BLUE
GT
Gabe The Engineer
@gdbassett.bsky.social
Currently mostly at mastodon.social/@gdbassett
108 followers534 following115 posts
Reposted by Gabe The Engineer
Ffrankelavsky.bsky.social

The best part of Counterpoint is that Sivaraman's approach easily enables a low-level accessibility toolkit like Data Navigator by converting state into a graph structure. This makes Counterpoint one of the first projects of its kind!! See the demo: dig.cmu.edu/counterpoint...

1
Reposted by Gabe The Engineer
KSkatestarbird.bsky.social

The wildest rumors, which many of you have heard about, are conspiracy theories that Democrats control the weather and intentionally created the hurricane to impact voting in red states. We tracked how those rumors spread on X, mapping highly-retweeted tweets along a cumulative graph:

Graphic showing the spread of rumors about the hurricane on X (formerly Twitter). Time runs left to right (Sept 28 to October 8). The y axis is total tweets, 0-120,000. Individual tweets are mapped along the graph as circles, sized by the # of retweets. The text of 5 tweets, including one correction, are included.
6
GTgdbassett.bsky.social

BTW, this all probably sounds obvious. But I used to find it helpful in risk assessments when someone would create a crazy narrative to justify the impact of a risk. Often times the narrative could be abstracted away to one of the 3 w/ the problem being narrative supplied physical or root access.

0
Reposted by Gabe The Engineer
Cc0nc0rdance.bsky.social

The practice went out of favor as gardens became more a showplace for exotic and showy plants and flowers, less a reflection of an idealistic vision of nature pre-civilization. You can read more here:

Ornamental Hermits Were 18th-Century England's Must-Have Garden Accessory
Ornamental Hermits Were 18th-Century England's Must-Have Garden Accessory

Wealthy landowners hired men who agreed to live in isolation on their estates for as long as seven years

2
GTgdbassett.bsky.social

Gabe's 3 rules of security: 1. Anyone with physical access to a computer can deny availability. 2. Anyone with root can do anything. 3. Anyone with unfettered physical access can become root. caveat: immutable logs

2
Reposted by Gabe The Engineer
OCmachete.gay

In the broad strokes, I generally disagree with it and put it in roughly the same bin as an over-reliance on radicalization narratives, but I DO think a nonzero amount of the vague, incoherent, and atavistic urge towards a libertarianism to "recover" society fits in with that model.

1
Reposted by Gabe The Engineer
OCmachete.gay

A thought I always have on the way to things like this some of their support is the one thing that makes me sympathetic to the "confused conspiracist" narrative—the idea a lot of these people correctly assess there's something wrong in our society but fail to draw coherent conclusions about what.

3
GTgdbassett.bsky.social

If it's reactive with moisture And it's just sitting out I have other questions. Since, you know, humidity.

1
Reposted by Gabe The Engineer
NVnikvenkatesh.bsky.social

A great philosopher recently told me: "you can always get away with saying 'I think you'll find it's more complicated than that', because it's always true. But it's not always helpful."

0
GT
Gabe The Engineer
@gdbassett.bsky.social
Currently mostly at mastodon.social/@gdbassett
108 followers534 following115 posts