0 sats \ 0 replies \ @Fabs 3h \ parent \ on: Groupthink as a survival strategy culture
Absolutely, they evolved to do so.
I don't know, but it sounds... Possible. π
I've noticed (also in my family) that women often times say / propose something, only to instantly scan the expressions of the people around, after which they either back paddle- or expand on their initial stance.
To me, it bears a resemblance to the idea you're proposing in your post:
- A woman's "plan of action" only goes as far as the wants, of the community; if the proposal is unpopular, it's scrapped, no matter if she'd have been right in the end.
In contrast, a man might (with the assistance of the minority) simply knuckle his proposal through, no matter the general consensus.
Something along those lines, ain't it?
Interesting, interesting. I hope that you post about your other thoughts as well, I'd gladly read them. π€ π₯β‘
Edit: Props on the formatting, I've gotta get on your level!
The first 10- 20k sats were the best for me, after that, it's like stacking BTC: the goalpost only moves farther... π€ π₯π§‘β‘
"But, it looks like a transcript of your mind. And in this sense, good job..." Spot on!
Man... You're clearly way way ahead of me... I can't answer any of those except maybe:
"if I give you my xpub and a related private key (for a public key at derivation path xpub/1/0/2), which funds could you steal from me?"
I think a malicious actor can acquire the xpriv by working backwards from the xpub + a related private key, potentially stealing all the funds.
"if I give you my xpub and a related private key at derivation path xpriv/1h/0/1, where xpriv is unknown to you, what can you steal and/or discover? (xpub is counterpart of the unknown xpriv)"
Only the "local" funds of that respective key pair?
"is it safe (or how much safe is) to give your xpub to anybody?"
Generally, yes, as long as there are no related private keys leaked.
I'm absolutely at the beginning of this topic, but man!
Could I sway you to help me improve on this part? You seem like a treasure trove. π€ π₯
Platitudes! That's it!
Lumor, you're well on your way to earning yourself a place in my heart, and that's a remarkable feat. ππ§‘
"You could go into child key derivation and how the public key of hardened child keys cannot be derived using an xpub. But I guess you are getting there."
Already covered, yet not included as it was still a bit wordy, I'll include it another time.
"My impression is that the G point might have been chosen based on it producing a high enough n before repeating the sequence when adding to itself mod p."
Yes. As for p and n, and don't know exactly, only that that's their denotation.
"Where possible, it would be nice to get some motivation. Why this procedure, instead of something else? What exactly is this accomplishing?"
Man, I don't even know that myself (yet). I'm simply trying to accrue the necessary"facts" in the right order, and form it into a sort of "canvas" to work off of, to try and have it make sense to me. π₯²
I know it's tough, and it's not even close to how broadly it could be written...
It makes you wonder how a supposedly single coder could think about all these intricacies, and have them not only make [functional] sense, but have it also weather every storm...
Mind. Blown.
I'm pushing close to a hundred hours on the first part and second draft alone... I'm happy to call it a day on those when it's done.
Hah! I most likely will, but man: ECC and key derivation are tricky!
After that I'll move back to some of the easier stuff. Thanks. ππ
None. "occult, mind control, toxic food, bitcoin, the 7 sins, etc." might be some of the last things on their mind, whereas food, water, a safe-ish place to sleep and (likely) their next hit of whatever drug they're coping with will most likely be the very things they do have on their mind.