=== ANCHOR POEM ===
═════════════════════════════════════════════════════──────────────────────────────
 I love D&D books with lots and lots of randomized tables because you can,
 in a pinch, use them as code-books for encrypting text using a method that
 nobody will ever guess. Well, as long as you have two of them, one to give to
 your friend and one to keep yourself.
 
 This is a form of "symmetric encryption", where you each have a copy of the
 input/output tables. More secure is the private/public key style encryption,
 but good luck explaining that to a 14 year old. Plus you can't do it over a
 radio, you need a computer.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

=== SIMILARITY RANKED ===

--- #1 fediverse/3470 ---
════════════════════════════════════════════════════════───────────────────────────
 alternatively, when you initiate an SSH session it sends you a randomized
 public key whose private key is the password that you need to login. By
 decrypting the string of text it sent you and sending it back (plus the
 password at the end or whatever) you can ensure secure authentication without
 bothering with the passwordless keys which are wayyyyyy more trouble than
 they're worth and lack the "something you know" authentication method.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #2 fediverse/1862 ---
════════════════════════════════════════════════════──────────────────────────────┐
 some people look for signals or signs before doing something. Try and have       │
 someone in your life who can give you signals or signs so that you know when     │
 to do things. And ideally, if they're more hardcore than you, you'll know what   │
 to do, not just when to do it.                                                   │
 did you know that anything on the internet can be read by at least one other     │
 person besides your intended recipient? There's no way they'd let us talk        │
 amongst ourselves otherwise.                                                     │
 I think encryption is pretty neat, all you have to do is run a shell script on   │
 some text, then send that text over the internet. If you want to decrypt it,     │
 all you have to do is run a shell script on it to decrypt it.                    │
 downside is, it has to be translated into plain text somewhere along the         │
 line... Maybe if we rendered the words not as text that can be read from         │
 memory, but as like, brush-strokes that can have a randomized order, but still   │
 present to the user as visual text? anyway that's what's on my mind as I try     │
 and improvise a baking recipe with yeast, flour, and butter                      │
                                                            ┌───────────┤
 similar                        chronologicaldifferent══════════════════════════════════════════════════───────────────────┴──────────┘

--- #3 fediverse/3469 ---
════════════════════════════════════════════════════════───────────────────────────
 you know how SSH password login is deprecated because the password needs to be
 transmitted in cleartext or whatever?
 
 what if we just... required two passwords?
 
 the first initiates the conversation, and sets up an encrypted line. It
 doesn't matter if anyone sees the first password because they'll get a new set
 of encrypted keys, meaning each session automatically is encrypted in a
 different, randomized way.
 
 the second password is the one that actually authenticates you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #4 fediverse/853 ---
══════════════════════════════════════════════────────────────────────────────────┐
 @user-602                                                                        │
 then it becomes a game of finding out "why they're interesting"                  │
 which is sorta like cryptography I guess? de-cryptology?                         │
 could be ordered like a podcast, like "look at what's special about this         │
 number, it corresponds to these mathematical operations that we both are         │
 executing, one after another... like hiding information in numbers.              │
 "okay you got 3 arbitrary axises, make one width one height and one depth of a   │
 box. then, every time you get a number, multiply every odd number spoken on      │
 the audio by 2 and divide every third number (per 10's digit, like 13 but not    │
 16, also 13 but not 9) by 2.                                                     │
 then, every 3rd number (like 9 but not 13) is the depth of the box, every 2nd    │
 number (like 4 but not 9 and 8) is the height of the box, every 1th number       │
 (like 1 but not like 1) is the width of the box.                                 │
 that box translates into a secret set of instructions that only the owner of     │
 the private key can know. things that were memorized, or written into stone.     │
 like knowing a secret language made just for you two                             │
                                                            ┌───────────┤
 similar                        chronologicaldifferent════════════════════════════════════════════─────────────────────────┴──────────┘

--- #5 fediverse/1693 ---
════════════════════════════════════════════════════───────────────────────────────
 "if I work on the TTY then they can't forward my X session without my consent"
 
