Skip to content

Commit 538c153

Browse files
author
klein panic
committed
added conspi
1 parent 21b96ed commit 538c153

15 files changed

+158
-2
lines changed

Projects-Documentation/KPChat.md

+42
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
# KPChat
2+
3+
## Overview:
4+
1.
5+
6+
2. Security:
7+
* End-to-End Encryption (E2EE): All messages exchanged between users should be encrypted on the sender's device and decrypted only on the recipient's device.
8+
* Local storage Encryption: User data, including credentials and chat history, should be stored locally in an encrypted format.
9+
* Explore tools like libsodium or OpenSSL for encryption along with encrypted file systems.
10+
* Authentication: Add a secure way to handle user Authentication. Password based authentication, hash and salt passwords
11+
* Libs like bcrypt.
12+
* Decentralization: Instead of a central server to manage user info and messages, a P2P, or federated architecture where each client acts as both a server and a client.
13+
14+
3. Network Architecture
15+
* Peer-to-Peer (P2P):
16+
* Each instance of the app directly connects to other instances (peers). This allows decentraization and removes the need for a central server.
17+
* Challenges: How will peers discover each other? How do you handle peer-to-peer connectivity in different networks (NAT traversal, )?, potentially add protocols like WebRTC, DHT(Distributed Hash Table), or libp2p for managing peer discoverying and communication.
18+
* Encryption between peers is essential to secure data transmission.
19+
* Federated Architecture:
20+
* instead of a single central sever, you could have multiple nodes that can communicate with each other. Each node would be responsible for manaing its users' data, acting as both server and client.
21+
* Challenges: Keeping messages synchronized between nodes while keeping data secure and avoiding centralized data collection is tricky.
22+
23+
4. Authentication & Account Management
24+
* Account Creation: Since there's no central database, each local instance would need to manage its user accounts. When a user creates an account, the app could generate a public-private keypair. The public key is shared with other users, while the private key remains secure on the user's device. This keypair can be used for:
25+
* Encryption: Encrypting/decrypting messages.
26+
* Authentication: Verifying the user identity without relying on a central authority.
27+
* Passsword Management: Storing passwords securely is important. bcrypte for ahasing and salting pswords can be useful.
28+
29+
5. Decentralization Model
30+
* Peer-to-Peer (P2P): Users directly connect to one another. Each client maintains a list of their peers and messages are exchanged directly.
31+
* Local First: Each user stores their own data locally. You could use gossip protocols to synchronize information between peers. This is how many modern distributed systems (like blockchains) work.
32+
* Hybrid Model: Some components, like peer discovery, can be centralized (e.g., a DHT or STUN servers), while actual messaging remains P2P.
33+
6. Message Exchange and Encryption
34+
35+
* End-to-End Encryption: Public-private key cryptography (using something like RSA or ECDSA) will allow you to encrypt messages sent between users. When a message is sent, the sender encrypts it using the recipient's public key, ensuring that only the recipient can decrypt it with their private key.
36+
* Symmetric Key Encryption: For efficiency, after establishing a connection between peers, symmetric key algorithms like AES can be used for the ongoing communication, as it's faster than public-key encryption.
37+
38+
7. Offline Message storage
39+
Since each user stores their data locally, you might face challenges with offline messaging. Some possibilities:
40+
* Message Queueing: If a peer is offline, you could store messages locally, and once the peer comes online, these messages are sent. This would require reliable peer discovery.
41+
* Encrypted Local Storage: To ensure security, even if someone accesses the local system, all messages should be stored encrypted on the local file system.
42+

README.md

+8-2
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,9 @@
1-
# Notes!
1+
# VimWiki
2+
## Overview
3+
This is a collection of all my vimwiki notes. It uses neovim vim wiki packer package from github to work.
24

