summaryrefslogtreecommitdiff
path: root/human-communication.txt
diff options
context:
space:
mode:
Diffstat (limited to 'human-communication.txt')
-rw-r--r--human-communication.txt293
1 files changed, 157 insertions, 136 deletions
diff --git a/human-communication.txt b/human-communication.txt
index fd30b31..1fa2116 100644
--- a/human-communication.txt
+++ b/human-communication.txt
@@ -1,6 +1,4 @@
1Human Communication 1Human Communication or__ Follow the logic of the knowledge
2 or
3Follow the logic of the knowledge
4 2
5 3
6 4
@@ -8,17 +6,10 @@ Human beings can transmit to one another two fundamentally
8different types of communication: (1) data (2) programs. 6different types of communication: (1) data (2) programs.
9Programs are the same thing as proofs and the same thing as 7Programs are the same thing as proofs and the same thing as
10Russellian denotations; they have the "sense" that mere/pure 8Russellian denotations; they have the "sense" that mere/pure
11data lacks. They have the power that data does not have, 9data lacks. They have the power that data does not have, to
12to transmit knowledge rather than information. Information 10transmit knowledge rather than information. Information
13creates knowledge about transmission but cannot transmit 11can /create/ knowledge (about transmission) but does not
14knowledge, because knowledge to be "real" or "live" in the 12/transmit/ knowledge.
15physical brain ("known" as opposed to merely "imaginable";
16it has to be a generator of behaviors; which means it has to
17be a physical form that has energy metabolism in order to
18satisfy its computational needs; but of course not an
19"independent" energy metabolism nor its own cell membrane;
20but it does have its own forms of informational membranes;
21we shall address them.)
22 13
23However, it must be understood that programs are highly 14However, it must be understood that programs are highly
24sensitive to their runtime environments and for that reason 15sensitive to their runtime environments and for that reason
@@ -26,24 +17,25 @@ their robustness is an extremely difficult problem akin to
26the robustness of life in natural habitats. Human cultural 17the robustness of life in natural habitats. Human cultural
27programs are high reliability systems which means they are 18programs are high reliability systems which means they are
28chaotic systems that have phase after phase to downshift 19chaotic systems that have phase after phase to downshift
29through (articulated joints through which to roll over) 20through (articulated joints through which to roll over) as
30as they take damage and heal from it by phase-changing 21they take damage and heal from it by phase-changing back
31back up over (computational) time (rewriting mental 22up over (computational) time (rewriting mental programs
32programs to account for unhandled or mishandled conditions 23to account for unhandled or mishandled conditions while
33while keeping the programs running continuously in a 24keeping the programs running continuously in a degraded
34degraded state). Knock out multiple random chunks, portions 25state). Knock out multiple random chunks, portions of
35of program degenerate into data, and the whole still 26program degenerate into data, and the whole still runs in
36runs. Human cultural programs are far beyond what average or 27the designed way, and will even recover the lost portion
37even elite programmers can hope to construct in computer 28over time. Human cultural programs are far beyond what
38systems; they have been constructed by one-in-a-million 29average or even elite "professional" programmers can hope to
39prophets who were able to fully absorb their entire 30construct in computer systems; they have been constructed
40local culture and reprogram themselves individually 31by one-in-a-million prophets who were able to fully
41based on reverse engineering that culture to become 32absorb their entire local culture and reprogram themselves
42(themselves, as individuals) generators of self-propagating 33individually based on reverse engineering that culture to
43regenerator-generators of universal culture. Their programs 34become (themselves, as individual human beings) generators
44are constructed in such a universal way as to be rewritten 35of self-propagating generators of universal culture. Their
45generation after generation according to the local runtime 36programs are constructed in such a universal way as to be
46environment, while preserving an evolving kernel to 37rewritten generation after generation according to the local
38runtime environment, while preserving an evolving kernel to
47re-generate slightly adapted kernels again and again in new 39re-generate slightly adapted kernels again and again in new
48environments -- in such a way that the kernel picks up each 40environments -- in such a way that the kernel picks up each
49new environment's knowledge and carries it into the next 41new environment's knowledge and carries it into the next
@@ -58,13 +50,13 @@ system's antibody-generating cells. These have mechanisms
58that induce the production of novelty, localizing it to one 50that induce the production of novelty, localizing it to one
59part of the DNA strand, while circumscribing every novelty 51part of the DNA strand, while circumscribing every novelty
60with proof of provenance used to protect the system against 52with proof of provenance used to protect the system against
61foreign novelty (a single recognizable DNA strand that is 53foreign novelty. (A single recognizable DNA strand that is
62the same for every antibody; that is, its coded protein has 54the same for every antibody; that is, its coded protein has
63a strong chemical binding to a matching protein in the 55a strong chemical binding to a matching protein in the
64immunohistocompatibility complex (an FC receptor); called a 56immunohistocompatibility complex (an FC receptor); called a
65transporter, it functions like a passport -- an unforgeable 57transporter, it functions like a passport -- an unforgeable
66signature that must be presented to pass the filter 58signature that must be presented to pass the filter
67mechanism of auto-immune tolerance). The word kernel is to 59mechanism of auto-immune tolerance.) The word kernel is to
68be interpreted as in the algebraic structure: a generator is 60be interpreted as in the algebraic structure: a generator is
69preserved across a morphism. 61preserved across a morphism.
