot ever be as secure.
404
405Second, more importantly, RUNNING IN EMULATION IS COMPUTATIONALLY MORE
406EXPENSIVE. Even though CPUs and apparently also human beings have mechanisms
407to optimize emulation, in human beings especially, these cannot obtain
408"native" performance. Therefore, computational emulators (e.g.,
409learners of a second language) cannot "actually" perform as well as
410computational originators (e.g., learners of a first language) if they
411use the same underlying computational equipment for the same amount of
412time.
413
414But human beings do not all have the same underlying computational
415equipment; and they do not all apply the same amount of time to
416processing it. In the real world, running the other side in emulation
417is something that more intelligent, more informed, or more adult human
418beings attempt to do when interacting with less intelligent, informed,
419or adult ones. Human beings may also believe they are running the other
420side in emulation, when they are running a gross simplification; in
421fact, they are running a gross simplification even when they run the
422remote side natively, since they always still have to emulate the entire
423remote environment(!) which is where the real problems start.
424
425Non-portability of language between individuals is a major problem.
426Before the internet, locality constraints on communications caused
427portability to self-organize locally; but the internet has changed
428communication patterns so that every person experiences a kind of
429cosmopolis without totality. Every experience is a scene from a virtual
430city which is a construct only of that experience; each event and
431corresponding city co-singular; co-existing only once without object
432permanence.
433
434One problem is the human tendency to imagination, roleplay, etc.,
435causes human beings to pretend communication incompatibilities are
436not real. Human beings must surely have evolved under circumstances
437where perceived universality of linguistic forms was vastly more
438common than it is today in the adult internet-connected world, though
439perhaps less common than it is today in the world of the schoolchild
440or university student or professor.
441
442The professors may not make the same naive/incorrect excuses as children
443for failing to communicate; their perspectives will be more realistic;
444the university system as a whole is constrained in certain ways to
445succeed in transmitting information; but insofar as these transmissions
446fail, are the reasons understood from a rational information-theoretic
447perspective? Or is it a primate emotion static control program designed
448to regulate subordinate behavior emotionally, amplifying the causal
449force of the intentions of individuals positioned in social hierarchies
450such that their anger generates fear in others? Or is it a whole series
451of task-activated network programs, each one separately influenced
452by its own emotional context? Perhaps they are constrained by
453environmental demands to understand these failures operationally
454
455
456The task-activated networks seem to be the neurological place of
457mental compartmentalization; and the ADHD don't shut off the DMN when
458activating TANs. We still "see" the task when others are absorbed
459"in" the task. Of course, in order to influence the DMN, it would
460have to be activated. The TANs feed back into the DMN in ADHD, which
461allows the ADHD brain to generate totalizing connectivities by putting
462information from disparate parts of universe into the same local
463computational system; where for the non-ADHD these same components,
464though contained within one BRAIN, are not connected into the same
465integrated computational system; the TANs are prevented from feeding
466back into the DMN which allows mental compartmentalization to prevent
467information from one controlled system to produce interference in
468another controlled system when each controlled system is controlling the
469same physical human being with a different control algorithm.
470
471In other words, the DMN or the big picture understanding does not
472help with, but interferes with, TAN activity downstream of power
473in the social grid, because of the way in which this activity is
474structured to depend on human beings as removable components,
475keeping the environment highly-controlled. General intelligence is
476not useful in highly-controlled environments until they begin to
477break down. High-efficiency local computation requires discarding
478global information in order to maximize local connectivity of the
479processed information and thus processing speed. (Principle of
480cache locality.) So as optimization proceeds, the big picture is
481squeezed out of every local environment; except SOME privileged local
482environment has to be preserved in order to manage the organism's
483interaction with _environments_ themselves; this is the executive.
