Friday, February 23, 2018

Internet voting



Nicest about class-of-75 is one can present to-be-implemented idea and derive conclusions  to get objections raised and quiet too. One VERY useful and first implementation is generation of polls and their analysis. It is  assumed that people have access to html editors and statistical packages that can handle data produced as a table with#- comment lines. So typical output is

#-names              votes     age
Arun                      yes         60
Baldev                  no           62

The analyser tabulates votes (some missing) and may determine the median age.

Html{issue}
col “name” n=name{target{}} !(n)
col “vote” ?(v=vote) !(v)
col “age” ?(a=int) !(a)

That’s it!

Arya magic comes in vote column where builtin type vote is used, 99.99 CS will fail here. A magic cookie is attached to email that depends on email address (one addr per voter is admin work). The user acts normal and votes yes or no. The vote gets auto-transformed to a magic number in reply. On receive end, unknown votes are ignored as are all duplicates (which kept etc.). This is proof against forced voting, genuine error and voting hacks!

Note that implicit vote (not asked or output) can be used for uniqueness and hacking safety!

Monday, February 12, 2018

Block-medium 101



Latest link

Block-medium is arun arya competition to private-Block-chain which is ordinary blockchain with strong anti-spy guarantee. What is a blockchain is well expressed in this wired, or this video. (video link works but slow). Point is that bit coin, where blockchain started, was designed to grow in wild, despite any damage from hackers by cryptography and executive thugs by contention. Block medium retains protection from hackers through cryptography, but not executive thugs, handled by regulations and law. This has many massive benefits

1.       Ability to prevent block-medium applications from venturing into forbidden areas like porn and drugs

2.       An ability to tax transactions. So important is this idea given the synergy to robotics, decentralization and quantum mechanics, each science whose progress will cause waves of unemployment; that I propose gradual elimination of all other taxes and their replacement by block-medium transaction tax!

Every blockchain crypto currency has two phases to incentivize the miners and grow the project, slowly inflating the currency pool. Miners derive their income from mining new currency by statistically fair contention It is this phase fully replaced in block medium by legal fiat. After a crypto-currency has reached maximal inflation, the miners will still operate on transaction commission. That is enough from day 1! 

Legal construction creates an initial supply, inflated through some parliament, best constrained by some principle in the constitution that limits the inflation to some factor of consumer prices, say 1.03. Parliament can expand less or change the constitution!

Clearly, I model politicians as very intelligent ethical operators that are forced into weird positions by the requirements of their constituents and constitution provides the ultimate fig leaf to do unpopular things. Ultimately, all issues  reduce to money and budgeting, thus providing total fig leaf.

Is block-medium the future and not blockchain? Guess who are rushing to build their own blockchain? Every very big corporation! Those, like governments, are the big target of blockchain in the first place! Fortunately, enough idiot executive still do not see the cruciality of private blockchain!

My own politics is still unsure. Except it is unsettled Libertarian – fiscally conservative like Modiji, socially liberal like Tharoorji, anti-experience like in USA, history means irrelevant!

Aaquantum-trust-privacy


False flag attacks are easy to kill by aaquantum-means - by attaching author name and author-identity digital root of digest of text. Secure because digital roots are one-way. Obtaining and preventing misuse of aaquantum-identities is what aaquantum-is. Fundamental intellectual world-wide problems of 21st century are conflicts in trust and privacy, their magnitude and resolution. Not only is fake news common, it is hard to even vouch for genuine news!

Moronic criminals have claimed that NASA landing on the moon was an elaborate hoax. Calling opponents names does not strengthen the argument Why then do I do it? It is a long document by inclusion. Any normal reader will glance only on a few lines. The reminder is long and complex. It is not irrelevant to claim that names summarises the long. Others are welcome in free speech society to argue that my abbreviation does not apply or is plain wrong. For instance, they may claim that believers in NASA canard are Moronic criminals! I must then have the right to link to that description and call its author Meta Moronic criminal. And so on!

