• 0 Posts
  • 410 Comments
Joined 3 years ago
cake
Cake day: June 11th, 2023

help-circle
  • You’re more right than you might have expected, but not because it’s a fallacy or misleading. You noticed something important in how it all works: time is a dimension, but it doesn’t act like “up” or “forwards”.
    This doesn’t make it less of a dimension or a hindrance to understanding, it’s an observation that leads to: there are different types of dimensions.
    Typically called time like and space like, they can also be thought of as “one directional” and “two directional”, although a physicist somewhere is (correctly) coughing politely and glaring at some of the shit photons get up to at the thought of one directional time.

    You’re thinking of time as a parameter, which is how it is in classical mechanics. It’s a different category of thing, but it technically makes the system 4d.
    When you start looking at how light moves and relativity you find that you actually need time to act much more like another direction because it no longer defined an order or sequence, and you get stuff like “time slows down when move faster in space because acceleration shifts your movement vector in space time”.

    It’s even simpler in math, because a dimension is simply a number required to specify a point in a space. If you cared to you could use “left” as your parameter and talk about how a thrown ball changes position in time, up, and forward as a function of left.
    Then you could do some real math and use that function as a point in some space and talk about how the different components are different dimensional aspects of the infinite dimensional polynomial function space.


  • A dimension is “simply” a direction that can be changed without changing any of the other directions.
    What people often mean is a spatial dimension in “normal” geometry, where “up” is independent from “left” and “forward”.

    A square is a two dimensional shape. It can have points on it specified in two coordinates.
    When you hold a block, you’re holding a 3 dimensional shape. It takes 3 coordinates to specify a point in it.
    When you draw a 3d cube, you’re drawing the 2d “shadow”, or projection, of that 3d shape into 2d.

    A tesseract has the same relationship with a cube as the cube has to the square. What we often see represented is the 2d shadow of the 3d shadow of the 4d object.
    On it’s own it doesn’t tell you much about the shape. What tells you more is seeing how the lines and points change as you rotate in 4d.

    https://www.geogebra.org/m/mzycqzgt

    This seems like a fine little tool for seeing stuff.

    The 3d shadow of the tesseract isn’t the tesseract though. We can’t actually see them, only the shadow. Thinking hard and looking at the shadows changes as we move the 4d points can let’s us intuit how they work though.


  • Whoah, I never said I wasn’t interested in the exchange, only that I wasn’t interested in the topic.
    As someone who’s extremely insistent that it’s grossly improper to make any form of inferences beyond what is literally stated, I’m shocked you would make such a leap!

    I think you’re persistently confusing me with someone else. I perfectly understand your point, and have never had any doubt about what you intended to say. I never even disagreed with you on the topic.
    I clarified someone else’s point to you, and you started explaining to me how they made unreasonable assumptions, which is what I disappeared with.

    Intellectual property laws apply to open and closed source software and developers equally. When you make a statement about legal culpability for an action by one group, it makes sense to assume that statement applies to the other because in the eyes of the law and most people people in context there’s no distinction between them.

    No one is unclear that you were only referring to one group anymore. That’s abundantly clear.

    My point is that you’re being overly defensive about someone else making a normal assumption about the logic behind your argument. And you’re directing that defensiveness at someone who never even made that assumption.










  • I don’t love an abstract legal identity. I’m capable of being happy with institutions, the culture composed if the people living there, and adoring the natural splendor.
    Right now I’m actively angry at the institutions, a huge number of people have taken a sharp turn towards fascism, and I’ve got no problems with the forest still.
    Me and the forest are cool, and that’s part of why I’m mad at the institutions.

    I have no desire to live in the forest because, if nothing else, that’s not good for the forest. Then the people who opted to live there became insane, and decided to largely gut all of the institutions, and make it easier to destroy the forest.

    “I live in a state of natural splendor, and I’m willing to fight to let you cut it down, splash me with mercury , and blot out the sun with smoke because I don’t have healthcare and fuck you for asking. It’s the refugees who are the problem”.




  • It can totally be fine for your needs, and secure while it does so, and not be two factors.

    It’s a question of what’s required for access. In this case, they would need your password and to have had some manner of device access at some point to steal the value used by 1password to verify you at one point had the secret key. Someone with a keylogger from a random untargeted malware infection could plausibly get sufficient information. It’s really good 1 factor.

    To be two factor there would need to be a requirement for two factors to be demonstrated at auth time. For example, if 1password encrypted the passkeys in such a way that the passkey could not ever leave the device, like via certain types of hardware backed key storage, then unlocking the vault is proof of something you know, and the usage of the signature is proof you have the chip.
    The trickery comes about in the techniques available to move the passkey between encrypted hardware devices without it ever being exposed or loosing the “device you control” assurances.

    For the record, I use 1password. Just not for passkeys on desktop. I prefer the Bluetooth connection to my phone, since phones currently do a much better job providing uniform targets for what’s needed to provide the proper two factor for something like passkeys.


  • … How if flying a spaceship different from driving a car? They’re both controlled applications of kinetic energy to move people or objects.

    At the end of the day, it’s all a pile of transistors and the only thing that is of import is the intent behind usage.

    In one case it’s saying you can use a neural net to take something rendered at resolution A/4 and make it visually indistinguishable from the same render at resolution A.
    The other is rendering something and radically changing the artistic or visual style.

    Upsampling can be replicated within some margin by lowering framerate and letting the GPU work longer on each frame. It strives to restore detail left out from working quicker by guessing.
    You cannot turn this feature off and get similar results by lowering the frame rate. It aims to add detail that was never present by guessing.

    Upsampling methods have been produced that don’t use neural networks. The differences in behavior are in the realm of efficiency, and in many cases you would be hard pressed to tell which is which. The neural network is an implementation detail.
    In the other case, the changes are more broad than can be captured by non AI techniques easily. The generative capabilities are central to the feature.

    Process matters, but zooming out too far makes everything identical, and the intent matters too. “I want to see your art better” as opposed to “I want to make your art better”.




  • My passkeys are tied to my phone, which I use via the browser and OS. I keep them in my password manager running on the phone. My password manager supports the open spec for securely migrating credentials between vendors.

    It may be difficult to believe but they want you to use them because they’re legitimately significantly better.

    Users are silly. They blame Microsoft for bad passwords. They blame Google for forgotten passwords. They blame Facebook when they click on a phishing link. They blame apple when apple “lets” someone who they gave their password to see their pictures. They blame apple when they don’t let the user in just because they forgot their password and every recovery mechanism.

    Everyone involved has a significant issue with passwords because they cost them user satisfaction, credibility, or money directly. The reason cross vendor transfer has been slow is because everyone wants to be the leader, since if everyone follows your lead you get to make it work better with your stuff.