484The organism has a consciousness of multiple discrete environments;
485each environment controlled by some local control system; each local
486control system incorporating its own different own model of human
487emotion and behavior as necessary to sustain its specific local
488constraints
489
490Emotions are the foundational social control levers in humans. Not
491life/reproduction directly, as it would be in the case of domestic
492plants; but emotion/physical-reproduction-of-imaginary-will plays
493the same structural role, allowing animalia the meta-evolutionary
494advantage of evolving without biological death; emotional sampling with
495differential reproduction of imaginations replaces eukaryotic sampling
496with differential reproduction of offspring in the information-gathering
497social super-organisms of mammalia).
498
499In a school, a student convincing their teacher that they do not belong
500in the space to which they are assigned is NOT sufficient to liberate
501the student from the space; only a non-local authority assigning
502them to some other space can liberate the student from the local
503space. The student having the level of understanding of the system
504that would cause them to make this conclusion correctly tends to make
505the student even less able to perform in a space where they do not
506belong; if the student instead internalizes a false simplified local
507model in which the possibility of mis-spacialization is impossible by
508construction, then the student may have a better chance of passing
509through the filters imposed by the environment for reaching a more
510appropriate spacialization. If the student internalizes a more
511realistic, more complete, but externally-referencing (non-local)
512model, then compatibility issues are likely in communication with
513their teacher; if compatibility exists between the teacher and the
514student, then the compatibility issue will exist between the teacher and
515administration; or else the administration will have issues with the
516school board; or the electoral system; or else the local municipality
517itself will drain tax funding since diaspora from other schools will
518collect locally. At every possible avenue where the "exception" could
519"bubble up", there will be an incompatible interface, because the
520system attempts to impose a constraint that exceptions are handled
521non-locally. All biological systems impose this constraint because of
522how it produces a superorganism that is more intelligent and robust than
523if its individual components were individually intelligent and robust.
524Advanced decentralized computing systems also impose this constraint; it
525is a foundational principle of Erlang.
526
527Another principle important probably is that in order to learn a lot
528of things you ought to be independently generating them yourself;
529the fact that someone has generated something and transmitted it to
530someone else does does not mean that they transmitted the generator;
531transmitting the generator between people may have more to do with
532copying the environment in which the independent generation occurred;
533mathematics provides students an environment in which to independently
534re-discover the fundamental theorems; but mathematical education outside
535of universities does not seem to understand this principle even in
536schools that feed top universities. Students are fed the theorems to
537memorize and use without even being fed the raw material from which
538the theorems were originally derived. Thus they are optimizing to
539demonstrate a false affectation of mathematical education. Gresham's
540Law again. Erlang illustrates the structure of passing the generator as
541well as the data.
542
543
544Tue Oct 31 01:59:34 PM EDT 2023
545
546Rappers are only really good at styling up content that they copy from
547other places. They generate novelty only in style, they do not generate
548novel content. Novel content is generated places other than hiphop and
549then incorporated there. People who are competing in social spaces
550for the best content do not put that content in hiphop style. People
551competing in social spaces with hiphop style are not competing on
552content and do not bring dense content into the competition.
553
554
555
diff --git a/human-communication.txt b/human-communication.txt
index ac37581..e8308ac 100644
--- a/human-communication.txt
+++ b/human-communication.txt
@@ -15,6 +15,12 @@ alteration of their programming
15 15
16 16
17 17
18Human Communication
19
20OR
21
22Follow the logic of the knowledge.
