Twitter cuts (#133)

Putting this here to go meta.

As discussed in the ensuing conversation, disappearing tweets provide an education in mind-control, and impermanence.

May 4, 2017admin 11 Comments »


11 Responses to this entry

  • Mariani Says:

    I feel like “Dharmaesthetics” should appreciate reminders of impermanence


    Posted on May 4th, 2017 at 3:41 pm Reply | Quote
  • SilverSpeed Says:

    You step in the stream
    But the water has moved on.
    This page is not here.


    Posted on May 4th, 2017 at 4:07 pm Reply | Quote
  • Brett Stevens Says:

    You can always embed the tweet and link to the image. A bit of a pain in the ass but might be worth it.


    Posted on May 4th, 2017 at 4:10 pm Reply | Quote
  • Wagner Says:

    When xenosystems is chopped up into a book I doubt many twitter cuts will make it in there anyway.


    Posted on May 4th, 2017 at 4:35 pm Reply | Quote
  • SVErshov Says:

    fundamental ambiguity of human existence, unresolvable too. once impermanence is fully realised you are not a human any more. very dangerously antihuman too. that is what Tibetian buddism managed to achive.


    Posted on May 4th, 2017 at 5:13 pm Reply | Quote
  • John Hannon Says:

    The Moving Finger writes; and, having writ,
    Moves on: nor all thy Piety nor Wit
    Shall lure it back to cancel half a line,
    Nor all thy Tears wash out a word of it.

    Doesn’t apply to Twitter.


    Posted on May 5th, 2017 at 6:46 am Reply | Quote
  • Bruce Arney Says:


    One good mugging can overcome the gene for progressiveness, two good muggings can make a true believer. Tibetans were slaughtered by the godless Chinese. Does making a statement by immolating oneself and dying count? To the living belong the spoils.


    John Hannon Reply:

    “To the living belong the spoils.”

    But the living always die.

    “The living being is only a species of the dead, and a very rare species …”

    – Nietzsche

    For Tibetan Yogis, life is but a dream in any case, so what do they care?
    Here’s Stephen LaBerge on Tibetan Dream Yoga (their inner-space program) –

    “One realizes that the appearance of form ‘is entirely subject to one’s will when the mental powers have been efficiently developed’ through the practice of the yoga of lucid dreaming. Having learned ‘that the character of any dream can be changed or transformed by willing that it shall be,’ the lucid dreamer takes ‘a step further … he learns that form, in the dream state, and all the multitudinous content of dreams, are merely playthings of mind, and, therefore, as unstable as a mirage.’ A process of generalization ‘leads him to the knowledge that the essential nature of form and of all things perceived by the senses in the waking state are as equally unreal as their reflexes in the dream state,’ since both waking and dreaming are states of mind. A final step brings the yogi to ‘the Great Realization’ that nothing within the experience of his mind ‘can be other than unreal like dreams.’ In this light, ‘the Universal Creation and every phenomenal thing therein’ are seen to be ‘but the content of the Supreme Dream.'”

    And here’s LaBerge on his own lucid dreaming experience –

    “So reasoning along those lines, I thought, I’d like to have a sense of what my deepest identity is, what’s my highest potential, which level is the most real in a sense? With that in mind at the beginning of a lucid dream, I was driving in my sports car down through the green, spring countryside. I see an attractive hitchhiker at the side of the road, thought of picking her up but said, ‘No, i’ve already had that dream; I want this to be a representation of my highest potential.’
    So the moment I had that thought and decided to forgo the immediate pleasure, the car started to fly into the air and the car disappeared and my body, also. Thee were symbols of traditional religions in the clouds, and as I passed through that realm, higher beyond the clouds, I entered into a vast emptiness of space that was infinite and it was filled with potential and love. And the feeling I had was – this is home! This is where I’m from and I’d forgotten that it was here. I was overwhelmed with joy about the fact that this source of being was immediately present, that it was always here, and I had not been seeing it because of what was in the way. So I started singing for joy with a voice that spanned 3 or 4 octaves and resonated with the cosmos with words like, ‘I Praise thee, O Lord!’
    There wasn’t any I, there was no thee, no Lord, no duality but, ‘Praise Be’ was sort of the feeling of it. My belief is that the experience I had of this void – that’s what you get if you take away the brain. When I thought about the meaning of that, I recognized that the deepest identity I had there was the source of being, that all and nothing that was here right now, that was what I was too, in addition to being Stephen. So the analogy I use for understanding this is that we have these separate snowflake identities. Every snowflake is different in the same sense that each one of us is, in fact, distinct. So here is death, and here’s the snowflake and we’re falling into the infinite ocean. So what do we fear? We fear that we’re going to loose our identity, we’ll be melted, dissolved in that ocean and we’ll be gone; but what may happen is that the snowflake hits the ocean and feels an infinite expansion of identity and realizes, what I was in essence, was water!
    So we’re each one of these little frozen droplets and we feel only our individuality, but not our substance, but our essential substance is common to everything in that sense, so now God is the ocean. So we’re each a little droplet of that ocean, identifying only with the form of the droplet and not with the majesty and unity.”

    Far out (or in).


    Posted on May 5th, 2017 at 4:30 pm Reply | Quote
  • G. Eiríksson Says:

    —» IT’S NOT ALWAYS easy to spot the compromises in the technology we use, where we’ve allowed corporate interests to trump public ideals like privacy and press freedom. But sometimes new developments can cast those uneasy bargains into relief—and show that the public may not have even been at the table when they were made.

    That was the case last month when, with an unassuming post to Twitter, technologist Micah Lee unveiled his latest project. It’s called OnionShare, and it’s a tiny free software app that creates a direct connection between two users, allowing them to transfer files without having to trust a middleman site like DropBox or Mega. It runs over Tor, which means that to anybody intercepting the traffic, both the sender and receiver are near-totally anonymous.

    It’s a great new software solution to a thorny problem, one that Lee described reading about in Glenn Greenwald’s new book, “No Place To Hide.” And it’s brilliant in its simplicity, too: the first functional version was only 127 lines of code, making it easier for a new developer to understand exactly what’s going on, and harder for somebody to hide a backdoor or security mistake. »—Parker Higgins, 06.27.14.


    Posted on May 6th, 2017 at 4:53 am Reply | Quote
  • G. Eiríksson Says:

    —» Learn the way how to connect 10 , 20 , 30….100 or multiple workstations from a one single CPU »


    Posted on May 6th, 2017 at 5:35 am Reply | Quote
  • G. Eiríksson Says:

    ▬» Syncthing replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to choose where it is stored, if it is shared with some third party and how it’s transmitted over the Internet.

    ▬ Simple. Syncthing doesn’t need IP addresses or advanced configuration: it just works, over LAN and over the Internet. Every machine is identified by an ID. Just give your ID to your friends, share a folder and watch: UPnP will do if you don’t want to port forward or you don’t know how.

    ▬ Web GUI. Configure and monitor Syncthing via a responsive and powerful interface accessible via your browser.

    ▬ Private. None of your data is ever stored anywhere else other than on your computers. There is no central server that might be compromised, legally or illegally.
    ▬ Encrypted. All communication is secured using TLS. The encryption used includes perfect forward secrecy to prevent any eavesdropper from ever gaining access to your data.
    Authenticated. Every node is identified by a strong cryptographic certificate. Only nodes you have explicitly allowed can connect to your cluster.
    ▬ Open Protocol. The protocol is a documented standard — no hidden magic.
    ▬ Open Development. Any bugs found are immediately visible for anyone to browse — no hidden flaws. »


    Posted on May 6th, 2017 at 9:04 am Reply | Quote

Leave a comment