72 Matching Annotations
  1. Last 7 days
    1. This system iteratively formulates scientific hypotheses, designs and executes experiments, analyzes and visualizes data, and autonomously authors scientific manuscripts.

      从「提出假设」到「撰写论文」的完整科研周期,由一个系统自主完成——这是人类有史以来第一次把「科学发现」这件事本身自动化。令人震惊的是,这不是某种特定任务的自动化(比如蛋白质折叠或围棋),而是「做科研这件事」的自动化。这意味着 AI 开始具备自我迭代、自我升级的能力——因为科研本身就是产生更强 AI 的途径之一。

  2. Nov 2025
  3. Mar 2025
    1. The goal of Lucia v3 was to be the easiest and cleanest way to implement database-backed sessions in your projects. It didn't have to be a library. I just assumed that a library will be the answer. But I ultimately came to conclusion that my assumption was wrong. I don't see this change as me abandoning the project. In fact, I think it's a step forward. If implementing sessions wasn't easy, I wouldn't be deprecating the package. But why wouldn't a library be the answer? It seems like a such an obvious answer. One word - database. I talked about how database adapters were a significant complexity tax to the library. I think a lot of people interpreted that as maintenance burden on myself. That's not wrong, but the bigger issue is how the adapters limit the API. Adapters always felt like a black box to me as both an end user and a maintainer. It's very hard to design something clean around it and makes everything clunky and fragile, especially when you need to deal with TypeScript shenanigans.
  4. Jan 2025
  5. Dec 2024
  6. Nov 2024
  7. Oct 2024
    1. for - rapid whole system change - Nafeez Ahmed - planetary phase shift - Nafeez Ahmed - planetary adaptive cycle - Nafeez Ahmed - essay - The End of Scarcity? From ‘Polycrisis’ to Planetary Phase Shift - Nafeez Ahmed - 2024 Oct 16 - to - book - The Ascent of Humanity - chapter 8 Self and Cosmos: The Gaian Birthing - stillborn and the perilous journey through the womb - Charles Eisenstein

      summary - This is a good article that makes sense of the inflection point that humanity now faces as it contends with multiple existential crisis - It summarizes the complexity of our polycrisis and its precarity and lays the theory for looking at the polycrisis from a different perspective: - as a planetary phase shift towards the potential end of scarcity and the next stage of our species evolution - Through the lens of ecologist Crawford Stanley Holling's lens of the adaptive cycle of ecological population dynamics, - and especially his 2004 paper "From Complex Regions to Complex Worlds" - Nafeez extends Holling's argument that we are undergoing a planetary adaptive cycle in which the back-loop is the dying industrial era. - In this sense, it is reminiscent of the writings of Charles Eisenstein in his book "The Ascent of Humanity", chapter 8: Self and Cosmos:, The Gaian Birth. - Eisenstein uses the the perilous journey of birth through the womb door as a metaphor of the transition we are currently undergoing.

      to - paper - From Complex Regions to Complex Worlds - Crawford Stanley Holling - 2004 - https://hyp.is/KYCm2pFrEe-_PEu84xshXw/www.ecologyandsociety.org/vol9/iss1/art11/main.html?ref=ageoftransformation.org - book - The Ascent of Humanity - Chapter 8 - The Gaian Birthing - Charles Eisenstein - https://hyp.is/r8scTpG_Ee-gLTujlli5hQ/charleseisenstein.org/books/the-ascent-of-humanity/eng/the-gaian-birthing/

    2. Culture as the ‘genetic code’ of the next leap

      for - article - The End of Scarcity? From ‘Polycrisis’ to Planetary Phase Shift - Nafeez Ahmed - gene-culture coevolution - adjacency - indyweb dev - individual / collective evolutionary learning - provenance - tracing the evolution of ideas - gene-culture coevolution

      adjacency - between - indyweb dev - individual / collective evolutionary learning - provenance - tracing the evolution of ideas - gene-culture coevolution - adjacency relationship - As DNA and epigenetics plays the role of transmitting biological adaptations, language and symmathesy play the role of transmitting cultural adaptations

    1. Adrian Poisson grew up studying science and math by day and art after hours beginning at the age of five

      for - Adrian Bejan - constructal law - childhood - art and science - from - The End of Scarcity? From ‘Polycrisis’ to Planetary Phase Shift - Nafeez Ahmed - 2024, Oct 16

      Summary - Good explainer video about constructal theory and flow

      from - The End of Scarcity? From ‘Polycrisis’ to Planetary Phase Shift - Nafeez Ahmed - 2024, Oct 16 - https://hyp.is/Qt8IMI74Ee--f4O18QMPFQ/ageoftransformation.org/the-end-of-scarcity-from-polycrisis-to-planetary-phase-shift/

  8. Sep 2024
  9. Jan 2024
    1. Some observers say law enforcement’sinvestigative capabilities may be outpaced by the speed oftechnological change, preventing investigators fromaccessing certain information they may otherwise beauthorized to obtain. Specifically, law enforcement officialscite strong, end-to-end encryption, or what they have calledwarrant-proof encryption, as preventing lawful access tocertain data.

      "warrant-proof" encryption

      Law enforcement's name for "end-to-end encryption"

  10. Nov 2023
  11. Mar 2023
    1. Value the process, rather than the product.

      Good writing is often about practices and process to arrive at an end product and not just the end product itself.

      Writing is a means to an end, but most don't have the means to begin with.

      Writing with a card index, zettelkasten, commonplace book or other related tools can dramatically help almost any writer because it provides them with a means from the start rather than facing a blank page and having to produce whole cloth in bulk.