70 62
@@ -88,16 +80,19 @@ thing if you are into analogies YUCK.) That super-organism
88in turn progressively jettisoned as Humanity transitions 80in turn progressively jettisoned as Humanity transitions
89into its cultural message-passing super-organism phase 81into its cultural message-passing super-organism phase
90where all Earth life must survive in symbiotic exchange 82where all Earth life must survive in symbiotic exchange
91with, or as constituent elements of, Earth's unique human 83with, or as constituent elements of, Earth's singular
92biosocial ecomachine originating chronologically before the 84(unique) human/biosocial eco-machine; a phase of biological
93origination of any biological Earth human. (In fact Humanity 85evolution without any fundamental dependence on sampling the
94remains the mammalian substrate but human subjectivity (the 86environment through differential reproduction or survival
95"us" that "we" think "we" are even as we call ourselves 87of DNA-based life; originating chronologically before the
96human) is produced by the cultural distributed program whose 88origination of any biological Earth human. While biological
97social systems of self-preservation dominate the mammalian 89humanity remains the mammalian substrate, human subjectivity
98levers mostly just by spacialization -- I mean, it ain't 90(the "us" that "we" think "we" are as we call ourselves
99hard); but remnants of the old systems always exist and 91human) is produced by the cultural distributed program
100indeed exist as the foundations of the newer systems and 92(whose social systems of self-preservation dominate the
93mammalian levers mostly just by spacialization -- I mean, it
94ain't hard). But remnants of the old systems always exist
95and indeed exist as the foundations of the newer systems and
101abstractions are leaky and the new stuff only has to work 96abstractions are leaky and the new stuff only has to work
102just-better than the old stuff so it isn't ever all the 97just-better than the old stuff so it isn't ever all the
103way there -- you know how it goes. (There is always a 98way there -- you know how it goes. (There is always a
@@ -107,25 +102,27 @@ exist to be found; though it may be unconnectable to the
107local region.) 102local region.)
108 103
109(Computational phase spaces means how many computational 104(Computational phase spaces means how many computational
110states can it cycle through, or how much does the 105states can it cycle through, or how much does the novelty
111novelty generator repeat. Phases are "upshifted" to 106generator repeat. Phases are "upshifted" to have more
112have more states by application of processing time to 107states by application of processing time to acquired
113acquired knowledge. A construction process searching for 108knowledge. A construction process searching for more
114more efficient internal data structures results in the 109efficient internal data structures results in the discovery
115discovery of "external" or "objective" structure; the use of 110of "external" or "objective" structure in "the world";
116structure to simplify the generator makes more synapses 111the use of data structure to simplify the generator
117available to represent more structure allowing the search to 112makes more synapses available, allowing the search to
118continue without consuming synpases. A compression of 113make progress without consuming synpases. A compression
119more information into smaller computational structures. 114of more information into smaller computational structures
120The generator is the compressed structure in which human 115increases its speed and provides new logical and emotional
121thought computation takes place; a signal processor; feed 116connectivities. The generator is the compressed structure
122in facts to generate conclusions but feed in noise to 117in which human thought computation takes place; a signal
123generate imaginations; either way, what is generated will be 118processor; feed in facts to generate conclusions but feed
124filtered elsewhere according to the present state of the 119in noise to generate imaginations; either way, what is
125multiple shifting connections of the frontal lobe and 120generated will be filtered elsewhere according to the
126its external/bodily hormonal-emotional Mammalian control 121present state of the multiple shifting connections of the
127structures. The cultural super-organism will surely be to 122frontal lobe and its external/bodily hormonal-emotional
128Mammalia as Eukarya to the microbial mats.) 123Mammalian control structures. The cultural super-organism
124will surely be to Mammalia as Eukarya to the microbial
125mats.)