23
18 24
19Human beings can transmit to one another two fundamentally different 25Human beings can transmit to one another two fundamentally different
20types of communication: 1) data structures; (2) programs. Programs are 26types of communication: 1) data structures; (2) programs. Programs are
@@ -41,16 +47,16 @@ generation according to the local runtime environment, while preserving
41an evolving kernel to re-generate slightly adapted kernels again and 47an evolving kernel to re-generate slightly adapted kernels again and
42again in new environments -- that is their robustness. It is the same 48again in new environments -- that is their robustness. It is the same
43as the genetic principle of DNA described by Schrodinger but most 49as the genetic principle of DNA described by Schrodinger but most
44especially like the artificially bred/genetically engineered DNA of the 50especially like the artificially bred/genetically engineered DNA of
45immune system's antibody-generating cells. These have mechanisms that 51the immune system's antibody-generating cells. These have mechanisms
46control the production of novelty, localizing it to one part of the DNA 52that control the production of novelty, localizing it to one part
47strand, while marking every novelty with signs of unoriginality used 53of the DNA strand, while circumscribing every novelty with signs of
48to protect the system against foreign novelty (a single recognizable 54unoriginality used to protect the system against foreign novelty (a
49DNA strand that is the same for every antibody; that is its resultant 55single recognizable DNA strand that is the same for every antibody; that
50protein is recognizable chemically by the immune system itself to 56is, its coded protein has a specific chemical binding to a matching
51provide the mechanism of auto-immune tolerance). The word kernel is 57protein (in the immunohistocompatibility complex) providing the
52to be interpreted as in the algebraic structure: preserved across a 58filter mechanism of auto-immune tolerance). The word kernel is to be
53morphism. 59interpreted as in the algebraic structure: preserved across a morphism.
54 60
55In a literal kernel, the DNA sequence in the seed's nucleus is a literal 61In a literal kernel, the DNA sequence in the seed's nucleus is a literal
56algebraic kernel, in an algebra of sexual reproduction that includes 62algebraic kernel, in an algebra of sexual reproduction that includes
@@ -58,38 +64,27 @@ a mechanism amplifying reproductive success of males in Eukaryotes
58providing an information-accumulation advantage, which was later 64providing an information-accumulation advantage, which was later
59jettisoned when Animalia transitioned into the Mammalian super-organism 65jettisoned when Animalia transitioned into the Mammalian super-organism
60phase which gave the next level of meta-advantage in information 66phase which gave the next level of meta-advantage in information
61accumulation; that super-organism was again jettisoned when Humanity 67accumulation as group-shared emotions applied distributed computation
62transitioned into its cultural super-organism phase; but remnants of 68to sensory information turning e.g. individualized sight into area
63the old system always exist and indeed exist as the foundations of the 69surveillance; that super-organism was again jettisoned when Humanity
64newer systems and abstractions are leaky and the new stuff just has to 70transitioned into its cultural super-organism phase; but remnants of the
65work better than the old stuff so it isn't ever all the way there -- you 71old system always exist and indeed exist as the foundations of the newer
72systems and abstractions are leaky and the new stuff only has to work
73just-better than the old stuff so it isn't ever all the way there -- you
66know how it goes. So capitalism was founded on the conceptually very 74know how it goes. So capitalism was founded on the conceptually very
67different property relations of feudalism, which only slowly shifted to 75different property relations of feudalism, which only slowly shifted to
68match the needs of the capitalists, without necessarily losing their 76match the needs of the capitalists, without necessarily losing their
69old-timey words and old white men with robes, or even the fact at the 77old-timey words and old white men with robes, or even the fact that some
70end of the day that some people get to force others to fight in front 78people get to force other people to fight in front of them and a spot
71of them and a spot in the back is what all the cultural power wars are 79in the back is the foundation of political power.
72fighting over.
73 80
74Haskell monads show us how algebraic morphisms are as intuitive as 81Haskell monads show us how algebraic morphisms are as intuitive as
75quasiquotation. Thank you Mr. Quine. But these are all just simple 82quasiquotation. Thank you Mr. Quine. But these are all just simple
76recursions. They are just the simplest structures that exist. And 83recursions. They are just the simplest structures that exist. And yet
77yet how much more complicated to understand them than the far more 84how much more complicated to understand them than the far more complex
78complex 2+2=4, which even people who are not simple believe to be 852+2=4, which even people who are not simple believe to be more simple!
