Friday, December 19, 2014

[qjygvban] Greatest chess tournament

The greatest chess players in history each get time travel teleported from their prime all into one place, given some time to study up on the latest theory, then rumble in the greatest chess tournament of all time.  Rather than debate who would win on objective grounds, who winning would make for a good story?

Morphy wins, revealing that no one during his career had ever pushed him to play at his true strength.

Rather than one of the big name personalities winning, someone often described as having a "universal" style wins, being able to best handle the varied opposition.  Spassky or Anand.  Spassky en route gets his revenge on Fischer, living up to Fischer's description of Spassky as the one opponent Fischer couldn't completely break on his world championship run.

Someone who was never a world champion wins, revealing that becoming world champion requires more than just chess skill, also political savvy and other social things.  Ivanchuk.

Fischer and Capablanca mutually agree to play their games as shuffle chess.  Who else joins them?

Someone from the far future wins, defeating even the strongest computer players entered into the tournament.  Today's dominance of computer programs is revealed to be just a passing fad; future players have learned to beat them, and in so doing also raised chess ability far beyond what humans and computers have played up til now.

Thursday, December 18, 2014

[aygtucpd] ASCII SHA1 hashes

Continuing searching for strings whose SHA-1 hashes are printable ASCII characters (32 - 126):

Lowercase letters. A list of "precursor" strings (in order of the Perl .. operator) with increasing amounts of initial printable characters: a b c d eh hs iu ld le xj aid aiv awf ayi cho cqs ddn djv fzg idd ajcs iehl jsrx nzpn ahdjp bttgp dbxjn hmgtk ysxzg ajjvot

sha1(amnfcm)  = ~xv^p &K6ceIDY p=8R^
sha1(bnysxon) = ZO>y}B>^(.ceEBT^wv5 
sha1(fchavmw) = FA8J2_"kRad}9D[[MN#2
sha1(gbthjvr) = 73#3+2f5Y6aD5ron;fU=
sha1(gmwudxl) = !m#rYp+L7-e")iy|qA,&
sha1(hnxesmg) = S3+OnkW'|p~="9V;fUPT
sha1(hnzbkum) = 0.M,t=:'7X:je~Nd8#?g
sha1(igsjuwr) = [WqU_=a4|eCrgf(Jl>I7
sha1(lbkdfey) = X@Hni N3?U+Nx}w}e)Ez
sha1(lfniqzi) = ?\dii3|M]%+B}fdWcnxc
sha1(mahwebw) = KiI'ee!{sB*yUvx$7mDo
sha1(pmbjmdy) = 64_grTzHQ\$:]XrdGwuZ
sha1(pzzkwrb) = bQdf*w|cm%/x:-63io}B
sha1(qnetntk) = ZIah/&1uS,OXeM}@7NN2
sha1(qszanmi) = r%ZI.4r`M=?35:^G^me"
sha1(rgfxrdy) = f<,&6F`lrL0?J|Z#d.3I
sha1(tnqjhtz) = x06h<\mv*&w&#mM:N~/k
sha1(ybrwnqd) = ;h\g1C'3 [?[$7~TkF1W
Searched through zzzzzzz.

Uppercase. Precursors A C D H J BE BJ BK BW DA DQ FB FL GE RR AZZ BYM CEB CGY FZQ ICT LBS LUX OCW CGCS LTON AFQRP ATRRF AULCC JJAWH LNPTI WOLIG ZNAXD ADSLEJ CYRRGH FHFDMA JSGBDL KQHXFP PLMJYL PUKTVW WPBGEO AFSBCYE AUGGWEY BSYRJPZ CDWMMDU CETQLMG

sha1(CFLYBZU) = |o;`xs2AXPlYkK>an%SF
sha1(CVAYIPF) = #B(5}[jv8=fzQJ0n#@@=
sha1(CYAJPWH) = 3]PTzqXAsQyhG,igx=t0
sha1(GTKKQWF) = jG<qFRWu!%o:[E\R@yWN
sha1(HQTYAYR) = Uw]DJj]S ?M+U1mUDp<Q
sha1(HUAECDB) = `R4b<+j5{5Lo8sY)$9gd
sha1(JGCHORR) = MFuJnF7_q~?^8zm^^qOL
sha1(LGOORUT) = (;,H#5#[-3Lk>II2`Z=a
sha1(NDKZCZW) = cvYEjd|cHAG{xN%npj{9
sha1(NIWNYCR) = 3aim:@KU9zj7bE<O).P*
sha1(PCENOVK) = jX.Lb")lY]=5-6oIg'?}
sha1(QQEFASJ) = Lw*Uyy=T+53%nx/KLLrf
sha1(SUKBZXQ) = "7zk=rartFnt+ kT>t|L
sha1(TJAVGEZ) = 4Rqn)3$*oG#3C9W^V&3A
sha1(URWBRYZ) = K]IxfNYlhVEqH(+1(j&p
sha1(UWNGKLB) = 2Z(vPE 5|]{]~P8:G|"?
sha1(UWSYIDE) = 41"IQc](I6L/1"(o [k/
sha1(VBFTUYJ) = 5?gB+SGs7uV=90ih?Vo*
sha1(WJWQZJJ) = Ey_KTPk~Rsb"AU]b/W-i
sha1(WLJMEUS) = {L&fH)?a>>Y$vu7YL&mm
sha1(WXALHME) = E-b5hnn(6b%g%?*7-?.q
sha1(YBRSPGH) = w}K#`aLoen)"-?u:|4pw
Searched through ZZZZZZZ.

