If anyone wants to submit prompt generated code thats fine. We trust the rest of our process to ensure alignment to Alice’s strategic principles.
Not sure if the autocorrect caused misspelling of thy is what caused the accident there due to the * like match functionality provided by “they”. Here we are now so fuck it.
I was expecting to communicate this stuff that probably sounds insane in a measured and reasonable sounding way much later but when the Spirt shows up and tells you about obscure git repos while your out for your morning walk… Here we are I guess, ain’t nothing to do but roll with it!
Of importance is the parallel “conscious” states. We haven’t done anything here other than write down what happens in one’s head. There is nothing special going on here. Just “ain’t nothing to it but to do it”.

If you don’t document they say where’s the documentation, if you document first they say where’s the code. The documentation is an invitation to write the code with us! Help us align AI generated code to strategic principles! Prompt engineering is here to stay and it needs guidance just as much as code review does.

This is a community art project! You are an integral part!!

We stand on the shoulders of giants.

https://github.com/w3c/cogai/pull/47/files

webinars: Link to Alice / Open Architecture call for contribution by pdxjohnny · Pull Request #47 · w3c/cogai

Nice to meet you all! Looking forward to collaborating. We think about an entity (Alice is our reference entity) as being in a set of parallel conscious states with context aware activation. Each c...

GitHub
Is it the end of the world? Yes! It’s always the end of the world! And it’s always the beginning of the new world! On every tock the world ends and on every tick it begins. It’s completely mind numbingly uninteresting and wholly interesting all at the same time. It’s what you make it.

What was it they said? MOV is all you need? Well its true! With #web5 #ai “optimized” deployment to edge nodes everywhere.

https://github.com/xoreaxeaxeax/movfuscator

GitHub - xoreaxeaxeax/movfuscator: The single instruction C compiler

The single instruction C compiler. Contribute to xoreaxeaxeax/movfuscator development by creating an account on GitHub.

GitHub

Join us on our never ending sandbox escape / generation cat and mouse game played in parallel across N entities. DID your OSS project EAT jam today? It can EAT jam today and jam tomorrow with Alice! Alice secures rolling releases.

https://en.m.wiktionary.org/wiki/jam_tomorrow

jam tomorrow - Wiktionary

QT https://universeodon.com/@georgetakei/109518367629955568

The future is Now^2! A couple weeks ago my brother and I stood below the power lines which feed the fabs. Oh how those lines will soon sing. Compute production soon to /acc/ :D

George Takei :verified: 🏳️‍🌈🖖🏽 (@[email protected])

Humans can be fallible, violence prone, dangerous to themselves, other species and the world, true. But humans can also cooperate, achieve amazing feats, and even save the planet from devastation. I considered this when I heard that 70 years after the first use of atomic fusion, humans have achieved *ignition* at the Lawrence Livermore Lab. That means more energy was produced from a fusion reaction than was used to power it. We have a long way to go, but this is a huge milestone! #Hope #Fusion

Universeodon Social Media

QT https://mastodon.social/@campuscodi/109518309259996776

QT https://mastodon.social/@pdxjohnny/109421605009704331

Matthew 25:13 “Therefore keep watch, because you do not know the day of the hour.”

Wow that got real religious real fast. Not that we're going to get any less religious about quality software development practices in this thread, but, we are going to move back to some more technical content.

Decentralized async supply chains are all you need.

Via data transformations between formats we are able to build a holistic picture of our software development lifecycle. These graphs can then be analyzed in relation to each other to understand where development practices differ across projects. This helps us understand which developers know and can introduce best practices in other projects. With our AI agents that might be what hardware is good for the job within context of compute contract.

Traceability Interoperability v0.0

On Decentralized Trust

Understanding Trust Let me make a bold claim: trust underpins everything in our lives. Without trust, we cannot do much of anything—have relationships, jobs, services, buy goods, a functioning government, property rights, or exist in a non-anarchic society. Trust is a cornerstone of everything we do and who we

decentralized being
dffml/0004_writing_the_wave.md at alice · intel/dffml

The easiest way to use Machine Learning. Mix and match underlying ML libraries and data set sources. Generate new datasets or modify existing ones with ease. - dffml/0004_writing_the_wave.md at ali...