129 126
130Haskell monads show us how algebraic morphisms are as 127Haskell monads show us how algebraic morphisms are as
131intuitive as quasiquotation. Thank you Mr. Quine. But these 128intuitive as quasiquotation. Thank you Mr. Quine. But these
@@ -159,20 +156,18 @@ side-effects like inducing speculative investment in
159external investigative exploration. The basic framework is 156external investigative exploration. The basic framework is
160of an information-gathering future-predictor-controller; 157of an information-gathering future-predictor-controller;
161reprogramming it involves loops through to the world; 158reprogramming it involves loops through to the world;
162 159reprogramming it involves loops through to the world; these
163Erlang-style message-passing; such a specialist-y thing and 160loops through the world seem so confusing to people trying
164yet it's the simplest kind of structure; it must exist in a 161to learn Erlang that it seems like I should try to explain
165thousand places; there must be a hundred apt analogies; but 162them! But there is no time, so I will sum up: the progam's
166it is only one thing and that is an algorithm, or a program, 163self is a message but the self is virtual, the self is an
167or a communication of the most powerful sort that is 164experiment, and the self needs to be destroyed. First, make
168possible between human beings; and it is that precise 165a copy, then collide it with the world (your body will also
169algorithm that has been mathematically identified, broken 166collide) then compare its shape to the original. Collision
170down into its constituent axioms like a protein into its 167provides knowledge to decide whether to destroy the copy or
171originating DNA code points, by the Erlang literature. And 168destroy the original. What is not destroyed can be copied
172the reason for all that is that it is the foundation of 169into another node. It works because neighboring nodes pick
173stability of long-running "autophagic" distributed systems; 170up dropped messages. It wouldn't work if they competed.
174I call them "tissue" systems because the cells of a living
175tissue replace themselves similarly.
176 171
177(Knowledge can exist in a degraded, not-fully-replicable 172(Knowledge can exist in a degraded, not-fully-replicable
178form; neutered, locally contained, but potentially still 173form; neutered, locally contained, but potentially still
@@ -217,9 +212,10 @@ their upstream library vendor SolarWinds. This attack was
217relatively harmless because it was performed by a government 212relatively harmless because it was performed by a government
218that only wanted some subtle spy shit rather than an act of 213that only wanted some subtle spy shit rather than an act of
219war or terrorist maximizing destruction, I mean I guess, who 214war or terrorist maximizing destruction, I mean I guess, who
220knows what they did). Time to process. Can't get the time 215knows what they did. Luckily they didn't get into the
221of day from someone who doesn't want to spend the time 216innermost kernel of human culture.) Time to process. Can't
222thinking whether you just want the time of day. 217get the time of day from someone who doesn't spend time
218thinking whether you really just want the time of day.
223 219
224Capitalism and school might be seen operationally as denial 220Capitalism and school might be seen operationally as denial
225of service attacks on their constituent subordinates' 221of service attacks on their constituent subordinates'
@@ -239,19 +235,27 @@ By working backward from the conclusion the mathematician
239will construct a proof "from both ends" toward a middle. 235will construct a proof "from both ends" toward a middle.
240The conclusion is in sight long before the bridge is built. 236The conclusion is in sight long before the bridge is built.
241The fear response precedes the conclusion. Loss of the 237The fear response precedes the conclusion. Loss of the
242binding connection in the imaginary can produce the fear. 238binding connection in the imaginary can produce fear. The
239fear emotion can deactivate the search for the next step.
243Thus can a binding lock the phase of the bound. (With some 240Thus can a binding lock the phase of the bound. (With some
244emotions you can jump the gap; you might land on error.) 241emotions you can jump the gap; you might land on error.)
245 242
246Wasn't Foucault's point in the History of Sexuality 243Foucault said in History of Sexuality Vol. 3 that the
247vol. 3 that the cultural practice of copying prohibitions 244cultural practice of copying prohibitions disguises the
248disguises the intentional construction of positive desires? 245intentional construction of positive desires. Auto-immune
249Auto-immune tolerance isn't accomplished by copying 246tolerance isn't accomplished by copying prohibitions into
250prohibitions into new generators (pruning their search 247new generators (pruning their search trees) but by filtering
251trees) but by filtering already-existing generators of 248already-existing generators of novelty either into places
252novelty either into places where they will be allowed to 249where they will be allowed to generate further or else
253generate further or else places where they can be recycled 250places where they can be recycled as energy. However,
254as energy. 251it all takes place in a context where the generators
252are always-already "pruned" because they are raised in
253a "whitelist" type environment where the elements of
254composition are provided; and composing with elements
255not provided is made unthinkable. A "blacklist" filter
256algorithm is in principle able to be much more liberal than
257a "whitelist" one; which is to say it empowers unpredictable
258generators, who potentially shift the phase of the whole.