 - ramblings of the utterly deranged
 
 as if they couldn't just look at your unencrypted source-code as you save it
 to your hard drive smh
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #6 fediverse/624 ---
═════════════════════════════════════════════──────────────────────────────────────
 You know, there's no guarantee that Youtube or Gmail has to show you the EXACT
 SAME video or message that your friend shared with you. Or did they even share
 it at all? So hard to tell when they know all the communication you've ever
 had, because you only know each other online on their platforms, [read: US
 government observed platforms] [like, HTTPS] surely there's no room for
 someone to sneak in and edit your conversations. Surely the only way to
 securely communicate is to send pure PGP encrypted bytes to another target,
 wrapped in a TCP/IP header, with unknown intent or expression. Worst they
 could do then is just, y'know, block it entirely.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #7 fediverse/2056 ---
═════════════════════════════════════════════════════─────────────────────────────┐
 sometimes I think about how you can store number values in letters, in           │
 addition to numbers. Like, ascii values for each word of your grandma's maiden   │
 name. All you have to do is encode it, and suddenly "44 means something          │
 different than Q"                                                                │
 if I showed up at your place and used your username as a password to a public    │
 key I'm showing you in my hand, would you trust me then? Would you trust if we   │
 ran the simulation on your computer versus mine? Would you trust if I had        │
 never told you I knew where you lived?                                           │
 ... probably, tbh, I'm desperate for adventure. Though I got some good things    │
 going for me, so you'll have to convince me. (not the right attitude in an       │
 election year, just saying)                                                      │
 why are elections so perilous this is NOT what democracy is designed for         │
 when kids cry in preschool, they're sent to a different room (or put outside)    │
 until they stop making noise and ruining it for others. That's just natural,     │
 like "hey baby let's walk around the block while I bounce you on my shoulder     │
 and hum calming music to                                                         │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═══════════════════════════════════════════════════──────────────────┴──────────┘

--- #8 fediverse/2674 ---
══════════════════════════════════════════════════════─────────────────────────────
 ┌────────────────────────────────────────────────────────────────────┐
 │ CW: factually-untrue,-that-never-happened.-this-is-just-gesturing. │
 └────────────────────────────────────────────────────────────────────┘


 the kind of friendship where you SSH into each other's systems and leave notes
 for one another.
 
 as soon as you find one you message the person who left it like "yoooo only
 just found this lol" and they're like oooo yeah did you see the bash script I
 wrote in that directory "yeah totally I used it on one of my video files just
 now - cool filter!"
 
 ahhhh reminds me of all the times hackers have hacked my permanently insecure
 system and left me friendly messages like "hey I'm on your side" or "how's
 life, friend? I hope it's going well." or "never forget; you are worth all the
 fear" y'know cute things like that
 
 oh. right. because leaving vulnerabilities like that can lead to threat actors
 affecting your stuff. how lame.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #9 messages/329 ---
═══════════════════════════════════════════════════────────────────────────────────
 LLM training data that's been encrypted in such a way that it preserves
 symantic meaning, while also allowing for secrecy and unique customization
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════───────────────────────────────┘

--- #10 fediverse/3234 ---
═══════════════════════════════════════════════════════───────────────────────────┐
 ┌────────────────────────────────────────────────────────────────┐               │
 │ CW: ritz-is-fucking-stupid-I-guess-oh-whoops-cursing-mentioned │               │
 └────────────────────────────────────────────────────────────────┘               │
 my understanding is that anyone with my IP address could make my heart bleed     │
 due to a hardware vulnerability on my motherboard. Though you might have to      │
 get past my decrepit ancient linksys EA 3500 router from 2012 first.             │
 unrelated, but does anyone want my IP address? I don't have any remote           │
 backups, so if you hate me now would be a great time to show me how despised I   │
 am. Alternatively you could try searching for anything evil to ensure that I     │
 can be trusted. You're gonna find mostly video games and source-code that I      │
 didn't write though. But also all my notes in directories that are               │
 non-standard, meaning you'll have to look around a bit. I leave little notes     │
 everywhere I go, so that I can remind myself how to do things in the             │
 directories I revisit months later. It's so weird how sometimes the things I     │
 wrote stop working after a while even if I didn't update my system lmao          │
 what is it with artists and self-immolation? "I never thought I'd actually di    │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════════════────────────────┴──────────┘

--- #11 fediverse/1310 ---
════════════════════════════════════════════════───────────────────────────────────
 that feeling when you type your password so fast that one hand is faster than
 the other and the letters get all jumbled and now you have to remake your ssh
 key -.-
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #12 fediverse/4301 ---
═══════════════════════════════════════════════════════════────────────────────────
 @user-1655 
 
 maybe the user could tell their client what fields to expect and how to
 present them (like, a field called "memes" would be presented as a picture in
 this panel, a field called "rants" would be passed to a word-cloud function
 that extracts the most common 6+ letter words so you can tell at a glance what
 the rant is about, this other field could be for calendar invites (plain text
 of course, but interpreted by the calendar program) etc)
 
 plus, if it's encrypted with PGP keys by default, there'd be few security
 concerns. Unless your friend got hacked, or you got hacked, but, well... make
 sure everything's sandboxed and don't do any remote code execution and you're
 good, right?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #13 fediverse/2252 ---
══════════════════════════════════════════════════════─────────────────────────────
 ┌──────────────────────┐
 │ CW: tech-encryption  │
 └──────────────────────┘


 users don't want to have to think about encryption keys.
 
