Comment author: Clarity 06 October 2015 10:50:40AM *  0 points [-]
  1. When you were a child did you prefer to play the hero or the villain in pretend and role-playing games?

  2. Today, are your favourite fictional characters heroes or villains?

Comment author: Sherincall 06 October 2015 12:34:57PM *  2 points [-]

May be worthwhile to ask this on the Polling Thread.

Comment author: MrMind 23 September 2015 07:05:46AM 0 points [-]

Well, that's weird. Yesterday I would have sweared to have read in Wikipedia that Stuxnet was developed in 2010. Now in the Stuxnet page it's written "under Bush administration". I guess my sources were incorrect.

Comment author: Sherincall 26 September 2015 01:14:21PM 1 point [-]

FYI: There was indeed a 30 minute period on 2015-09-21 where it said " during the administration of George W. Bush and Barrack Obama", you're not crazy. Though 2010 is the year it was discovered, the development is assumed to have been as early as 2005, it never said "developed in 2010"

Comment author: Alicorn 02 September 2015 08:52:12PM 21 points [-]

I finished a novel.

Comment author: Sherincall 13 September 2015 07:42:43PM 0 points [-]

Are there any plans to make it available for download as a pdf/epub/mobi/txt/etc? Alternatively, would you mind if I created one?

Comment author: Lumifer 12 August 2015 04:05:34PM *  2 points [-]

package of common tasks you can use, such as DDoS

LOL

But generally speaking it would be interesting to see what the kids of BitTorrent ("you can play only if you share") and Tor ("nah, thank you, we'll set up our own network") might look like.

Comment author: Sherincall 12 August 2015 06:49:49PM *  1 point [-]

package of common tasks you can use, such as DDoS

LOL

This is the Crazy Ideas thread, I left ethics and legality at the door.

I envision grieving gamers to be good customers. "You're beating me at this game where reaction time is really important? I'll spend some money to DDoS you so I can win!"

Comment author: Vaniver 12 August 2015 01:21:51PM 4 points [-]

I don't see how this competes with AWS on cost / reliability / etc. on the demand-side. On the supply side, consider cloud server racks as home heating devices.

Comment author: Sherincall 12 August 2015 01:41:17PM *  1 point [-]

cost - you pay in your own CPU cycles/bandwidth.

reliability - obviously, the startup would have to earn the reputation for reliability, but there's nothing inherently stopping it.

etc - AWS is a beast, relatively speaking, and this offers a lot of smaller PCs for a short amount of time. I can't really think of a reason where that would be needed for computing, but as network relays it would be very useful. You could create your own custom Tor and deploy it on demand.

Comment author: zedzed 12 August 2015 12:18:38PM 4 points [-]

So, Folding at Home, but with money involved? Any idea if it can justify the increased electrical bills?

Comment author: Sherincall 12 August 2015 12:54:21PM 2 points [-]

Yes, kinda like folding@home, just generalized and easy for everyone to use. Also, big advantage is the bandwidth usage (which would likely be a bigger selling point than CPU time).

As for the electricity cost.. The tokens would have to be worth more than what you spend on extra power. And there's also the thing of "why don't I just use my own PC for 2 days instead of 10 PCs for 5 hours each?", to which the answer is go for it if you can. But you may have a problem where you just got the data and need it folded or whatever as soon as possible.

Again, I feel the bigger use case here is the network, which very low extra electrical bill. For compute, you can just rent EC2 or some other compute station in the cloud, but having hundreds of network nodes for short amounts of time is really hard to buy currently.

Comment author: Sherincall 12 August 2015 10:48:29AM 7 points [-]

A botnet startup. People sign up for the service, and install an open source program on their computer. The program can:

  • Use their CPU cycles to perform arbitrary calculations.
  • Use their network bandwidth to relay arbitrary data.
  • Let the user add restrictions on when/how much it can do the above.

For every quantum of data transferred / calculated, the user earns a token. These tokens can then be used to buy bandwidth/cycles of other users on the network. You can also buy tokens for real money (including crypto-currency).

Any job that you choose to execute on the other users machines has to be somehow verified safe for those users (maybe the users have to be able to see the source before accepting, maybe the company has to authorize it, etc). The company also offers a package of common tasks you can use, such as DDoS, Tor/VPN relays, seedboxes, cryptocurrency mining and bruteforcing hashes/encryption/etc.

Comment author: Sherincall 12 August 2015 10:35:52AM 9 points [-]

CIA's The Definition of Some Estimative Expressions - what probabilities people assign to words such as "probably" and "unlikely".

CIA actually has several of these articles around, like Biases in Estimating Probabilities. Click around for more.

In hindsight, it seems obvious that they should.

Comment author: Sherincall 30 July 2015 08:22:12AM 0 points [-]

The second game has started early. I contacted the mods to extend the first phase in case someone does not check before the 1st.

(I'm playing only in the first game, but keeping an eye on this one)

Comment author: Sherincall 05 August 2015 03:40:59PM 0 points [-]

One player hasn't checked the second game since the start. If you have joined, please log in so the game can proceed.

Comment author: Sherincall 30 July 2015 08:22:12AM 0 points [-]

The second game has started early. I contacted the mods to extend the first phase in case someone does not check before the 1st.

(I'm playing only in the first game, but keeping an eye on this one)

View more: Next