  12. Nov 2021
  13. Aug 2021
    1. Zoom told its users that their video calls were end-to-end encrypted when actually they were protected by TLS encryption. Zoom generated and stored the keys to its users’ encrypted information on its servers rather than on its users’ devices, meaning anyone with access to those servers could monitor the unencrypted video and audio content of Zoom meetings. These servers are located around the world, often in countries where companies can be forced to share user data with law enforcement organizations. What’s worse is that, according to the most recent lawsuit, Zoom’s response made it clear that it “knew that it did not use the industry-accepted definition of E2E encryption and had made a conscious decision to use the term ‘end-to-end’ anyway”.
  14. Jun 2021
  15. Apr 2021
  16. Feb 2021
  17. Nov 2020
    1. People want to be able to choose which service they use to communicate with people. However, today if you want to message people on Facebook you have to use Messenger, on Instagram you have to use Direct, and on WhatsApp you have to use WhatsApp. We want to give people a choice so they can reach their friends across these networks from whichever app they prefer.We plan to start by making it possible for you to send messages to your contacts using any of our services, and then to extend that interoperability to SMS too. Of course, this would be opt-in and you will be able to keep your accounts separate if you'd like.

      Facebook plans to make messaging interoperable across Instagram, Facebook and Whatsapp. It will be opt-in.

  18. Oct 2020
    1. Form validation can get complex (synchronous validations, asynchronous validations, record validations, field validations, internationalization, schemas definitions...). To cope with these challenges we will leverage this into Fonk and Fonk Final Form adaptor for a React Final Form seamless integration.
    1. Mr Dutton will renew his attack on Facebook and other companies for moving to end-to-end encryption, saying it will hinder efforts to tackle online crime including child sexual abuse.This month, Australia joined its "Five-Eyes" intelligence partners – the United States, Britain, New Zealand and Canada – along with India and Japan, in signing a statement calling on tech companies to come up with a solution for law enforcement to access end-to-end encrypted messages.

      Countering child exploitation is an extremely important issue. It's a tough job and encryption makes it harder. But making encryption insecure is counter intuitive and has negative impacts on digital privacy. So poking a hole in encryption, while it can assist with countering child exploitation, can also inadvertently be helping, for example, tech-enabled domestic abuse.

      Hopefully DHA understands this and thus have thrown it back at the tech companies to come up with a solution for law enforcement.

  19. Sep 2020
  20. Jun 2020
    1. For a political body that devotes a lot of attention to national security, the implicit threat of revoking Section 230 protection from organizations that implement end-to-end encryption is both troubling and confusing. Signal is recommended by the United States military. It is routinely used by senators and their staff. American allies in the EU Commission are Signal users too. End-to-end encryption is fundamental to the safety, security, and privacy of conversations worldwide.
    2. The EARN IT act turns Section 230 protection into a hypocritical bargaining chip. At a high level, what the bill proposes is a system where companies have to earn Section 230 protection by following a set of designed-by-committee “best practices” that are extraordinarily unlikely to allow end-to-end encryption. Anyone who doesn’t comply with these recommendations will lose their Section 230 protection.
    1. On April 24, the U.S. National Security Agency published an advisory document on the security of popular messaging and video conferencing platforms. The NSA document “provides a snapshot of best practices,” it says, “coordinated with the Department of Homeland Security.” The NSA goes on to say that it “provides simple, actionable, considerations for individual government users—allowing its workforce to operate remotely using personal devices when deemed to be in the best interests of the health and welfare of its workforce and the nation.” Again somewhat awkwardly, the NSA awarded top marks to WhatsApp, Wickr and Signal, the three platforms that are the strongest advocates of end-to-end message encryption. Just to emphasize the point, the first criteria against which NSA marked the various platforms was, you guessed it, end-to-end encryption.
    2. While this debate has been raging for a year, the current “EARN-IT’ bill working its way through the U.S. legislative process is the biggest test yet for the survival of end-to-end encryption in its current form. In short, this would enforce best practices on the industry to “prevent, reduce and respond to” illicit material. There is no way they can do that without breaking their own encryption. QED.
    1. Just like Blackberry, WhatsApp has claimed that they are end to end encrypted but in fact that is not trueWhatsApp (and Blackberry) decrypt all your texts on their servers and they can read everything you say to anyone and everyoneThey (and Blackberry) then re-encrypt your messages, to send them to the recipient, so that your messages look like they were encrypted the entire time, when in fact they were not
  21. Nov 2019
  22. Sep 2018
  23. Sep 2017
    1. To live in the present is not to avoid hard work or strife. Alongside the projects that occupy you in your profession, or in your political life, the telic activities that matter to you, is the atelic process of protesting injustice or doing your job. To value the process is not to flee from work or political engagement. That is why living in the present is not an abdication of ethical responsibility or a recipe for detachment.
    2. To live in the present is not to deny the value of telic activities, of making a difference in the world. That would be a terrible mistake. Nor can we avoid engaging in such activities. But if projects are all we value, our lives become self-subversive, aimed at extinguishing the sources of meaning within them. To live in the present is to refuse the excessive investment in projects, in achievements and results, that sees no inherent value in the process.
    3. “If you are learning, you have not at the same time learned.” When you care about telic activities, projects such as writing a report, getting married or making dinner, satisfaction is always in the future or the past. It is yet to be achieved and then it is gone. Telic activities are exhaustible; in fact, they aim at their own exhaustion. They thus exhibit a peculiar self-subversion. In valuing and so pursuing these activities, we aim to complete them, and so to expel them from our lives.