Numbers. Precursors 0 1 12 21 31 110 1089 1179 1421 1556 2180 2516 2954 3383 5305 5680 9072 46486 4461429 10252084 23033745 43350309 49984651 61976690 154860606 247984552 329176834 555085459

sha1(725529657)  = &0&RPd`'<iH,Qnv^c>wF
sha1(726965747)  = vzc6Gc^C3NbPoI]tPmte
sha1(1116784247) = N3ERjxMSGw&b}>DX}~<{
sha1(1852774851) = q;qrbye9;X/P_A(5e7hU
sha1(2459018043) = 56O=C\~LD6vXqY{T7naP
sha1(2478396027) = & lZx%8.F%y7&[/S='%<
sha1(2478396027) = & lZx%8.F%y7&[/S='%<
sha1(3381281522) = O:W=iQJiBqzgzot>e*qk
sha1(3455290614) = yj?St^xw'j;Y|%{,FGon
sha1(3689774324) = |09Rx'O'8|:ED @v\JpP
sha1(3698148741) = zf^?*L_iyBmvo0,=Ll1H
sha1(4390543775) = q<5a-nJ-_o!6^M6W>3q6
sha1(5513403691) = :J]+!%EA2^D&yQ:nXNe6
sha1(5636663664) = ^~F>l$/J+L ^Y2OW&"E3
sha1(5781514712) = A14_^<~8e:iw}Ob:#H)B
sha1(5959827959) = 7J,F@>FPF!#~Wt{)Dd\z
sha1(5978526183) = ]NfwLpEPk[/e7oNM\ySs
sha1(6534193371) = q]yCueov ]]}6&f)qS}q
sha1(6667496730) = xO`eikYm3!Aj,+Z}`N.8
sha1(6767529900) = a~ID6EJX7};Wz4oNL)/"
sha1(7380863121) = N]xHu/J41i/0ZI_[z"p;
sha1(7469578409) = .aL|_R-4><`=uo}%oSo$
sha1(7653401165) = V}F|R!,.Cu8$kkGX0o"l
sha1(8092298456) = f.3Li*w5c~1AjVpVzz`h
sha1(8134339042) = &4MpH,`)!W+&sNH?'bw~
sha1(8923923479) = |r5hp4M3/< TwXjj5F=1
sha1(9219720635) = @f-I3$p+|V'0Wm^HVF*}
sha1(9796787641) = >*kK>}[Hkf]@:``Y[_Mq
Searched through 9999999999.

perl -lw -MDigest::SHA=sha1 -e 'print sha1("amnfcm")'

[lvhbscma] Medium algorithms

Integer factorization and graph isomorphism are two common problems for which the best running time algorithm is not known for sure, and more and more complex algorithms achieve better and better running time.  This combination of features seems to create a psychological barrier to including some implementation of such algorithms in a standard library.  This is a shame because the there are algorithms that are barely super polynomial or work well for small instances.

Tuesday, December 16, 2014

[oizedxmo] State boundaries by travel distance

Partition a region into N smaller regions minimizing the norm of a function F evaluated on each region.

Norm could be maximum, L-infinity norm.

F could be the radius of the circumcircle of the region.  The center would be a good place to put the state capital.

Radius of the smallest circle which covers 90% of the area of the region.  Or of the population.

The maximum distance between any two points in the region.

The same measures could be asked of partitioning a graph: the travel time graph formed by the network of roads, using graph centers and graph diameters.  This will capture physical barriers across which travel is slow.

Unlike redistricting, there is no constraint of equal population nor equal area.  The idea is a political region is defined by people moving around (or being able to move around) in it.  If using the road graph, states will probably reflect the location of highways.  Large chunks of the east coast might merge.

Monday, December 15, 2014

[fuswzhsd] Government layers

How many layers should a government have?  Currently usually national, state, county, city.

Is there a principled way to answer this question?  What powers should be assigned to each layer?

Federalism wants the things that personally affect you to not be distant government.

[bxogtrqk] Easy sliding blocks

Create a sliding blocks app that is more meditative than a puzzle: all identical unit blocks, no goal.  Sliding blocks of course works well for touchscreens.