At that point, legally designated agency can tabulate honest citizen votes and report votes cast and difference in favour and against. For this purpose, a biological identity is needed but that must be kept private from businesses. In India, m-aadhaar is in that direction, still fortunately not aa-aadhaar, my guaranteed private useful aadhar. For nations without adhaar, consider that unregistered eye print can be detected and unregistered votes discarded! Double voting is formally like double spending, basic to digital currency implementation. Clever aaquantum techniques can detect fraudulent registration and voting.


The solution is to allow ANY non-opinion expressing equanimous text to be linked to a file of links such that alternate links reference text of whatever length but has to be authored by court decided alternate Boolean viewpoint. The principals must register with the government by simply sending an email to a link, and the government can decide which is proponent, overturn able by designated court. All links and proponents can be agency-questioned!

In particular. Commercial speech links can also be attacked by the criticizer linking to better alternatives (their opinions). This proposal is welcome death-bell for dishonest advertising business on internet! The attacked can provide response link, And so on. The summary vote can be the zero line. Even better, the zeroth line is file of pairs votes tabulated by first identity. This allows the different consumer to select based on votes tabulated by their different favourite. This is somewhat more elaborate than political votes, where favourite based voting is inapplicable.

The solution to lies is not forbid speech. It is to provide links to a counter-narrative. The solution to attack on public decency is required enclosure in cryptography solely used to record the peruser.

Sunday, February 11, 2018

For a life well lived


For a life well lived

I am a nobody now, but fully charged optimistic with several relevant interesting world-improving avenues open. I need to address aging, wealth, religion, friends, politics and personal impact. You must too, peruse quickly through for how and must commit to paper. My experience indicates publicizing may benefit someone, someone may help remove bugs, sharpen thinking by doubts, forces discipline and acts as invisible hand!

There are at least four major new ideas developed by me, speculated after my intense internet searches! These are Everett-like interpretation of Quantum mechanics; CCC-like genesis; blockmediumdecentralization; and missing-reactants theory of aging.

Personal impact

It is crucial for I can understand death now as beyond something that happens to others only. I do envisage, define and implement a formal language aalan, which address three new problems – non-determinism like vastly improved yacc; blockmedium, a simplified private blockchain like vastly improved bitcoin; and abandoned greatly different software from efficient multiple inheritance despite c++, being the way all intelligent human think, hence robots.

“In god we trust, all others need data”, says my IITK senior brother-in-law hobnobbing with USA generals! This is a great essay but where is the meat? First an answer, then time bound implementation. Deadline March 20, 1918.

A professor never retires or becomes ancient. Nor does an essay writer, author etc. Just to stay relevant, you have to interact with the world. The world changes again and again, but you must explain to yourself why the change – shortcomings of the past, how fixed in new world and then two kinds of research – relevance and logical conclusion of the new existing – tech fi; and relevance and impact of newer subjects needing to open up – sci fi.

There is so much scope for tech fi. Blockchain and blockmedium have opened up to non-heretical administration and truly distributed systems. These systems are impossible to defeat – a part escapes disaster and regrows like hydra.

Sci fi inventions must understand no go theorems and around them! Classic is big crunch that cannot happen in classic universe but can in quantum universe. FTL is prevented by no go of any material travelling faster than light but nothing prevents the space-time (and its contents) forming an FTL bubble (delivering its cargo FTL)!

Religion

Prior to adopting one (absolutely irrelevant is my inheritance), I must adopt an epistemology – belief process and what/why do I believe in! By definition, it immediately  means empirical. So a young Vivekananda asked his guru – “have you seen God?” “yes, I have and show him to you”. Unreported is how much education would be needed! I suspect after a few years, the swami actually saw God! Lesson is care need to use in questioning Indian guru! Dawkins was easily trapped by senior religionists early. But he learned. Experienced Dawkins slays opponents of evolution at ease!
If one is NOT doing to believe accomplished thugs of Indian religion, then what? Only reality is death. What about the evolution of the Universe? Of life? Surely God-of-the-gaps is real, we know some things, all the others God does! A very clockwork universe where “the moving finger writes” and one can create logically consistent explanations of all probabilistic things, that are guaranteed to be untestable! Rather than waste time understanding these, it seems better to understand hard but testable explanations. So my three interests – astronomy for Universe and birth;  biology for aging and Life; and quantum physics for Nano materials and new communication.

