Tootfinder

Opt-in global Mastodon full text search. Join the index!

No exact results. Similar results found.
@metacurity@infosec.exchange
2025-12-17 14:21:59

Check out today's packed Metacurity for the most critical infosec developments you should know, including
--Venezuela's state-run oil company PDVSA was hit by a cyberattack,
--Coupang's founder failed to show at parliamentary hearing,
--Vast majority of parked domains foist scams and malware,
--FTC orders Nomad to pay victims after hackers stole cryptocurrency,
--noyb alleges data exposure by TikTok, Grindr and AppFlyer,
--Hackers exploit critica…

A plant that looks like a fungus,
lives like a parasite,
and clones itself in the dark
—Balanophora may be one of evolution’s strangest experiments.
At the foot of moss-covered trees in the mountains of Taiwan and mainland Japan,
as well as within the subtropical forests of Okinawa,
an unusual organism emerges from the forest floor.
It is often mistaken for a mushroom,
yet it is actually a rare flowering plant that produces some of the smallest…

@hex@kolektiva.social
2025-11-17 06:11:16

I think we can actually prove that this constraint is the *only* constraint that can preserve freedom:
1. There will exist actors in a system who will wish to take advantage of others. Evolution drives survival and one strategy for increasing survival in an altruistic society is to become a parasite.
2. Expecting exploitative dynamics, a system needs to have a set of rules to manage exploitation.
3. If the set of rules is static it will lack the requisite variety necessary to manage the infinite possible behavior of humans so the system will fail.
4. If the system is dynamic then it must have a rule set about how it's own rules are updated. This would make the system recursive, which makes the system at least as complex as mathematics. Any system at least as complex as mathematics is necessarily either incomplete or inconsistent (Gödel's incompleteness theorem). If the system is incomplete, then constraints can be evaded which then allow a malicious agent to seize control of the system and update the rules for their own benefit. If constraints are incomplete, then a malicious agent can take advantage of others within the system.
5. Therefore, no social system can possibly protect freedom unless there exists a single metasystemic constraint (that the system must be optional) allowing for the system to be abandoned when compromised.
Oh, you might say, but this just means you have to infinitely abandon systems. Sure, but there's an evolutionary advantage to cooperation so there's evolutionary pressure to *not* be a malicious actor. So a malicious actor being able to compromise the whole system is likely to be a much more rare event. Compromising a system is a lot of work, so the first thing a malicious actor would want to do is preserve that work. They would want to lock you in. The most important objective to a malicious actor compromising a system would be to violate that metasystemic constraint, or all of their work goes out the window when everyone leaves.
And now you understand why borders exist, why fascists are obsessed with maintaining categories like gender, race, ethnicity, etc. This is why even Democrats like Newsom are on board with putting houseless people in concentration camps. And this is why the most important thing anarchists promote is the ability to choose not to be part of any of that.

@arXiv_statME_bot@mastoxiv.page
2025-10-15 09:38:52

Optimal Treatment Rules under Missing Predictive Covariates: A Covariate-Balancing Doubly Robust Approach
Yue Zhang, Shanshan Luo, Zhi Geng, Yangbo He
arxiv.org/abs/2510.12321

@arXiv_csAI_bot@mastoxiv.page
2025-10-15 10:23:11

CAMNet: Leveraging Cooperative Awareness Messages for Vehicle Trajectory Prediction
Mattia Grasselli, Angelo Porrello, Carlo Augusto Grazia
arxiv.org/abs/2510.12703

@arXiv_eessSY_bot@mastoxiv.page
2025-10-15 08:23:42

Pooling Probabilistic Forecasts for Cooperative Wind Power Offering
Honglin Wen, Pierre Pinson
arxiv.org/abs/2510.12382 arxiv.org/pdf/2510.…

@arXiv_csCR_bot@mastoxiv.page
2025-09-18 09:43:31

Cybersecurity AI: Humanoid Robots as Attack Vectors
V\'ictor Mayoral-Vilches
arxiv.org/abs/2509.14139 arxiv.org/pdf/2509.14139

@midtsveen@social.linux.pizza
2025-11-15 22:50:37

Rudolf Rocker described anarcho-syndicalism as an economy rooted in local, autonomous unions, workers themselves organizing and coordinating production cooperatively, without bosses or capitalists.
#Anarchism #Syndicalism

@metacurity@infosec.exchange
2025-10-14 13:04:02

Life is short, so check out today's Metacurity for a concise rundown of the most critical infosec developments you should know, including
--California sets global standards with new landmark AI and data privacy laws,
--UK highly significant cyberattacks jumped by 50% over the past year,
--Australian cyber incidents rose 11% over the past year,
--Ofcom fined 4chan under new online safety regime,
--Researchers eavesdropped on sensitive satellite comms,
--…

@arXiv_csCR_bot@mastoxiv.page
2025-09-18 09:24:01

Homomorphic encryption schemes based on coding theory and polynomials
Giovanni Giuseppe Grimaldi
arxiv.org/abs/2509.13788 arxiv.org/pdf/250…