3-
## Contains all my notes in a .md format with supplemental other files like pngs.
5+
## .gitignore
6+
- secretes = shit i dont wanna share on github
7+
- Password = obvious shit i dont wanna share on github
8+
- Youtube = Has no relivance to the public
9+
- diary = no relivance to the public

School/English.md

+1
Original file line numberDiff line numberDiff line change
@@ -3,3 +3,4 @@
33
## Assignemnts
44
- [W#7](English/W7)
55
- [BrookeNotes1](English/BrookeNotes1)
6+
- [Synthesis-Matrix-For-Linux-And-Debian](English/Synthesis-Matrix-For-Linux-And-Debian)
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
# Synthesis Matrix for Linux and Debian research
2+
3+
## Overview:
4+
5+
> I used my brook notes for this document.
6+
7+
### To view the File:
8+
- Greetings Professor, This is a markdown file. I've submitted one before but this is how I take my notes. Markdown files are cool because they can be converted into HTML very easily and be previewed as a webpage which I find pretty neat. For this matrix I did a markdown table. The plaintext of this file looks rather weird I am sure so the best way to view this file is using:
9+
- **MarkText**: This is am open-source Mardown editor and viewer for Macos, and Windows and Linux. [Source](https://www.marktext.cc/)
10+
- **NVIM**: I use this. I don't recommend it.
11+
- **markdownlivepreview.com**: This is a webpage you can compy and paste this file and see how it looks normally / on a webpage. I recommend this as you don't have to download anything.
12+
- For your convience I will also submit a DOCX.
13+
14+
## Synthesis Matrix
15+
| **Source/Author** | **Key Findings/Arguments** | **Methods/Approach** | **Connection to Research Question** |
16+
|----------------------------------------------|---------------------------------------------------------------------------------------------|-----------------------------------------------------------|--------------------------------------------------------------------------------------------------|
17+
| **Debian Documentation Project (2023)** | Comprehensive guide to compiling and maintaining the Debian Linux kernel. Covers architecture, packaging, updates, and module management. | Handbook/manual with practical step-by-step instructions. | Crucial for understanding kernel compilation in Debian, aiding system administrators in optimization. [Source](https://www.debian.org/doc/manuals/debian-kernel-handbook/) |
18+
| **Adam, George K. (2024)** | Evaluates real-time performance of Linux kernels on single-board computers with and without the PREEMPT_RT patch. | Empirical testing using custom software for latency measurements. | Important for understanding how real-time patches affect performance in low-cost, embedded systems. [Source](https://doi.org/10.3390/computers10050064) |
19+
| **Grover, M. Tim (2024)** | Explains the architecture of the Linux kernel, covering process management, memory, device control, and system calls. | Analytical review, providing insights into kernel design and its modular nature. | Offers a deep dive into the structural components of the Linux kernel, useful for developers learning the system's architecture. [Source](https://developer.ibm.com/articles/l-linux-kernel/) |
20+
| **Debian Developers (2024)** | Detailed guide for compiling, customizing, and managing the Debian kernel, focusing on open-source software principles. | Instructional guide; focuses on packaging, modules, and customization. | Essential for understanding the specifics of kernel customization in Debian systems, especially for sysadmins. [Source](https://www.debian.org/doc/manuals/debian-kernel-handbook/index.html) |
21+