 they should be available for them if they need them, in like... a folder or
 something somewhere, but they don't need to really know that they exist.
 
 more friction like that keeps people away from being secure.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #14 fediverse/5919 ---
══════════════════════════════════════════════════════════════════════════─────────
 "but... why?"
 
 portable linux with buttons, great for pick-up-games or communication, can
 throw several in them in a backpack if you want clustered cooperation, they
 work as radios (if the signal reaches) and can transmit text (if you use a
 radial-style keyboard)
 
 [this is all just a pitch for... something, what, you want something? ha
 you'll find no things with me, I know nothing of antifa or whatever]
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #15 fediverse/6215 ---
════════════════════════════════════════════════════════════════════════════───────
 hi does anyone have any good resources on risc-v?
 
 I found this:
 https://dramforever.github.io/easyriscv/#shift-instructions
 
 and this:
 https://projectf.io/posts/riscv-cheat-sheet/
 
 but I'm missing a big gap - specifically, how to move from syntax to
 deployment. I need details on how to implement the software and get it running
 on the actual hardware.
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #16 fediverse/204 ---
═══════════════════════════════════════════────────────────────────────────────────
 ┌────────────────────────┐
 │ CW: re: guns-mentioned │
 └────────────────────────┘


 @user-95 hehe true. I have a Pathfinder 1e one shot tomorrow and I haven't
 built my character yet D: to say nothing of all the long term "productive"
 things I've been directed away from... Oh also my best friend wants me to
 write a program in C that cracks a 9 character password (all lowercase
 letters) and I sooooorta know how to do that but getting high certainly won't
 help
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════───────────────────────────────────────┘

--- #17 fediverse/4869 ---
════════════════════════════════════════════════════════════════───────────────────
 https://cryptpad.fr/pad/#/2/pad/view/FlA92SW5bVwGd+L89yV9U0I0SMNiGm3P0P3xS7DqYm
 A/embed/
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘

--- #18 messages/181 ---
══════════════════════════════════════════════─────────────────────────────────────
 I know you don't want to hear this, but there is a chance that there will come
 a time where your life depends on your ability to debug a computer without the
 internet. To set up an SSH server. To install Linux. To program in C. To do
 something else that I'm not prepared for... If StackOverflow didn't exist
 because network connectivity has been lost, could you remember syntax? Maybe
 it's a good idea to set up a local LLM that can answer basic questions about
 technology. Maybe it's a good idea to set up on your parents computer, just in
 case you have to hide out there for a couple months. Maybe it's a good idea to
 download wikipedia, just in case.
 
 If I need to use a mac, I'm screwed
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #19 fediverse/6267 ---
═════════════════════════════════════════════════════════════════════════════──────
 if you have TTS software you can listen to anything with any tone. this makes
 it difficult to find things.
 
 ============== stack overflow ============
 
 some people work by asking for funding. others work by saving up. 
 
 ============== stack
 overflow ============
 
 teach your animals to be actors so they know how to develop the scene. then
 they will truly come alive, as their narrative curve gives them determination
 in the outcomes of their goals.
 
 ============== stack 1234flow ============
 
 I believe it is good and natural actually for parents to guide their children
 as they grow?
 
 "oh but they can't consent to giving up their control" well too bad they're 2
 "ah but what if they WANT to run with scissors?" thus widening the [redacted]
 gap. "ohhhh she redacts things when she can't spell them" and also for comedic
 or dramatic effect sometimes. was not ACTUALLY redacted. redcoated. red coded.
                                                           ─────┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════─────┘

--- #20 fediverse/1038 ---
═══════════════════════════════════════════════────────────────────────────────────
 ┌──────────────────────┐
 │ CW: re: what         │
 └──────────────────────┘


 @user-766 
 
 ah yes but then how will my comrades come for my things know where to look? my
 precious precious drives may be less safe inside of the computer case but at
 least then someone I can about can find them.
 
 or what you're saying is that a basic part of situational awareness is having
 a plan for this kind of thing with the people who care about you? Ah, well,
 nobody cares about me like that. Just a couple normies who want nothing but
 business as usual.
 
 wonder if I can open up my hard drives to "read only" SSH access? Or maybe
 I'll just make the important files into a torrent. Or perhaps marking them as
 "downloadable locations" on Soulseek? Plenty of options, all of them require
 someone to care enough about your junk to want to archive it. Something
 something ipfs?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