Noah Thorp (@noahthorp) 's Twitter Profile
Noah Thorp

@noahthorp

I have half a mind
To sharpen the cutting edge
And half to dull it...

ID: 14079281

calendar_today04-03-2008 18:59:10

942 Tweet

1,1K Followers

3,3K Following

Noah Thorp (@noahthorp) 's Twitter Profile Photo

As a society, one of the most valuable things that we could get better at is sustaining stable public infrastructure and social support without relying on government programs. It's challenging to imagine the pragmatic details but that does not change the value of doing this.

Noah Thorp (@noahthorp) 's Twitter Profile Photo

Unpopular opinion : modern writing should use a space before punctuation for easier cutting and pasting of things like example.com !

Noah Thorp (@noahthorp) 's Twitter Profile Photo

christina bowen 🌎 @gordonbrander Peter van Hardenberg Nice. The older Yarrow Stalk method of I Ching reading has an asymmetric probability distribution and a manual sorting algorithm that is open to sub-conscious effects. It could intentionally reveal unconscious awareness or be an RNG hack that biases decision making at scale ;-)

Noah Thorp (@noahthorp) 's Twitter Profile Photo

Ethereum 2.0's most valuable contribution could be to show high energy consumption proof of work blockchains like Bitcoin & its clones the migration path to low energy proof of stake - including how to transition the miners who are incentivized to keep mining proof of work.

Noah Thorp (@noahthorp) 's Twitter Profile Photo

Weakly held conjecture: all writing with a defined alphabet is discovery and not invention since all possible combinations are defined. Any new symbol added is invention because it increases the space of possibilities. Theoretical exception for infinite strings.

Noah Thorp (@noahthorp) 's Twitter Profile Photo

poπšœπš™i Mitra Ardron Rolf von Behrens 🌿 renewfest It also seems fairly difficult to shard something like the PageRank algorithm because it requires a giant complete index of trusted page scores to determine what is on page 1. Success means a growth hacker resistant sharded secure rep protocol graph or massive local indexes.

Noah Thorp (@noahthorp) 's Twitter Profile Photo

Some say "the future is already here -- it's just not very evenly distributed". However, if in all present moments iotas of many futures are present then no future will ever be evenly distributed and achieve the status of "the future".

Noah Thorp (@noahthorp) 's Twitter Profile Photo

Deep fakes can be identified by wide adoption of: 1. Watermarking technology (public/private key encryption) 2. Recording devices & editing tools that digitally sign their media 3. Hash chains to verify video integrity 4. Trusted publisher registries for watermarks