School/Ethics.md

+42
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
# Ethics in Science: Data Acquisition and Reporting
2+
3+
---
4+
5+
## Question 1
6+
7+
- Prompt:
8+
- If Millikan had not written in his 1913 paper that “this is not a select group of drops but represents all of the drops experimented upon” would his actions be considered blameworthy or at the very least questionable and why? Does your answer depend on whether you view the situation as his contemporary or an observer in the present? Your explanation should be between 75 and 150 words.
9+
10+
- Response:
11+
- If Millikan had not claimed that the data in his 1913 paper "represent all of the drops experimented upon" his actions would still be questionable, though he would be less blameworthy. His statement implied full transparency, suggesting that there was no data selection, when, in reality, he excluded certain drops he deemed as unreliable, which is not scientific. From an ethical perspective, this selective "cherry-picking" or data handling will mislead others by overstating the comprehensiveness of his findings, and implying false truths. Whitbeck's framework on trustworthiness emphasizes that honest reporting and transparency are paramount arguing that even slight minor deviations from full disclosure can undermine scientific trust, and the legitimacy of the entire study. In his day and age, standards for data selection were not fully developed but rather evolving, and as such Millikan's action were seemed less unethical in his times. However, notwithstanding the foregoing, in modern day, data integrity is paramount to all, and it is a standard to make sure integrity is rigorously upheld. As such, his omission of this information would be seen as a significant breach of honesty, and would undermine his entire scientific career and trust, resulting in a lack of confidence in his other commitments to the scientific community. Overall it would bring into question his commitment to ethical standards essential to scientific trust in this day and age.
12+
13+
## Question 2-4 Case Study.
14+
15+
- Prompt:
16+
17+
- You are working in a lab as an undergraduate researcher where data are accumulated for the purposes of measuring the optical absorption of a variety of samples. For each sample, there is a large data file stored on a computer in the lab. After reviewing a lab notebook from one of your predecessors and comparing the entries to the data published by the lab, you find a gap. That is, some of the data your predecessor published are not accounted for in the lab notebook. Furthermore, you are unable to locate the computer files for this missing data.
18+
19+
### Question 2: Missing Data
20+
21+
- Prompt:
22+
- Describe a possible situation that accounts for the missing data but does not qualify as research misconduct. Explain using Whitbeck's framework.
23+
Your explanation should be between 75 and 150 words.
24+
25+
- Response:
26+
- A plausible scenario for the missing data that would not constitute research misconduct could be a technical error or an accidental deletion of data. For instance, the computer storing the data might experience a system failure, memory overloads, or whatever the case may be, to cause data corruption or flat-out loss. Alternatively, the data could be misplaced due to an organizational error or accidental overwriting errors. Using whitbeck's framework, this situation could be seen as a lapse in procedural diligence rather than an ethical violation, as there was no clear intent to deceive or misrepresent the actual findings. Whitbeck emphasizes that not all lapses are misconduct; some like negligence in data handling are indications for improvement in lap practices rather than reflect an ethical failing.
27+
28+
### Question 3: misconduct
29+
30+
- Prompt:
31+
- Describe a possible situation that accounts for the missing data and qualifies as research misconduct but not outright fraud. Explain using Whitbeck's framework.Your explanation should be between 75 and 150 words.
32+
33+
- Response:
34+
- A situation involving research misconduct could be that the predecessor excluded certain data points that did not align well with the trends, aiming to make the results appear more consistent and line up better with their analysis. This is selective reporting, or cherry picking, and while it is not fabricating data, it misrepresents the research by omitting findings that may have been relevant to a more complete understanding, and better reflecting the true nature of the situation. According to Whitbeck's framework, this action falls under "Reckless" or "negligent" conduct rather than outright fraud, as there is no direct falsification or fabrication of data, rather omitting it. By selecting omitting data the researcher is failing in their responsibility to accurately report findings and represent them, and thus undermining their trustworthiness. Whitbeck emphasizes that even when it's not intentional deception, actions compromising integrity of data presented are ethically problematic as they erode the trust that is required for reliable research.
35+
36+
### Question 4: Ethical Principles:
37+
38+
- Prompt:
39+
- Suppose you report the issue of the missing data to a graduate student in your research group. After discussing the matter for some time, the graduate student says, in a somewhat incensed tone, "I only have 6 weeks to finish my dissertation and I can’t deal with this right now. Regardless, we got the “right” result, so what difference does it make that some of the data is missing?” How should you respond? Your explanation should be between 100 and 200 words.
40+
41+
- Response:
42+
- I would acknowledge that they are pressured, and they are validated in this feeling. The pressure they feel, given their limited time to complete the dissertation is certainly a scary and daunting situation. That being said I would take the time to emphasize that scientific research depends on transparency and the integrity of data. I would further emphasize that the potential pay off is not worth the potential liability. If my friend were to be caught for what he is proposing, which to my understanding is fabrication of data points, would result is severe repercussion. They may lose their degree, they may be kicked out of school, they may be publicly discredited and never be able to work in their field again, and for what? Just to submit a dissertation on "time" that will most likely be caught for fabrication of data set, if not now, in the future? Trust in research relies not only on getting the "right" results but on the ethical presentation of the data that led to the conclusion. A lack of data sets is not unethical, and can be addressed in the dissertation itself, however, the fabrication of data is unethical and could has repercussions. Missing data would raise questions about the reliability of the entire study, but it would not put the author in an ethically problematic situation. I would suggest a practical approach, document the issuess thoroughly, note any explanations for the data gap. This documentation would be included in the dissertation for an account of the research process. I would tell him we have to upholdWhitbeck's Principles of trustworthiness and responsibility, and addressing these issues even briefly improves and ensures the integrity of the work, and it could prevent scrutinity or repercussion against him or my group.

