Check out today's packed Metacurity for the most critical infosec developments you should know, including
--Venezuela's state-run oil company PDVSA was hit by a cyberattack,
--Coupang's founder failed to show at parliamentary hearing,
--Vast majority of parked domains foist scams and malware,
--FTC orders Nomad to pay victims after hackers stole cryptocurrency,
--noyb alleges data exposure by TikTok, Grindr and AppFlyer,
--Hackers exploit critica…
A plant that looks like a fungus,
lives like a parasite,
and clones itself in the dark
—Balanophora may be one of evolution’s strangest experiments.
At the foot of moss-covered trees in the mountains of Taiwan and mainland Japan,
as well as within the subtropical forests of Okinawa,
an unusual organism emerges from the forest floor.
It is often mistaken for a mushroom,
yet it is actually a rare flowering plant that produces some of the smallest…
I think we can actually prove that this constraint is the *only* constraint that can preserve freedom:
1. There will exist actors in a system who will wish to take advantage of others. Evolution drives survival and one strategy for increasing survival in an altruistic society is to become a parasite.
2. Expecting exploitative dynamics, a system needs to have a set of rules to manage exploitation.
3. If the set of rules is static it will lack the requisite variety necessary to manage the infinite possible behavior of humans so the system will fail.
4. If the system is dynamic then it must have a rule set about how it's own rules are updated. This would make the system recursive, which makes the system at least as complex as mathematics. Any system at least as complex as mathematics is necessarily either incomplete or inconsistent (Gödel's incompleteness theorem). If the system is incomplete, then constraints can be evaded which then allow a malicious agent to seize control of the system and update the rules for their own benefit. If constraints are incomplete, then a malicious agent can take advantage of others within the system.
5. Therefore, no social system can possibly protect freedom unless there exists a single metasystemic constraint (that the system must be optional) allowing for the system to be abandoned when compromised.
Oh, you might say, but this just means you have to infinitely abandon systems. Sure, but there's an evolutionary advantage to cooperation so there's evolutionary pressure to *not* be a malicious actor. So a malicious actor being able to compromise the whole system is likely to be a much more rare event. Compromising a system is a lot of work, so the first thing a malicious actor would want to do is preserve that work. They would want to lock you in. The most important objective to a malicious actor compromising a system would be to violate that metasystemic constraint, or all of their work goes out the window when everyone leaves.
And now you understand why borders exist, why fascists are obsessed with maintaining categories like gender, race, ethnicity, etc. This is why even Democrats like Newsom are on board with putting houseless people in concentration camps. And this is why the most important thing anarchists promote is the ability to choose not to be part of any of that.
Optimal Treatment Rules under Missing Predictive Covariates: A Covariate-Balancing Doubly Robust Approach
Yue Zhang, Shanshan Luo, Zhi Geng, Yangbo He
https://arxiv.org/abs/2510.12321
CAMNet: Leveraging Cooperative Awareness Messages for Vehicle Trajectory Prediction
Mattia Grasselli, Angelo Porrello, Carlo Augusto Grazia
https://arxiv.org/abs/2510.12703 http…
Pooling Probabilistic Forecasts for Cooperative Wind Power Offering
Honglin Wen, Pierre Pinson
https://arxiv.org/abs/2510.12382 https://arxiv.org/pdf/2510.…
Cybersecurity AI: Humanoid Robots as Attack Vectors
V\'ictor Mayoral-Vilches
https://arxiv.org/abs/2509.14139 https://arxiv.org/pdf/2509.14139
Rudolf Rocker described anarcho-syndicalism as an economy rooted in local, autonomous unions, workers themselves organizing and coordinating production cooperatively, without bosses or capitalists.
#Anarchism #Syndicalism
Life is short, so check out today's Metacurity for a concise rundown of the most critical infosec developments you should know, including
--California sets global standards with new landmark AI and data privacy laws,
--UK highly significant cyberattacks jumped by 50% over the past year,
--Australian cyber incidents rose 11% over the past year,
--Ofcom fined 4chan under new online safety regime,
--Researchers eavesdropped on sensitive satellite comms,
--…
Homomorphic encryption schemes based on coding theory and polynomials
Giovanni Giuseppe Grimaldi
https://arxiv.org/abs/2509.13788 https://arxiv.org/pdf/250…