And stoicism is it, one of major godless religion like Buddhism, dead for 2000 years but being revived, the religion of scientists even when they disclaim all religions – they are still nice and accept social order. In 2018, one can explain creation, elements and astronomical universe, unfold the physics of life, speculate on big bang and black boles, play with enormous energies at VLC, empirically test neutrinos, work on magic Nano-materials, imagine what is possible etc. But my serious immersion in astronomy, biology and quantum physics is not an understanding dead end.
This brings me to the neologism by me – pregnant-science. By definition, it is like religion in that no existing tests exist that prove or disprove, such tests are eventually possible and these speculations derive today sciences. In my term, they are ready to give birth to new sciences whenever.

Idea 1: aa-interpretation of Quantum Mechanics by pregnant-science

Motivations is parsimonious Everett’s many worlds. This theory holds that QM is not strange at all! Every quantum experiment is normal and deterministic in the world which experimenter is in . The number of Everett universes is astounding like 1000 ^ 1000 ^ 1000, but it works! Classic interpretation was from Bohr with mysterious mind-boggling idea of collapse at the precise measurement moment – it was a probability wave when not watched. Further, some intelligence was required in the observer. “How did the universe evolve before intelligent observers?” was a hard question! Between 2005 and 2015, the number of professional quantum physicist believing Bohr dropped form 40% to 5%. Everett believers went from 10% to 45%
Around 2014-2016, people were forced to calculate wave functions of molecule electrons. It is VERY hard for single multi-electron element. This is Quantum chemistry! It was done by some clever approximations. When the approximations were examined, they were as if multiple Everett’s word were coincident! Perhaps they were not all independent!
Giving deep thought to this problem, I decided that there was only one universe, but time was 2 dimensional, with the extra dimension to be quantum sized, hence too small to be noticed in macro time, but important in quantum objects! So was born aa-interpretation. Experiments with quantum hall effect indicate an extra spatial dimension. Hence a six dimensional universe, independent of string theory, each a conclusion from a pregnant science.

Idea 2: AACCC cosmogony

What caused the big bang? It is addressed by many theories in pregnant-science of Cosmogony. There are six important alternatives! This is NOT about big bang cosmology. There are proof in CMB for it to make sense (any other must explain evolution of quantum dots in CMB to galaxies and spectral lines in CMB).

One I love is the CCC alternative of Sir Penrose. Inverse of big bang is big crunch. Perhaps the universe is in editions. Each edition is created in big bang and dies in big crunch. All but the last which expands for ever. CCC requires no big crunch but a universe ends in mysterious mathematics after infinite expansion! But I work later to Sir Penrose! My AACCC has two extra things

1.       LQG cosmology has posited a maximum crunch capacity of space. Things never crunch down to singularity but maximum density after which explosion occurs. No new physics is needed at some singularity.

2.       Big crunch is possible despite 2nd law of thermodynamics.

It is a pregnant science because it is possible for an edition to leave empirical effects on next! These are circles in CMB from collision of really large black holes in previous edition! Have they been seen in our CMB? Controversial – some see them, others do not and dismiss it as psychological effects in perusing random noise!

Personally, AACCC is a pregnant science, not science yet! Even if a science, perhaps there are other incompatible cosmological theories so predicting!

Cosmology: It is study of evidence in this universe and use that to empirically choose. One controversy is about dark matter and dark energy. Dark energy is simply that of quantum vacuum. Dark matter may not exist! Verlinde gets MOND by treating gravity as an emergent entropic force, reduces to standard newton inverse square law but not when gravity is weak.

Universe is consistent with big bang 13.7 billion years ago. Also with infinite past with quantum meridians!