School/Physics.md

+3
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,8 @@
11
#Physics
22

3+
## Lab
4+
- [Ethics](Ethics)
5+
36
## Lecture 2
47
- Vectors
58
- "Magnitude and direction"

School/ROTBA/paper-outline.md

+35
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
# Neuroanatomical and Neuro-Rhythmic Differences in Individuals with Homocidal Behavior
2+
3+
---
4+
5+
## Project
6+
- I want to do my paper on the neuroantomical differences and neurorhythmic difference that could be found in individuals exhibiting homocidal tendencies, thoughts, or actions when compared to a control group.
7+
8+
---
9+
10+
## Outline
11+
12+
### Introduction
13+
- Background of study and overview of the relevance of studying brain structure and function in relation to homocidal behavior.
14+
- A short oveview of violent vs nonviolent tendencies and behavior, and individuals and their relation to homocide.
15+
- A expedition on specific neuroantomical regions associated with aggression and an investigation of neurorhtymic patterns linked to impulsivity, aggression and violence.
16+
17+
### Lit Review
18+
- Summary of brain study from fMRI, MRI, and PET studies on aggressive vs non aggressive individuals.
19+
- Overview of existing research on neurorhythmic patterns and behaviors.
20+
21+
### findings
22+
- idenficiation of neurorhthmic patterns and neuroanatomical changes in aggressive behavior.
23+
- Possible biomarkers identified
24+
25+
### discussion
26+
- comparision of neuroanatomic and neurorhythmic fidings.
27+
- Clinical implications
28+
- Limiations
29+
- Future research
30+
31+
### conclusion
32+
- Summary of findings and recap significance and implications.
33+
34+
### References
35+
- A list of references i will use.

School/Rythms-Of-The-Brain.md

+4
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
# Rythms of the brain
2+
3+
## ROTB Assignments
4+
- [paper-outline](ROTBA/paper-outline)

index.md

+2
Original file line numberDiff line numberDiff line change
@@ -28,13 +28,15 @@
2828
- [Physics](School/Physics)
2929
- [HPA-Meet](School/HPA-Meet)
3030
- [English](School/English)
31+
- [Rythms-Of-The-Brain](School/Rythms-Of-The-Brain)
3132

3233
### Games
3334
- [OpenTTD](Games/OpenTTD)
3435
- [minecraft](Games/minecraft)
3536

3637
### Projects-Documentation
3738
- [Weather Projects](Projects-Documentation/Weather-Projects)
39+
- [KPChat](Projects-Documentation/KPChat)
3840

3941
### Conspiracy-Theories
4042
- [Conspiracy-Index](/Conspiracy-Theories/Conspindex.md)

0 commit comments

Comments
 (0)