As I was trying to explain the excitement of this number it occurred to me that I better understood how Douglas Hofstadter would remember his childhood feeling of disappointment in learning that a subscript like in , does not refer to something as interesting as exponentiation, like .
So what is the hyperoperation () beyond tetration ()? It is called “pentation”:
I think there is progress this year, but my opinion seems to depend on context of watching (phone, time of day, mood, etc…). Some of the bad ass moves don’t always impress.
Last year: https://wootcrisp.com/2018/03/28/two-year-mirror-dance-progress/
There is something incredibly satisfying about beating a corrupt system. I am currently posting this from behind a pay-for-use gateway at the Mexico City airport, connected to the internet using a DNS tunnel provided by an Android app called Slow DNS. All around the airport are signs saying “free wifi”, it just happens that this is a lie. There is no airport wifi, but there is “free wifi” available if you have an account with a telecom provider like Telcel. I do have an account with Telcel but was simply unable to have my credentials authorized. This is extra annoying because, 1) I ran out of data a few hours ago and, 2) I had to go to the airport early.
Frustrated, I tried to buy a drink at a bakery offering “free wifi” to customers, but was told that a drink would not be sufficient to elicit the password, and I certainly wasn’t going to pay Vancouver prices for a croissant. Fuming mad, I decided to try and use the Slow DNS app I downloaded last week as a stop gap measure until I have the time to get iodine installed on one of my servers. To my total shock it is actually working.
What is a DNS tunnel? For the lay person, it is sufficient to say that it is a way of stuffing normal internet traffic into the much more restricted little internet that allows you to access corporate pay-for-use gateway pages. More advanced readers might want to read a more detailed explanation here.
I have been looking for an excuse to do some DNS tunneling for almost 20 years and finally, finally, I have the tools and moral righteousness to do it.
It feels so good. You simply must try it for yourself. Just make sure the websites you visit are “https” and not “http”. I have no idea who runs Slow DNS and it’s best to assume you’re being watched.
Step-by-step guide to obtaining EOS *Assumes you already have some Ethereum. If not, it is easy enough to obtain, e.g., CoinSquare 1. Install EOS Lynx on your phone. This costs money, but you need money in your EOS wallet to do anything. 2. Export your EOS Lynx keys to your computer. 3. Download and setup Scatter desktop and Scatter browser plugin and import EOS Lynx private key. 4. Make an account on bancor.network, and install MetaMask browser plugin. Follow the directions in this video EXACTLY. In summary: A) Transfer Ethereum to BNT using MetaMask plugin on bancor.network (do no not use “Bancor wallet”), B) Transfer MetaMask Ethereum to MetaMask BNT using x.bancor.network, C) Transfer MetaMask BNT to EOS using eos.bancor.network You will not be able to buy EOS until you have enough EOS “staked” for CPU resources, which you can do using your Scatter desktop “Vault”. Great. So you can’t buy EOS until you have EOS. To solve this you’ll need to use “CPU Emergency“, fail, install Telegram, join the “CPU911” telegram group, and beg them to give your EOS account some CPU resources. Also note, that you require a balance in your ETH wallet on Bancor.network in order to process any transaction, even when not using that Ethereum balance in the transaction. 5. You now have EOS, but you should also attach your Scatter wallet to EOS Toolkit to vote for some block producers. Voting is important. I have voted for LiquidEOS using their custom application because Bancor deserves it, but spread your votes out.
- Agree on a strategy with trusted friends and family in advance.
- Keep location updated using a real time GPS tracking device or cell phone based GPS logger, and share the map with trusted contacts.
- Communicate using variations of names, places, contact information, and contact sequences. Examples: • Referring to your brother Jon as Jonathon could mean “duress = low”. • First contact made by emailing email@example.com could mean “location = unknown”.
- It is much easier to remember a location using what3words than it is to remember a GPS coordinate. These words will encode any location on earth within 3m2. For example, “skirt,shopper,computer“. How you would know these words and not be able to email for help, is a separate question.
- Phone apps that act as “dead man’s switches” can be used to trigger SMS messages containing notes and GPS coordinates, in the event that a notification is not responded to. The app I’ve been using was simple enough to setup and works as it should
, so long as the phone doesn’t go to sleep(see edit at bottom). An SMS message to a private security firm could instruct them to send a car to that location for a small fee.
Lin, F., Cho, K. W., Song, C., Xu, W., & Jin, Z. (2018). Brain Password. Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services – MobiSys ’18, 296–309. http://doi.org/10.1145/3210240.3210344
edit2: It took a while to figure out where this setting was stored: Apps & Notifications >> Apps >> Settings >> Special access >> Ignore battery optimization >> set apps you want don’t want “dozed” by Android’s sleep function, to “Allowed”.