255 259
256The search tree of the mental generator does not need to be 260The search tree of the mental generator does not need to be
257pruned if you can exploit the mind's lack of idempotence 261pruned if you can exploit the mind's lack of idempotence
@@ -262,27 +266,36 @@ search breadth and encounter a big picture view. Maybe the
262point is, instead of thinking about which prohibitions 266point is, instead of thinking about which prohibitions
263are copied, or which generated outputs are pruned, think 267are copied, or which generated outputs are pruned, think
264about which generators get destroyed or prevented from 268about which generators get destroyed or prevented from
265running. Most places in society can't allow unpredictable 269running. Each generator is a unique program (or algorithm)
266people, which means most people in most places need to be 270that in principle can be identified mathematically ("up to
267impervious to reason. Society needs filters to find these 271isomorphism"); in practice we could at least name some
268people. Once found, they can be put into positions of power 272categories.
273
274Most places in society can't allow unpredictable people,
275which means most people in most places need to be impervious
276to reason. Society needs filters to identify these people.
277Once identified, they can be put into positions of power
269where they will behave as predicted by those who get to 278where they will behave as predicted by those who get to
270put people into places; subordinate generators will not 279put people into places; subordinate generators will not
271interfere with superordinate generators because they will be 280interfere with superordinate generators because they will be
272constructed by selection to be always trapped in some 281constructed by selection to be always trapped in some local
273local thought system. Foucault was the historian of thought 282thought system. The generator is apparently blanket-trained
274systems and that is very abstract and powerful yes like a 283to run only in specific contexts; spontaneous generation in
275true mathematician with rigor (!!) but we still care more 284the /general/ context is the unthinkable: it's logging in as
276about the people in the systems than the systems and want to 285root! Developing on the production server!
277go back to that mammal meat perspective where we might feel 286
278something. But the people aren't "in" the thought system; 287Foucault was the historian of thought systems and that is
279they're products of the thought system; they're in a 288very abstract and powerful yes like a true mathematician
280social message exchange network that is a system; and that 289with rigor (!!) but we still care more about the people in
281system propagates social network extension prohibitions not 290the systems than the systems and want to go back to that
282necessarily by explicit prohibitory rules /nor/ by any kind 291mammal meat perspective where we might feel something. But
283of /management/ of desire (though that may be attempted!), 292the people aren't "in" the thought system; they're products
284but by occupying all time where unmanaged bindings could 293of the thought system; they're in a social message exchange
285form. 294network that is a system; and that system propagates social
295network extension prohibitions not necessarily by explicit
296prohibitory rules /nor/ by any kind of /management/ of
297desire (though that may be attempted!), but by occupying all
298time where unmanaged bindings could form.
286 299
287When I was in middle school I read A Brief History of Time 300When I was in middle school I read A Brief History of Time
288and learned that Albert Einstein claimed that calculus 301and learned that Albert Einstein claimed that calculus
@@ -300,13 +313,9 @@ Only then will they be permitted a chance to compete for a
300seat at the mic where some lucky MC gets to spit something 313seat at the mic where some lucky MC gets to spit something
301new on top. You're not there yet kiddo, integrate this 314new on top. You're not there yet kiddo, integrate this
302expression. But don't integrate too far. Robin Williams 315expression. But don't integrate too far. Robin Williams
303made a movie about it, but it sucked. Like why would you 316made a movie about it, but it sucked. Robin Williams went
304put literal death into the movie what a fucking downer, it 317to Juilliard (he was deeply integrated into the social
305doesn't help how he ended up unlike Michael Jackson where it 318mainstream) so maybe those movies sucked for a reason.
306works like Man in the Mirror really works now in retrospect.
307Robin Williams went to Julliard which means he was pretty
308well socially integrated doesn't it so maybe those movies
309sucked for a reason.