Choose arbitrary dimensions and number of empty spaces.  Color the blocks all different or all the same.

[lcqwaqmg] Middle class

Correlate feature 1 of individuals in a population against feature 2.  Interesting is when the plot is not monotonic, e.g., forms a U or bell shape.  The extremes are more similar than the middle.

When does this happen in society?

The upper classes feel secure in their position in society; the lower classes are resigned to it.  The middle classes live in constant hope for promotion and fear of demotion.

Hypothesize that there will be such a U shaped correlation with attitudes toward sex. In particular, members of the upper and lower classes will remain in their respective social classes no matter whom they have sex with, so this model predicts that rape or consent is not a big deal to them, and it also explains their seemingly insensitive behavior: they are simply acting by the Golden Rule, doing unto others as they would have others do unto them. Meanwhile, those of middle class face drastic consequences of class demotion both for themselves and their descendants depending on whom and especially how much sex they have: "slut" is a label which reeks of low class. Thus this model predicts that those of middle class will care the most about consent and rape, as well as be the most likely to falsely accuse rape.

[ifyfkffb] Half squares

Consider packing N unit squares into a square of side 2 such that the small squares are orthogonal and centered at coordinates 0.5, 1, or 1.5.

0 squares = 1 possibility
1 square = 9 possibilities
2 squares = 8 + 4 + 2 + 2 = 16 possibilities
3 squares = 4 + 4 = 8 possibilities
4 squares = 1 possibility

Total = 35 ways including empty, a surprisingly large number.

Inspired by recursive characters.

[fztqadyk] Water barometer failure

In a column of water taller than 10.3 m and sealed at the top, a vacuum bubble will form at the top.

However, gases, e.g., oxygen, dissolved in the water will come out of solution and fill the vacuum.  This will cause the water to become slightly depleted of gases.  On the other end, exposed atmospheric air pressure, gases will diffuse into the depleted water.

Over time, the height of the water column will gradually fall as more and more air gets seemingly magically transported into the vacuum.

The vacuum will also get filled by water vapor.

[pvgbehgs] Provenance for deletion

Suppose a distributed social network in which your node obeys other nodes requests to delete mirrored data.  Furthermore, let such data not be confined to the social network cache on your computer: you can export it out to your filesystem.  Then, when a deletion request arrives, we need to find exported copies and delete them also.  There needs to be some source tagging infrastructure built into the operating system or filesystem.

This gets especially hairy if the exported data has been subsequently modified or used to create other works.  Should a derived work be deleted also?  Automatic image, video, or text matching, or ask the human.

In another field, such thorough remote deletions could be evil, but these are always voluntary, friendly, the basis of the trust upon which the social network is built.

Sunday, December 14, 2014

[fuarebxj] Everyone is a little bit racist, sometimes

The racist police are overseen by racist civilian governments which in a democracy have been elected by a racist populace.  Trace exactly how mechanisms of power and procedure cause the "just a little bit" of racism of the populace to result in widespread police brutality against African Americans as well as other similar injustices of the justice system, most notably the disproportionate number of minorities incarcerated.

Is it the racism of the 1% of the populace that causes these outcomes, or that of the 99%?  That is, if the 1% became not racist but the 99% continued to be so, would the world change?  Or, if the 1% remained racist but the 99% became not racist, would the world change?

If it is the fault of the 1%, how do they achieve racist policies and what do they achieve with their racism?  I speculate that they don't feel any race is inherently inferior to any other; rather, the 1% seek an orderly society, a maintenance of the status quo that helps them maintain their position in society.  Racism is merely a symptom, perhaps an illusion, toward that more fundamental goal.

On the other hand, if it is the fault of the 99%, then this is a very unusual case of democracy obeying the will of the mass of the people, a distributed action achieving a dramatic effect despite no central coordination, no charismatic leader, no vast political movement or organization explicitly working for the goal of oppressing African Americans.

Inspired by hypocrisy of protesting recent police brutality, assuming it is the fault of the 99%.  It is very easy to reveal most people's racist attitudes, and if the sum of those attitudes is the root cause of the brutality, then effort might be better spent changing oneself than protesting.

[ufeyfcns] Howto

The most important documents are those which help you do something: mere information transforms into actions in the real world.  Often it is how to replicate what someone else has done.

Wikihow is arguably more important than Wikipedia, but it is only a start.

Create processes and incentives for the creation of such documents and methods to identify which documents describe "how to" well.

Too often this kind of knowledge is only stored in some human's brain, and often there is incentive to keep it that way: it increases the value of the person who has the knowledge.

[njjdviag] Computer generated background music

How well can a computer compose background, "accompaniment" music?  A human gives a timeline of when the music should do what.  Select from a library of styles.

Decrease the barrier to entry of creating documentaries.  Background music is now fraught with copyright difficulties.