Idea 3: Missing-reactant theory of Aging


Aging is a disease. Right way to address it is SENS like positioning between gerontology and geriatrics to focus on repair. Aging is life-long accumulation of damage to DNA which reduces some chemicals required as cofactors in Krebs cycle. This is the set of reactants in mitochondria of every cell in every life! That is how I know I am right! Mouse studies can be carried out to test conclusions of mine and SENS.

Vitality and Longevity are two possibly conflicting goals, in my case vitality is more important. Diet-restriction increases longevity at price of vitality. So only mild restrictions are practised in random pattern less fashion.

So Aging is accumulated damage to DNA resident in cells. Strategies to alleviate consequences are

1.       Replace the missing cofactors
2.       Manipulate DNA as per SENS
3.       Replace entire DNA
4.       Some combination of above


I recommend 4. Here are considerations

1.       Replacing missing reactants requires the chemicals to be known and reach mitochondria of every cell. That requires, in general, escape from environmental stresses, penetration of stomach, penetration of cell wall and mixing into mitochondria parts. Each barrier reduces by a factor. Stomach barrier impact can be reduced by Ayurveda concoctions and increased (sugar in diabetes) by acarbose. Injection, directly into blood is one approach.
The Krebs cycle can be approximated by 3 – ATP, NADH and Citric acid. They are all benefitted by anti-oxidants since reactive oxygen in all cases hurts the cycles. Three ingredients are ATP by Coq10+Shilajit, NADH by NR/NMN, and citric remnant by Lipoic acid.

2.       Manipulate DNA as per SENS. This is a strict medical topic. To watch and judge.

3.       Replace cell! This is normal part of all organisms. The division and replacement seems to be species specific with telomere forming important counters for us. Division is by DNA helix forming a pair by uncoiling and recoiling. Problem is that damage is transmitted in copy as well. Better approach is if a stem cell is present during the division and it competes with the diseased duplicate. This happens in transfection delivery of programmed skin cells. It started August 2017 and is too early to base any predictions except tech fi! To watch and judge.

So my strategy is to watch and judge. Only 1 is adopted, which means nr, cq10, Shilajit, lipoic acid supplementation and not vitamin C, vitamin B3, resveratrol, glutathione etc. supplements! This is a very dangerous area, with extreme care needed.

Epistemology – vitality before longevity. Trust no one, including doctors (too many prescribed insulin increase!). Leave something to SENS and Cochrane collaboration. Filter supplements by Krebs cycles and barrier penetration. Only cost prevents mito4 supplement but coq10 & Shilajit.



Idea 4: Blockmedium decentralization

Blocmedium is contention-free blockchain. It can be used for crowd-funding. But there are many dangers like ICO.
TBD

Saturday, February 10, 2018

Rapid return from dead



There are two ideas here - how to construct a sharable model without a zero-knowledge-proof such that the receiver gains nothing from working on your model and how to construct a revenue stream from a single sale product. These generic iseas are applied to my efforts.

Two new method of software construction and sale
Non-cloud sold software as a service

Aaquantum-co-opt- Two new method of software construction and sale

Sometime, an expansive small core can underlie a large number of applications such that the core is required essentially in all applications. Typical example of essential core is solution to NP-Complete problem. In these cases, a simulation of some applications can be built using copy-left software; all except the essential core.

The essential core is simulated by a table lookup. The entire simulation can now be safely sent to investors, alpha users, market specialist, venture capitalist etc. It proves

1.       The progress already made
2.       Safety from competition
3.       Applicability to consumer uses
4.       Time and cost estimates on remaining work
5.       Parallelism possible in rapid deployment
6.       What the investors bid on
7.       Essentiality in the applications considered

It is separate from the selling documents attached to the application. The final product is the development of all the non-essential components given for free, without limitations. A bounded, but functional essential core is also so available. No one can question a proprietary component to duplicate a slow part in component pipeline.

The essential defeat of copy-left for some applications by doing some parts open, some closed; obeys these cardinal rule of software from Natural Justice

1.       Thou shall never call code written by others your own

2.       Thou shall never interfere in viral growth of free software
3.     Thou shall never assert software-patents

Selling is accomplished by including the complete package with extra optimized component.
The second essential method is never sell the essential component but provide its results as a remote software service black box which accepts an encrypted message and returns an encrypted answer, perhaps using own values from previous transactions as well.