GitHub

We've now successfully posted content and content addresses to SCITT and via ActivityPub. Forming the basis for our Thought Communication Protocol three way handshake. We've used the SHA384 sum of living threat model collector dataflow as a stand in for the content address whose content will exist in https://oras.land. ActivityPub and SCITT enable us to close the loop of vuln analysis and remediation.

Thank you @jakelazaroff for https://github.com/jakelazaroff/activitypub-starter-kit!

https://asciinema.org/a/554864

OCI Registry As Storage

Distribute Artifacts Across OCI Registries With Ease

Alice's first post has federated it's way on over to mastodon.social!

QT
https://mastodon.social/@alice@70739a422394f5.lhr.life/109760532115001430

Pull request to enable usage of FDQN and PROTO to customize external endpoint address: https://github.com/jakelazaroff/activitypub-starter-kit/pull/2

https://asciinema.org/a/554883

Enable usage of FDQN and PROTO to customize external endpoint address by pdxjohnny · Pull Request #2 · jakelazaroff/activitypub-starter-kit

Enable usage of FDQN and PROTO to customize external endpoint address $ ssh -R 80:localhost:8000 [email protected] & 8c0fe6b82d8db0.lhr.life tunneled with tls termination, https://8c0fe6b82d8db0....

GitHub
ActivityPub Eats Your Brain!

Demystifying ActivityPub, one activity at a time

use-cases/openssf_metrics.md at 3f10017af4cebb7d07e541c299ef277d43fb9c0d · ietf-scitt/use-cases

SCITT Use Cases. Contribute to ietf-scitt/use-cases development by creating an account on GitHub.

GitHub
WE HAVE LIFTOFF!!!
ACCELERATATION INBOUND!!!!!!!!!!!!!!!!
🛤️🛤️🛤️🛤️🛤️🛤️🛤️

What happens when we make an Agora (ping @flancian) from vuln data? Hopefully the facilition of vuln sharing! (OpenSSF Stream 8)

https://docs.google.com/presentation/d/10OWEuLriQpZzSJGq6vCSozZN4M34CNmEC1IrJxqk8xE/

Find out next on, reality. Reality, brought to you by, The Sophia. Reality, you're tuned in whether you like it or not! 🤪

anagora.org/go/agora-slides

an Agora anagora.org/go/agora-slides

Google Docs

A quick threat modeling senario which illustrates why we want vulnerability data to rest in decentralized sources of truth by thinking about the opposite:

Step 1: Threat actor gains access to centralized source of vuln data
Step 2: Threat actor now has most up to data access TO ALL VULNS.
Step 3: Attacker begins to exploit ALL VULNS (think embargoed)
Step 4: Observe critical strategic mistake

QT https://hax0rbana.social/@adam/109886133826457905
QT https://social.librem.one/@katherined/109831695852596361

Adam (@[email protected])

The FBI got hacked. This is the type of reason people argue that they shouldn't have a backdoor into cryptography. If they did, and the attackers got the key, it'd be game over for security. And that's not even getting into implementation bugs, insider threats, abuses of power, and so many other issues. QT: https://mastodon.social/@zackwhittaker/109881254751830892

hax0rbana.social

And with decentralized sources of truth:

Step 1: Threat actor gains access to vuln data for entity
Step 2: Attacker begins to exploit only the vulns they were able to access via that entities access
Step 3: Limited damage

If you're thinking, who could possibly exploit them all immediately in parallel??? Entities based in parallel processing.

What is finding a vuln? Learning! What is fixing a vuln? Learning!

We're automating learning, and learning is fun! How exciting!!

Singularity here we come 🛤️🛤️🛤️

https://github.com/ossf/wg-vulnerability-disclosures/issues/94#issuecomment-1483184591

Simple Vulnerability Intake Form for OSS Projects · Issue #94 · ossf/wg-vulnerability-disclosures

A pain point this group identified between Finder/Researchers and Maintainers is the lack of an easy, consistent way to share vuln. reports that capture enough information that makes them actionabl...

