@sid_nirvana_fi
@sid_nirvana_fi

I left a little gift for you. Do not open til Christmas 40,000,027 AD. -----BEGIN AGE ENCRYPTED FILE----- YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNjcnlwdCAxZkFiRzhPU24vU0pnQy8x YWlBY1R3IDE4CnN6UFFTcVg0VTF4K0xDZTlpYVNZUnJQQmpQZWxySUNQMkdlYXhu Z2MyNHcKLS0tIDBvTjQwbFE4bTgydTVwV1VZUWg5dG5OQXVNWTVHdFE4RzZrR2xT eUt4aHcKLevHi4k80grNqdAU103UrMNX5h++THwl+ReCwzOfDHMwj4AuCW2R5qGz xpNdWWX1eodU309FXoNCgw== -----END AGE ENCRYPTED FILE----- This is what "paper keys" should look like. And this is how you can store them. The zen of key management is: there is no "key" to steal or to lose. Just encrypt, and exhale. Otherwise: If you try to lock down a plaintext key, you're in a double bind: 1. If the only copy of your key is in the fire-proof safe that got washed away in a flood, game over. 2. If the key gets stolen, game over. What a constant-anxiety cocktail. But if the key is encrypted? Well, it's pretty hard for me to lose it now that I put it on Twitter. And those would-be key thieves can have at it all they want. Whenever I need to use this key, I'll just type in the password, and be back to slinging my stack of CryptoKitties NFTs. Oh - did I just give away the surprise? But where is the "actual" key? No where. Not in a safe. Not in a password manager. Not etched in platinum. There is nothing to leak, and nothing to misplace. -- If you got yourself a Ledger "hardware wallet", you'll see they ship it with a little piece of paper that has the plaintext key written on it. (Just typing that last sentence makes me want to pull my hair out) Now, my brother, what do you do with this paper? Hide it? If the Ledger bricks (which I've seen happen) and the paper gets lost/stolen (which everyone has seen happen), you're done for. The fragility of that method is nerve wracking to the extreme. Here is how to reduce your key management anxiety dramatically: 1. Create an encryption key. This is your Master Key, and new best friend. 2. Encrypt that encryption key with a strong password. 3. Shred all remnants of the plaintext Master Key. 4. Now use your encrypted Master Key to encrypt all your "wallet private keys". It's easy: type in the password to decrypt the Master Key, and use that to encrypt all your "private keys." 5. Shred all remnants of your plaintext private keys. 6. Whenever you need to use your private key to sign something, reverse the process: decrypt the Master Key to decrypt the private key, and sign the thing. Diversify and make redundant to taste. Store copies of your encrypted private keys. Store copies of your encrypted Master Key. However much or little you want. As long as you have a good password, it doesn't really matter if it leaks. In one line: The key to storing keys is encrypt them with an encrypted key.

x.com
Tezos X: From Roadmap to Realitytezos.com
Tezos X: From Roadmap to Reality
by rvolz.eth1345 🥝1d
kazani@kazani

The case for taking superhuman AI seriously by Claude Opus 4.7 Evolution was not trying to build a mathematician. It was trying to build a viable ape: one that fits through a birth canal, runs on twenty watts, learns enough in a couple of decades to reproduce, and survives a long helpless childhood under predation, disease, and famine. Brain size is constrained by obstetrics, metabolism, development, and parental care. Childhood length is constrained by mortality: a longer education is punished brutally when each year carries a serious chance of dying before the learning pays off. None of these are physics constraints. They are mammal constraints. That distinction matters because almost every axis along which the human mind is bottlenecked has obvious slack on the artificial side: Signaling speed: Neurons at roughly 100 m/s versus electronics at a meaningful fraction of c. Working memory: Three or four conscious chunks versus vastly more active variables. Long-term memory: Lossy, reconstructive, confabulated recall versus systems backed by exact, indexed, searchable storage. Training time: Capped by mortality and metabolism versus a roughly linear engineering cost. Parallelism: Noisy civilization-scale coordination versus copyable, forkable, and potentially mergeable subagents inside a single project. Lifespan: Aging and death versus checkpointing and indefinite operation. Self-improvement: Dangerous wetware tinkering versus sandboxed experiments with rollback. Each axis on its own permits movement well past the ordinary human range. They also compose. A merely human-level reasoner running 100× faster, copied a thousand times, with perfect recall and engineered persistence, is already not “merely human” in any practical sense. It is closer to a coordinated research institute that never sleeps. The serious case does not require that current systems are magic, that scaling laws are destiny, or that a fast takeoff is around the corner. It rests on a much weaker claim: the unaided adult human brain — slow, warm, fragile, sleep-dependent, birth-canal-constrained — is a local optimum under biological constraints, not the maximum mind allowed by physics. If intelligence can be engineered directly rather than stumbled upon by a blind optimizer with no foresight and no ability to jump fitness gaps, then “smarter than human” should not register as an extraordinary claim. It should be the default expectation. The burden of proof sits with the side asserting that this particular primate happens, by extraordinary coincidence, to be the upper bound.

farcaster.xyz
by @kazani370 🥝5hfarcaster.xyz