IRC channel logs

2020-09-15.log

back to list of logs

<Hagfish>well, if society were slightly better at aligning people's incentives with humanity's long term goals, then working on something like M3 would be "interesting" not least as a by-product of the piles of cash that would come with it :)
<Hagfish>of course, then you have the problem of attracting people to work on it who are solely motivated by the money, which isn't as healthy for the project (or the person doing the work)
<xentrac>money is just how we keep score
<OriansJ`>fossy: well yes, we must be fair here to each other and ourselves. also if we do things right keeping things working become really low effort.
<OriansJ`>Hagfish: we don't need society to do the alignment, just more than 1 individual out of 7billion willing to do minimal work. as right now most of my time is going to my full time job and caring for my son who isn't even a year old yet.
<OriansJ`>xentrac: how some people keep score, more often used as a token value of energy input or extracted from human effort.
<OriansJ`>eg more expensive products consumed more energy in their creation than cheaper products.
<xentrac>sometimes they do, but a Gucci T-shirt is made with the same energy input as a PyCon T-shirt
<fossy>hm can someone check my reasoning
<fossy>if i had an arduino with say 8kb of program storage area, and it filled up that program storage space and each of the operations were outputted in some way to the user and it was user-verifiable, would that mean that there is no attack surface for injecting malicious code into the code because the lack/presence/correctness/incorrectness of the ouput would not be verifiable?
<stikonas>fossy: what about hardware itself? It can inject malicious code too
<stikonas>you have to trust at least that...
<fossy>yeah, disregarding hardware
<stikonas>these days hardware is basically programmed and then compiled into logic gates
***ChanServ sets mode: +o rekado
***jelle is now known as jw
***jw is now known as jelle
<OriansJ`>xentrac: if you think of only the shirt itself and not the energy use of the people who recieve the funds from its sale and how they use that money.
<OriansJ`>fossy: verification methods in software can be overridden. If you want to know there is no way to inject malicious code, don't use RAM/FLASH storage but a ROM. Beat the bastards with physics
<OriansJ`>stikonas: is absolutely right about virtually all hardware is done in software these days. Just as was predicted in the original nexus intruder paper from 1958.
<Hagfish>"we don't need society to do the alignment, just more than 1 individual out of 7billion willing to do minimal work"
<Hagfish>i guess you could think of that as 6999999999 individual problems, but i think that society probably has a role in there somewhere
<yanmaani>would it make sense to split up the libc in 3 parts?
<yanmaani>one for stuff that can be done in pure C, e.g. strlen()
<yanmaani>one for stuff that's dependent on the underlying kernel, e.g. fwrite()
<yanmaani>one for stuff that's dependent on the host arch, e.g. longjmp()
<fossy>hm
<fossy>interesting idea
<fossy>I think that would make more sense when we have a better kernel
<fossy>bauen1: hey hows your kernel going?