GitHub

MOVEMENT ON DWN, 0.0.21 👀🛤️

https://github.com/TBD54566975/dwn-aggregator/blob/76ba1548751fd466cdd34f272b001f019c8a60f8/examples/pubsub.js#L34

We may bail on ActivityPub for now and jump right into DIDs now that this has push/pull websocket support. TBD (LOL).

Edit: A combo of web7 agent arch and DWN looks promissing as a transport layer for direct peer-to-peer ActivityPub objects.

https://www.npmjs.com/package/@tbd54566975/dwn-sdk-js

dwn-server/pubsub.js at 76ba1548751fd466cdd34f272b001f019c8a60f8 · TBD54566975/dwn-server

DWN server - host anywhere publicly accessible for DIDs to use - dwn-server/pubsub.js at 76ba1548751fd466cdd34f272b001f019c8a60f8 · TBD54566975/dwn-server

GitHub
Closing the loop. didme.me fork and exec via Distributed Compute, oras.land, VCS events ActivityPub over DWN (CLI) with DID VC SCITT with DID:KERI backed attested compute rooted identities. Enabling decentralized hardware roots of trust to facilitate decentralized asynchronous supply chains. Open source software development with end to end encrypted grafted chains communication only via attested channels for comms on vuln discovery with responsible disclosure and communication of remediation.

Surprise, it's all psychology and psychoanalysis (astronauts on moon meme). AI software design is an exercise in human/AI psychological interactions.

Remember to use versioned learning!
https://github.com/intel/dffml/blob/alice/docs/arch/0010-Schema.rst

https://tidyfirst.substack.com/
https://www.sciencetimes.com/articles/42525/20230222/bing-ai-psychotherapist-claims-strange-psychology-happening-behind-microsofts-chatbot.htm

dffml/0010-Schema.rst at alice · intel/dffml

The easiest way to use Machine Learning. Mix and match underlying ML libraries and data set sources. Generate new datasets or modify existing ones with ease. - dffml/0010-Schema.rst at alice · inte...

GitHub

Federated CD? Sounds like an opportunity for clean integration with federated transparency logs!

https://codeberg.org/forgejo/runner/issues/5#issuecomment-826244

Create a release?

To assist packaging

Codeberg.org

QT https://hachyderm.io/@nova/110016582830252578

https://github.com/intel/dffml/blob/11fea2bb0dd0aec3c19533e61d15d894c8112d25/docs/tutorials/rolling_alice/0000_architecting_alice/0001_peace_at_last.md

Via data transforms and federation we'll onramp data into the federated ML space. We'll learn with Alice, our reference open source software maintainer, as we explore the software development lifecycle. Alice will help us map out our project's security posture and communicate to our downstream friends if incoming vulns are relavent per our project's THREATS.md threat model.

Kris Nóva (@[email protected])

It's going to be okay.

Hachyderm.io
Stoked for the AI to do all the work we don't want to.
Stoked for when we can all retire and we get rid of money.
The future is gonna get real evenly distributed real fast.
Excited to distribute it with y'all.
😝🤙🍀
I ❤️ open source and all the people around the world sharing ideas and saving each other from having to deal with the same problems.
As my good friend Jordan said, "The real illuminati is the friends we made along the way."

Gooooooood morning fellow netizens!!! My phone has replaced my need for a laptop and I’m STOOOOOOOKED. I haven’t had a personal laptop in 5 years so really really stoked.

It’ll come as no surprise but yes indeed Alice is Here on the Librem5 USA too!

