I always wondered why so many candidates missed the window to get insights when they have been asked — “Do you have questions for me?”
[Regarding the company's ethos]
1. What is the strategy positioning and direction of the company? Do you have a "fight guide"?
* This questions on the 'Go-to-market' strategy and how they can induce adoption. There has to be a framework with clear, concise, targeted segments of the market environment. There must be clarity of:
requirements -> features -> market / competitive analysis (`fighting guide`) to target strategic use cases -> re-adapted, modified features2. From…
There are 4 stages of working out zkSNARKs:
Stage 1: Atomizing (or `Flattening`)
The algorithmic formula contains a `trapdoor` as a proof. This is important for zkSNARKs, because this is task for the prover is to convince the verifier that such a witness exists, without revealing information about the witness.
Designating an example of an algorithmic formula, i.e. a quadratic equation, example: x³+x+5 = 35. Designate that a proof is that Prover knows the solution to the equation. Here, solution: x=3.
Hence, this can be used as a witness statement, i.e. …
Note: Please refer acronym list.
Multi-signature (Itakura and Nakamura, 1983) schemes reveal data only when certain conditions are met, i.e. an adequate number of entities (e.g., k of N, where k may be 3, N may be 5) authorize. Another option may be threshold signature or presentation, e.g. Schnorr signature, SSS (Shamir Secret sharing (1979)). In terms of privacy, Multi-signature covers Signature Accountability, as it is always explicit which private keys are used to sign a transaction. For MPC based signatures, it is indistinguishable. MPC enables several entities to contribute their data to recover a combined dataset while keeping their…
As the net is normalizing a list of abbreviation for communicating and texting expressions and concepts, over the years, some friends and I had been using a list of abbreviations and parlance of our own.
Caveat: While vulgarity has been so discouraged among my common social group that it is in desuetude, acridity exists.* semiotics: The study of signs and symbols and their use or interpretation. Synonyms: semeiology[A]
AIDA: Attention / Awareness, Interest, Desire and Action.[B]
Big Meaningless Naming[E]
`Explain It To Me` where an in-built tool have notes added to perform "explain it to me"…
[Infrastructure — Network]
1. Topology Scanner: Finding the weak joint for partition attacks2. Packer sniffer (Wireless and Wire tappers, access point detection and discovery, Man-in-the-middle interception tool)
1. Malware generator: Collection of Trojans, Viruses, Worms, Malware, Denial of service (DoS) tools, Distributed denial of service (DDoS) tools, Spyware, Backdoors (akin OpenSSH Secure remote access), etc2. Vulnerability assessment tool:
2.1. Internal scans: Discovery and analysis on Certificate, ssh keys, vulnerable modules marked by CVEs, Intrusion detection (internal tripwires and honey pots)
2.2. External scans: Port protocols, port scanner (active status and activity)3. Password bruteforce-recovery tool (include…
Belief solidifies confidence and trust for people to be bind to function in a system or protocol.
Trust is conditional and contextual. - 2013-08.14Evidence are the constructs to proof, they are not proof per se. — 2020–08.16
In an environment where trust or even potential hostility is an issue or concern, what are the options?
When the system becomes your puppet, its subjects become your slaves. — Re: Obviation by vitiation, 2006-05.14
P0: Establishment of 1st-Trust.
Before any communication, 2 things need to be established:
1. Trust (`why` should it trust the entity of `who` the entity is, and `what`…
Funeral is not for the dead, it is not about dying, it is for the living and about living. The dead is gone, the living gathers to garner consolation, courage and empowerment. It is a gathering to share and commune the harvest of meaning. Life is an assiduous, continuous mining of meaning and refinement to derive and manufacture values. Humans create their worth through their own making. We are all creatures of meaning. The funeral is a thanksgiving for the departed, and a remembrance and cherishment of what we are all living for in the first place.
The only reason…
Etymologically derived from Greek word, ἀδύνατον (adunaton), “unable, impossible”.Adynaton is a form of hyperbole.Example:
"I’ll believe that when the sun sets in the east."The clear implication in this phrase is that the sun will never set in the east, and thus the speaker will never believe what is in question.
Etymologically derived from Greek word, anakolouthon, from an-: “not” and ἀκόλουθος akólouthos, “following”.Anacoluthon is an unexpected discontinuity in the expression of ideas within a sentence, leading to a form of words in which there is logical incoherence of thought.Example:
"You can wait … till it is…
I was called back to the troops. The platoon was issued a secret order. They said we were to fight a static defense and the survival rate is low.
Everyone is bracing themselves on how they would survive no matter how strong the enemy numbers and firepower would be. The commander said details will be given at the ground.
They flew us to a place, and I asked if the place was in the Norwegian regions. We glimpsed out of the military tonner and saw graffiti. We passed by a school. …
Caveat: This is not meant as a tutorial for social manipulation or political maneuvering. If you win hearts, you must offer yours. When people know you are just manipulative, not only will you lose their trust, they will lose their hope in people. Do not be a cause to such damage.
Some questions are posed as veil baits, especially when the answer may already be known, to elicit and obtain response not feedback without seeming to. Probe with a situation such as — “Is There a Reason?” to introduce a fact or facet, and the mindset sets into a state.