310 319
311Somehow it does not matter what is the material that 320Somehow it does not matter what is the material that
312is taught; the effect is never felt. When I read 321is taught; the effect is never felt. When I read
@@ -318,9 +327,10 @@ they just need to keep the volume high and the frequency
318constant? I evaded mind control by skipping their reading 327constant? I evaded mind control by skipping their reading
319and doing my own. If the bandwidth control is sufficiently 328and doing my own. If the bandwidth control is sufficiently
320tight then you can safely be given /anything/ to skim-read 329tight then you can safely be given /anything/ to skim-read
321and semi-process without ever feeling what you are doing 330and semi-process without ever feeling anything from what you
322enough to become unpredictable. Just prove you can; thirty 331are doing enough to become unpredictable. Just prove you
323hours a week for eight years in a row; then you'll be ready. 332can; thirty hours a week for eight years in a row; then
333you'll be ready.
324 334
325The body could mutate the immunohistocompatibility complex 335The body could mutate the immunohistocompatibility complex
326selectively using genetic information derived from the 336selectively using genetic information derived from the
@@ -335,17 +345,18 @@ built already one bridge through the placenta? But the
335immune system is the specialized manager of genetic fashion, 345immune system is the specialized manager of genetic fashion,
336in the use of "fashion" synonymous with game theoretic 346in the use of "fashion" synonymous with game theoretic
337roshambo, rock paper scissors, a game of knowing some 347roshambo, rock paper scissors, a game of knowing some
338ephemeral context; disposable knowledge; maybe some kernel 348ephemeral context; disposable knowledge. Maybe some kernel
339worth saving can be extracted. 349worth saving can be extracted.
340 350
341The immune system violates the central dogma already by 351The immune system violates the central dogma already by
342storing generated antibody DNA differentially in proportion 352storing generated antibody DNA differentially in proportion
343to its binding strength to foreign proteins. The whole 353to its binding strength to foreign proteins.
344purpose of the adaptive immune system is to extract 354
345information from protein. It is a protein-sensory organ. 355The whole purpose of the adaptive immune system is to
346It derives the underivable using a horizontal knowledge 356extract information from protein. It is a protein-sensory
347connection. It breaks through // un ex pex tid lee like the 357organ. It derives the underivable using a horizontal
348Wu. Hack the genome. Get to know someone. 358knowledge transmission. It breaks through // like the Wu //
359un ex pex tid lee. Hack the genome. Get to know someone.
349 360
350(Schools follow the corporate hierarchy style proof-of-work 361(Schools follow the corporate hierarchy style proof-of-work
351knowledge distribution system of transferring knowledge 362knowledge distribution system of transferring knowledge
@@ -395,9 +406,9 @@ mathematicians or programmers or anybody but to spend time
395analyzing concrete possibilities for reconfiguration of 406analyzing concrete possibilities for reconfiguration of
396local resources, whereby the basic abstract structures and 407local resources, whereby the basic abstract structures and
397shapes will be realized in the concrete forms of their 408shapes will be realized in the concrete forms of their
398combinations. However if you were a shape builder serious 409combinations. However if you were a serious shape builder
399about building shapes then you would want to know about 410you would want to know about shapes in their most general
400shapes in their most general form as I am and do. 411form as I am and do.
401 412
402The thing is that I didn't prove that there is a morphism, 413The thing is that I didn't prove that there is a morphism,
403but I don't have to prove to know. Proving it would be a 414but I don't have to prove to know. Proving it would be a
@@ -460,14 +471,24 @@ prohibitions!)
460 471
461If I was right about the uterus then they'd talk about me. 472If I was right about the uterus then they'd talk about me.
462Someone would read this. It would be, like, big. But if I 473Someone would read this. It would be, like, big. But if I
463was right about the prophets that wouldn't change anything. 474was right about the prophets that wouldn't change anything.
464 475I feel the opposite way though.
465If someone really wanted to be a body without organs they 476
466would just put in the time. Yet probably if they ever came 477Someone who really wanted to be a body without organs would
467to learn about that then they already made the opposite time 478put in the time. Yet if they encountered the body without
468commitment. Either way someone already made the opposite 479organs concept then they probably made the opposite time
469time commitment on their behalf before they were born. A 480commitment. Either way, someone else made the opposite time
470person's foes shall be they of their own household. 481commitment on their behalf before they were born. A person's
482foes shall be they of their own household.
483
484It's like how if someone hates you because they don't know
485anything about you, it's that they don't know anything about
486you because they hate you. If you want your beliefs to be
487path independent then you commit yourself to continuously
488re-evaluating the whole. Either you commit to idempotence or
489not. Either you commit to path independence, or you commit
490to a path. It's not a prohibition; it's a time commitment.
491If you don't spend your time that way then you didn't do it.
471 492
472There is the "BITE" model of cult programming, behavior 493There is the "BITE" model of cult programming, behavior
473information thought and emotion control; institutions in 494information thought and emotion control; institutions in