Though perhaps not presented in the most rigorous format, Neatoramanaut Rob Manuel does offer a rather compelling and intuitive argument regarding the strictures of time-travel—wherein a back- to-the-future scenario plays out more like being visited by the Ghost of Christmas Past with one being unable to interact or change history in any way.
Thursday, 22 October 2015
temporal excursions
5x5: halloween edition
monster parade: ghoulish GIFs for thirty-one days of horror
psychopomp: high-fidelity hardware that aided mediums during sรฉances
a costume, not a culture: just because one can append the word sexy does not mean it’s a good idea for dress-up
revue: from Atlas Obscura’s crypt, an archived celebration of the season
catagories: ๐, ๐, ๐ง , antiques, myth and monsters
Wednesday, 21 October 2015
the hunting of the snark
First sighted and described through second- or third-hand accounts in the third century BC, the unicorn—or monoceros was for centuries embellished with the rich lore of mythology, though this legendary creature had no truck with myths and heroes as it was believed to be very much part of the animal kingdom, though cryptic and elusive. The creature even figured, in its classic form, in the ancient iconography of India, whence the original came. Being unable to observe the shy creature in its natural habitat and unable to produce a specimen, big-fish stories circulated of the fierce and violent steed, who might only be tamed in the presence of a virgin—apparently also a a rare beast that couldn’t just be left in some forest as bait, what with dragons to be appeased.
bug bounty
Boing Boing, via Ars Technicia, has an interesting primer for the zero-day market, which the industry and regime-appointed czars are reluctant to address or even acknowledge.
A “zero-day” is a software vulnerability, identified by hackers but not publicly disclosed nor yet exploited, which is sold to the highest bidder—which is often a competitor but increasing includes zealous or repressive governments hoping to shore up a munitions’ dump that’s basically a kill-switch (or back-door) for the internet—on the tenuous promise that the discoverers won’t reveal the security weakness or act on it for their own benefit, and hence the name because communications platforms and companies that manage the underlying architecture of the internet would have no time to react or patch the fault, the bugs once it comes to light. This brisk, underground market represents a huge, welling threat with more than speculation becoming a commodity but the actual means of offense and defense. In their naรฏvety, governments are fueling this trafficking by hoping to preserve a systemic integrity but end up diluting everything in the process.
catagories: ๐ฅธ, networking and blogging