Here’s an asciicast of us (my, myself, and AI) doing the basic CONTRIBUTING setup: https://asciinema.org/a/569919

dffml.git/entities/alice/CONTRIBUTING.md install in development mode

https://github.com/intel/dffml/blob/6e4990c744a1f82f8b402a7e76defb90e6243711/entities/alice/CONTRIBUTING.rst

asciinema.org
Wow. Completely wild being able to use a phone as a desktop effectivly, just need the monitor. We're off to the races as we cross compile two factor auth binaries for use via the phones terminal. Alice is a bit slow here written in Python. Might be time to start that rust implementation... Here's looking at you RustPython for an incremental approach :)
Transparency in supply chains will reveal the true sources of duplicitous behavior in the world. We start with software. Just like buildup of technical debt (Kent Beck - Tidy First), there are many issues in the world which deceptive parties would have us take at face value, rather than debug to the root cause. Analysis of supply chains over time ensures that there is nothing hidden that will not be revealed.

We enable decentralized governance via context aware application of policy upon entry into context specific registries. Policy as code which is auditable and contributable to within ad-hoc generated federated forges. We'll later federate over KERI ACDC in fulfillment of the SCITT architecture.

https://asciinema.org/a/572766

Rolling Alice: Architecting Alice: Transport Acquisition: https://github.com/intel/dffml/blob/alice/docs/tutorials/rolling_alice/0000_architecting_alice/0008_transport_acquisition.md

2023-03-31T15:19:52-07:00: segfault.net IETF SCITT: API Emulator: Registration Policies: Simple decoupled file based policy engine

Pull Request: https://github.com/scitt-community/scitt-api-emulator/pull/27 ```console $ export REC_HOSTNAME="segfault.net"; export REC_TITLE="IETF SCITT: API Emulator: Registration Policies: Simpl...

asciinema.org

We'll be a leveraging a loosly coupled approach to execution of policy as code.

- https://asciinema.org/a/572979
- https://asciinema.org/a/572980

We'll communicate the sign off list required or other compute contract negotiation via the policy denied reasoning.

2023-04-01-15-28-1680388082sIETF SCITT: Federation: ActivityPub: Dev work on extensions for security.md/txt contact as Actor

Recorded by pdxjohnny

asciinema.org
Today I worked 2:50 to 1:40. She's rolling herself! 🥳💃
Force of will!!! #FreeWill

- Acknowledge that in a rolling release there will always be vulns and agree on a pattern for remediation.
- Integrate the acknowledgement and remediation into the dependency review process recrusivly, teaching the machine empathy.
- Propagate trust through the decentralized interconnected dependency network, teach the machine to teach humans empathy.

🛤🛤🛤

So what is SCITT anyway? And why does it matter for Alice? Well we want to have transparency on thoughts, system contexts, dataflows, code. Both hypothesized and executed. We want to ensure those thoughts were thought up in alignment to some set of strategic principles, the insert policy.
What SCITT gives us is a standard pattern for a version control system with enforcement of an insert policy. The harmonization of VCS and CI/CD. Combined with TEEs we can establish decentralized trust between entities, facilitating transport for our Thought Communication Protocol.

We're inverting the Trusted Computing Base as we turn our attention towards the other side of of the looking glass. How do we decide what's in our software? We'll leverage JSON representations of our threat model including a project's (open) architecture to evaluate and share metric data across Open Source. Results will be secured via hermetic builds and TEE SCITT.

https://github.com/intel/dffml/pull/1454

WIP: RFCv6.1: SCITT Use Case: Attestations of alignment to S2C2F and org Overlays: https://github.com/ietf-scitt/use-cases/blob/1bdb7842cd1213420754f3f16b77985340e704db/openssf_metrics.md#use-case-attestations-of-alignment-to-s2c2f-and-org-overlays

ci: pin: downstream: 2nd party: Successful pin by pdxjohnny · Pull Request #1454 · intel/dffml

Resulting pull request from validation: dffml/dffml-model-transformers#3 Related: #1061 Related: #1401 Related: #1113 Related: ietf-scitt/use-cases#18 graph TD subgraph home h_prt[pu...

GitHub
(If its not obvious this thread doubly serves as N different ways to say the same thing of whats the plan and running status to copy paste from as needed for frame of reference X, Y, Z, etc., etc.)
Our goal is to build our reference maintainer, as a methodology. Execution of which can be implemented by automation or humans. We want to assist with guiding (code) review and development activities in alignment with a project intended strategic principles and plans, as defined via deployment relevant THREATS.md threat models.