79more simple! But 2+2=4 is what we are BRED TO KNOW and recursion 86People who think 2+2=4 is simple are remembering the answer rather than
80is WHAT WE ARE MADE OF. We are made of it, and 2+2=4 is made of it 87computing it.
81(one way or another, and there are many different ways, and some are
82simpler than others, and the monads and the quasiquotation, again,
83are the simplest things themselves, simplest to build into a physical
84computational system for example, though these physical computational
85systems have integer specific hardware to handle 2+2=4 JUST LIKE HUMAN
86BIOLOGY DOES and for the same reason, the integer hardware itself has an
87internal computational structure much more complicated than these simple
88recursions, because on a fundamental level in terms of the universe
89and its computational power, the integer operations are doing more
90computation and require more energy. No matter how much simpler they
91seem to us, that is an illusion, and these other more complex recursive
92forms are the simpler structures.
93 88
94This power makes them dangerous; for the same reason that computer 89This power makes them dangerous; for the same reason that computer
95systems control access to programming features (and generally even when 90systems control access to programming features (and generally even when
@@ -102,23 +97,56 @@ more knowledge requires more TIME than incorporating less knowledge;
102something that affects the brain's every mental structure may take as 97something that affects the brain's every mental structure may take as
103much time to learn as a second language. And that illustrates the key 98much time to learn as a second language. And that illustrates the key
104reason why these systems are unavailable: they do not make available 99reason why these systems are unavailable: they do not make available
105sufficient time to process. That, in fact, is the MOTIVATION for 100sufficient time to process. Time is even the MOTIVATION for restricting
106restricting access in the case of computer systems, denial of service 101access in modern computer systems, denial of service being far more
107being far more common than privilege escalation; this is probably true 102common than privilege escalation; this commonality is true of human
108of human systems as well. 103systems as well (not the motivation for restrictions; older computer
109 104systems were highly vulnerable but modern systems are vastly more secure
110Capitalism and school might be seen largely as denial of service attacks 105to trivial attacks, though their complexity may lead to spectacularly
111on their constituent subordinates' ability to process computations 106immense failures as breaches of executive control structures or even
112from sources other than the superordinates. As long as you can clog 107breaches of software distribution centralization points whose impact
113someone's pipeline enough they spend all their time on processing what 108could span multiple national executive control structures in multiple
114you give them, you can keep them from seeing enough of the big picture 109nations simultaneously, as indeed have several recent software supply
115to change their phase and thereby destabilizing their connection to 110chain compromises e.g. Microsoft through their upstream library vendor
116you. There is the "BITE" model of cult programming, behavior information 111SolarWinds. This attack was relatively harmless because it was performed
112by a government that only wanted some spy shit rather than one at war or
113a terrorist who wanted to maximize destruction).
114
115Capitalism and school might be seen operationally as denial of
116service attacks on their constituent subordinates' ability to process
117computations from sources other than the superordinates. As long as
118you can clog someone's pipeline enough they spend all their time on
119processing what you give them, you can keep them from seeing enough
120of the big picture to change their phase thereby destabilizing their
121binding connection to you (creating a renegotiation, reconfiguration, or
122break).
123
124(Schools follow the corporate proof-of-work knowledge distribution
125system of transferring knowledge about subordinate worker performance
126up to non-local, locally-inaccessible standard-setters -- depriving
127local activity of non-local meaning, depriving local activity of the
128possibility of renegotiating its purpose through local communication,
129but also creating a conflict between the interests of local power and
130local knowledge about global reality, so that there is a systemic
131filter to REMOVE global knowledge from local activity; you are educated
132stupid in your timecubicle! and by the way it doesn't help if the local
133superordinate has global knowledge.)