[vejndtfp] Human packbot

Create a tall cart with very small footprint for moving stuff.  Perhaps a pair of six inch diameter wheels.

The goal is a cart the rough shape of a standing person will not have difficulty fitting in places designed for people.

The extremely tricky part is for it not to fall over: use Segway style self balancing.  It might also need arms to hold on to things.

Although the self balancing is powered by an internal battery, the primary power of locomotion is a human pushing or pulling it by a handle probably attached to the base.  This hopefully decreases the power requirements.

Get it to climb stairs and step over gaps.  Perhaps a second set of wheels that move up and down.

Inspired by the difficulty of bringing a wireframe shopping cart on a crowded city bus.  With the cargo packed into bags, the cart might look more like a coat rack on wheels.

[vmphblkj] Human generated captcha

Manually create an encoding of some data that is difficult for a computer to decode but easy for a human.  Unlike the "completely automated" CAPTCHA, this Human Generated PTCHA requires human effort to create (so us not suitable for high volume), but is hopefully much harder for a computer.

"Pictionary" style drawings of a word
"Charades" style video acting of a word
"Taboo" style spoken descriptions of a word
Cursive calligraphy
Interpretive dance
Riddles and puns

Original motivation was to thwart large scale automated copyright lawsuits.  Content is encrypted, actually merely obfuscated, with a key that is encoded in a HUPTCHA that is distributed with the content.

Avoid common DMCA takedowns for background music for a video.

[odbuvjpr] Ordered dice

The first d10 die is labeled 00 through 09.  Another 10 through 19, etc.

It is easy to roll a large number of dice at once from a container, but, unless the dice are ordered in some way, not straightforward how to convert them to a string of digits.  For the above set, put them in order numerically by first digit, then use only the last digit.

Coins can be easily ordered by value and with more difficulty by year though the year is often printed only on one side.

[bturzrrl] Recursive characters

The way Chinese characters can be constructed by placing one or more other characters into a frame-like other character is an interesting way to encode arbitrarily large quantities of information, given enough resolution.  It's not linear but a tree.  Perhaps sentence syntax.

What are the leaves? What are the internal nodes (frames)?

Reminiscent of heraldry.

Various ways of stacking things and dividing up space.  Constrain to avoid too extreme aspect ratio.

[geqjwbso] Large dense cannonball

Consider the problem of launching a projectile as far as possible.  A projectile encounters air resistance proportional to its cross sectional area.  However, the air resistance affects the projectile as a proportion to its total momentum.  Its total momentum is proportional to its mass, or its volume.

Given the difference between volume (growing by the cube of the linear dimension) and area (by the square), for a given velocity, density, and shape, a larger projectile will travel further.  A denser projectile will travel further.  For a cylindrical projectile that remains facing the correct direction (e.g., stabilizer fins), a longer projectile, having more mass but the same cross sectional area, will travel further.

Motivated by the question, how far can a trebuchet launch something?  By the above analysis, there is no upper bound, so long as one can choose the shape and size of the projectile.

Friday, December 12, 2014

[hxysekcu] For your eyes only

Input your (private) decryption key into your computer monitor.  The computer sends encrypted data (probably from elsewhere) to the monitor, and the monitor decrypts and displays it.  This avoids decrypted data ever being on the computer itself where malware could steal it.

Inspired by end to end encryption.

Monitors would have to function very differently, not merely dumping pixel rasters to the screen.  Text only, or perhaps able to decode images specified by code on a virtual machine.

Cut and paste of the plaintext becomes impossible, which is a feature.  The user must read the screen and retype the text.

Similar things could be done on the other end with a keyboard holding the (public) encryption key.  The keyboard encrypts each keystroke and transmits the ciphertext to the computer.  They keyboard is also connected directly to a monitor and transmits to it the plaintext keystroke, which the monitor renders.  Because some of the keystrokes are backspace and cursor motion, the monitor must act like a text editor.

The recipient of the encrypted text will also receive all the keystrokes, including backspace and cursor movement, which will have to be rendered.

Essentially these are specialized air gapped computers.

Thursday, December 11, 2014

[cgelvmxo] Social effects of gasoline tax

Suppose we raise the gasoline tax to fight climate change.  This causes people to want to commute less, preferring to live in denser neighborhoods near their work, schools, and play.

However, density means you have to put up with other people.  Density may bring to the forefront social discord which is currently kept under control by keeping the parties geographically separated.  For example, the undesirable lower classes don't have to travel as far to harass the rich; the rich find it impossible to live peaceful lives without the poor intruding. Whites had originally fled to the suburbs to keep their children safe from blacks; if they move back, their children will become less safe in this regard.  Pessimistically, such social discord may result in hugely costly conflicts (e.g., civil war, genocide) that outweigh the benefits of decreasing climate change.