An application

Rather than NP-complete, provably hard encryption problem is used – square-root of 1000+ bit  integer field. For simplicity it will be called dsqrt. Also useful are dmul, ddiv and dexp all modulo some M, ^ is exponentiation., % is mod. Most cryptography magic arises from remainder operation, % in C

Cryption

                Put(message, key, sender-edata, public-receiver-edata => fail | e-message, p-key, p_data) -- all published,  public-receiver-edata has M
                Get(e-message, dsqrt(p-key,M), p-data, receiver-edata, known-database-edata => fail |
message, who, when, serial, …)
                Note that
p-key = (key*key)%M
                And dsqrt(x,M) = (ask_me(p-key^public%M))^private%M

I know not public or private, user finds the dsqrt since dsqrt and ^ commute! I simply calculate the dsqrt of some number sent to me! I and consumer need each other – only customer knows the public, only I know semiprime roots!, not sender, not receiver.

Clouds are considered union of sub-cloud. There is one or more me in every sub-cloud. Any consumer can select sub-clouds for enabling ask-me. Regardless of connectivity loss, as long as one sub-cloud works, ask_me works.

Critical is me as an essential service, whose rates can be set by marketing and advertizing concerns, leading even to provide the whole chain as a product. Additional to work here is conversion of any software product as periodic (annual or monthly) service.

Elimination of Man-in-the-middle

It is assumed that digesting is a secure operation. How then one ensure a and b are related. Assume that digest are half bitwidth of encryption. Then (known1^cpower%me) = digest(a) // digest(b)  && (known2^cpower%me) = digest(b) // digest(a)  where // indicates bit concatenation, implies that a, b are related. Reason is that there is no effective way of forcing digest on right and left implies that right has the known decryption.

Register

To setup an account in family f, consumer does

Register(family, f_permit,name => who,known1,known2,public,private) -- After register, only factors of who kept.

After getting f_permit from the family admin. After testing once, who of a name is known. Then encrypted messages are sent. One can set up records for a name in tables and use the digest of the block, rather than who, make who a field of the record, thus extend binary to secure n-ary relation.

A new family is created by fregister.

fregister ( long_family_name => family, permit_base)
f_permit(name) = permit_base ^ digest(name)

Secure broadcast

The message can be encrypted once. So is p_data. They are published once on a cloud. The key is squared once for any recipient in consumer who to p_key. To read, the recipient gets the dsqrt from me. Uses that to decrypt e_message and e_data.

Secure message

To guard against malicious cloud modification, the sender can pass the square of the digest of message. That can also be dsqrt and checked.

Relevance to class-of-75, other friends and me

In order to ensure freedom from bugs most of software must be open source. But that makes software hard to get revenue from. Also socialist FSF, with its copy-left, has collided with other less restrictive open sources. Ideal situation is mine who claims knowledge of a very hard problem, whose answers can be checked easily on every use and whose veracity can be checked by testing, even by adaptive dsqrt. Further most of the program is open source. Open or closed source replacements are possible provided that the extender disclaims any software patent actions.

With this in mind, family, class-of-75, other friends, investors, venture capitalists and journalists can peruse to answer

1.       Feasibility of making money
2.       How much has already been done
3.       Competition and uniqueness
4.       Difficulty in compete by this method
5.       Difficulty in compete by another method
6.       Lack of disadvantages by open source


--------------------------------------------------------------------

Aaquantum-co-opt- Non-cloud sold software as a service

Sometimes, one is interested in viewing software products as periodic service, where people buy the latest edition as a service, and the old version develops a flaw, the certificates issued by the old software are not valid. This entire work depends on the principle that a semi-prime is crypt-useful only if its factors are secret. If the owner of the semi-prime discloses the factors, all crypt-certificates lose their certificate character! It is a dumb idea to do it for messages sent by someone. However, it is perfectly sane to do it for defeat of the man-in-the-middle!