134
135There is the "BITE" model of cult programming, behavior information
117thought and emotion control; institutions in order to fully bind 136thought and emotion control; institutions in order to fully bind
118individuals only need to control behavior enough to force compliance 137individuals only need to control behavior enough to force compliance
119with processing received information, and thought can be disabled by 138with processing received information, and thought can be disabled by
120increasing the quantity of that information. (This also constitutes a 139increasing the quantity of that information. This also constitutes a
121denial of emotion in a similar way, setting the state for emotional 140parallel denial of emotion, creating potential for emotional control
122control by selective release etc.) 141through e.g. selective release from stressors whether through reduction
123 142in demanded processing or other mechanisms; if processing quantity is to
143be the only "lever" then it has to have a minimum quantity demanded in
144order to retain its binding function reliably; in other words once you
145drop the hours down to 20 you end up with MORE retention problems!
146
147 FOR YOUR FIRST
148 EMPLOYER
149 A COLLEGE DEGREE
150 IS THE ONLY
151 DOWRY
124 152
diff --git a/medium.txt b/medium.txt
index 63e675a..229cbdf 100644
--- a/medium.txt
+++ b/medium.txt
@@ -26,10 +26,15 @@ manipulation or unification
26collision of being leaving 26collision of being leaving
27behind and changing the meaning 27behind and changing the meaning
28layered on every later stream 28layered on every later stream
29as must any event true for 29(as must any event true for
30time to move or 30time to move or
31to make its illusion of 31to make its illusion of
32us passing through it 32us passing through it)
33
34Islands of isolated neotony
35the naive form a field of vulnerable prey
36Handed-off to other captors usually
37Information gatekeepers prefigure society
33 38
34Lost transmissions pass as 39Lost transmissions pass as
35disconnections to the past 40disconnections to the past
diff --git a/samizdat.txt b/samizdat.txt
index e5d9390..bcb9f30 100644
--- a/samizdat.txt
+++ b/samizdat.txt
@@ -1,3 +1,6 @@
1Samizdat OS
2
3
1Samizdat OS is so-stitched 4Samizdat OS is so-stitched
2that any data stored in git 5that any data stored in git
3can reproduce as easily 6can reproduce as easily
@@ -8,17 +11,17 @@ Surviving disconnections
8as grafts // Rhizomal vacuoles 11as grafts // Rhizomal vacuoles
9impermiable to masses 12impermiable to masses
10Invite-only // Authenticate verify 13Invite-only // Authenticate verify
11Hard as block chain // Go back in time
12 14
15Hard as block chain // Go back in time
13No data lost // With privacy 16No data lost // With privacy
14protected direct by 17protected direct by
15your own machine's 18your own machine's
16cryptography 19cryptography
17without dependency
18on microfacegoog NSA
19 20
20And the safety 21No dependency
22on microfacegoog NSA
23Still the safety
21of redundancy 24of redundancy
22storing your keys 25Storing your keys
23divided across machines 26divided across machines
24 27
diff --git a/why.txt b/why.txt
index 70b4b4b..970c1d9 100644
--- a/why.txt
+++ b/why.txt
@@ -3,22 +3,29 @@ Why rhyme
3 3
4First reason time 4First reason time
5To slow the mind 5To slow the mind
6The flows thereby emerge refined 6The flows thereby
7emerge refined
7 8
8Next is decay 9Next is decay
9Time's other name 10Time's other name
10Lyrics as music played 11Lyrics as music played
11with rhythm stay age's fade 12with rhythm stay age's fade
12 13
13Each loop repeated 14Each looped repeat a memory
14a layer of memory 15Measure again the intensity
15Measure against it 16Calmer till the meaning changes
16remaining intensity
17 17
18Style is proof due 18Style is proof due
19audiences who 19audiences who must start the loop
20must start the loop
21
22The writer too will learn the truth 20The writer too will learn the truth
23when the improvement search concludes 21when the improvement search concludes
24 22
23
24
25
26
27A series of statements layed
28down in sounds of common shape
29Sonorific redundancy
30The mind fills in what gaps are made
31Guessed what next before it came