You want to duplicate Microsoft windows for protecting revenue!

While none of the old messages become reusable, the certificate of genuineness of the mail owner public is at stake! An ordinary criminal can criminalize new customers of the buyer. The buyer has no sane option but to buy a new identity certificate! Note that the identity certificate semi-prime idsp has nothing to do with communication semi-prime of the buyer! If I use it to certify identities every year, then disclosing its factors end every year means

1.       All previous identity certificates are lost

2.       No communication of anyone is disclosed.

3.       Existing customers can reuse the semi-prime as before. However, while criminals cannot spy on mail, they can build fake confusing identity certificates and destroy some mail, while launch some sophisticated adaptive attacks. In short the critical principle of mine is lost – never trust anything, even repeated, without a certificate. But this principle, or another reason, gives me clever resale method!

Use of these ideas
                Use in my secure email system is easy.

Put( target, key, sender_full, Target-public, Certificate => emessage, ekey, letter-cert)
Get( allowed{sender}, emessage, ekey, letter-cert, receiver_full => message, …)

Trust in sender and letter requires certified identity!

Kill spam

                My method provides a technological solution to the worldwide problem of spam! Note that the Get is not from anyone but from a whitelist! The list is in consumer control! It may consist of names or recommended_by names. If the sender is not in the whitelist, letter goes to wastelist! Initial whitelist will include on-government-service and essential-services (police, medical, emergency etc.). The list can be dynamically expanded or contracted. A republican certificate may allow republican candidates, authorized to send mail. A consumer might add democrat, republican, libertarian etc. Point is

1.       Allowed list may permit not just individuals but idea keepers.

2.       Allowed ideas may or may not be static. People conforming (even incorrect fine, the allowed cut) after 1 or 2 errors) allowed even not known.

3.       Not just political but advertisement as well! Generally some companies allowed if selling wanted. To some extent, consumer directed advertisement!

4.       Perhaps user allows movie stars, sports stars, typical consumer, religious, business or political stars. Everyone is allowed to be stupid.

5.       Consumers are allowed to lie on anything, including by  convincing-lie software. Change whitelist dynamically. Prevent id detection. So much for incentivized surveys.

6.       Membership in any list requires a certificate! Days of honest SPAM are over! Today’s spammer lies about who sent and why sent!

Use in class-of-75

Above is just a label, to which some subscribers send letters. Essential proposed difference is trust! At this moment, no one can truest the sender, only possible in cryptographic transparent scene. Use of my cryptography, when done, in billion odd groups is intended to be transparent. Instead of submitting your jewel to current email, you submit it to aaquantum-email, also used for transcripts of allowed senders. Unlike email, and more like Facebook, you would have, you settable, event generators. Those specified by at least  1 class-of-75 other than yourself will be sent, via class-of-75 to the interested and inserted, according to policy, at once, or delayed into the transcript.

Messages have a subject, imp0licitly if replied to, explicitly if named. On consumer list of allowed links to messages in store computer for class-of-75 (perhaps replicated) will be kept per consumer. Simple primitives will exist to move messages to consumers. There is no need to repeat messages again, rather than link to set of links for that subject.

All messages will have a one line summary, displayed in the transcript along with a link to the body.  Complete line looks

<reasonable-reco> <who> <subject> <line …> <detail-link>

$rea above is needed to allow a designed reader by consumer to certify that the summary is indeed a fair summary, not a moronic headline! $who is the writer. $sub is about. $dea is link to real mail. 
Apart from <like> and <dislike>, there will be <n-like> and <n-dislike>, Also a link to conversations.
Class-of-75 is as if a virtual person, with Facebook like interface!

Why confident of win

There are exactly two ways to win trust – long trustable history, or provable can’t hack i.e. cryptography. EVERY ONE hackable WILL be hacked and that means ALL members of class-of-75.,
specially as unhackables increase and criminals become desperate! I hope all bless me in this confluence of fighting old age and block-medium. Regardless of philosophical belief, 2020 onwards, earth belongs to the unhackables!