Total Pageviews

Search This Blog

Saturday, May 9, 2026

what I wish was taught in schools about sex

I had "sex education" in 9th grade science class. It was mostly the biology of human reproduction, and nothing I didn't know already. What is far more important are the social and emotional aspects. 

Adults are reluctant to talk about sex in general and especially around children. Some oppose sex education because they think it will make teens more likely to experiment. I think the real reason is they feel embarrassed when they talk about it. 

Here's what schools should teach:

1. Fetuses have been observed masturbating in ultrasound images. Everyone experiences many orgasms long before they actually have intercourse.

2. The loss of your virginity will likely be a disappointing experience. 

3. Many people lie about their sex lives.

4. Stupid people boast of their sexual prowess to shame the intelligent and the gullible. 

5. About 20% of American men will have sex with prostitutes at some point in their lives. 

6. Smarter people have fewer children and have them later in life. They are also better parents.  

7. You'll lose money if you chase women, but you'll never lose women if you chase money. 

8. For every pot, there is a lid. 

9. Sometimes the juice is not worth the squeeze. 

10. Don't buy the cow if you get the milk for free. 


I think adults like having "secret" knowledge since they perceive that it gives them power over children. It's sort of like the Santa Claus mythos. 

If I had to put a number on it, I'd say sex with a woman gave me about $20 of happiness, and sex with a beautiful woman gave me about $40. $20 will get you a fast-food meal and a 6-pack of good beer with a few bucks left over. 

I'm short, shy, and have been fat most of my life. I'm probably in the 10th percentile for sexual attractiveness. Even so, I've dated many women and had a few girlfriends. My conclusion is that it's not that big a deal. 

an introvert "survival" guide

There is a military concept called the survivability onion. It has the following layers:

don't be in range of enemy weapons
if in range, know where they are to avoid detection
if detected, take cover to avoid being fired upon
if fired upon, have armor and a weapon for protection

I think something similar can help introverts in a world designed for extroverts. 

1. Realize that provocations, insults, etc. are inevitable no matter how much you avoid them. 

2. Avoid irritating people and circumstances

3. If there is an annoying stimulus, ignore it if possible

4. If the provocation continues, leave the vicinity if possible

5. If you must respond, use humor or sarcasm first

6. Be prepared to defend yourself physically before they touch you

Smaller people, especially men, are perceived as easier targets. The best self-defense weapon for most people is a quick-opening knife. They're cheap, portable, and very few people will press an attack against someone holding a knife.

If you're quiet and keep to yourself, realize that some people will provoke you because they want to "break you out of your shell". 

If you don't like to yell, swear, or use insults. a hard stare can deter aggression. 

It's best to conceal your intelligence. Showing it arouses resentment and makes others eager to humiliate you. 

If you look crazy or dangerous (unusual hair or clothes), people will leave you alone. There are pros and cons to this. 

Mere honesty is often perceived as the most insulting. 

If you're Christian, it's best to interpret "turn the other cheek" as "don't retaliate immediately". 

In any group of people. your basic options are conform, suffer, or leave. Be average if you want lots of friends. 


Thursday, May 7, 2026

let us pray


one time pad encryption example using alternating sin(x) and ln(x) as a random number generator

digits 1-9 = 00 to 09
alphabet = 10 to 35 
enigma style, no spaces, no punctuation
alternate ln and sin
2-digit random numbers added to each code group
use mod(10) addition 

attack at dawn

a t t a c k a t d a w n

plaintext
10 29 29 10 12 20 10 29 13 10 32 23

10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
a    b   c   d   e   f    g   h   i    j   k   l    m  n   o   p   q    r   s   t    u   v   w   x   y   z

ln(123) = 4.8121843554

81 21 84 35 54

sin(54) = 0.8090169944

80 90 16 99 44

ln(44) = 3.7841896339

78 41 89 63 39 

ciphertext
91 50 13 45 66 00 00 45 12 54 10 64 

use mod(10) subtraction to decrypt

precision

 


Saturday, May 2, 2026

rally point


The Collatz conjecture and cryptographically secure random number generators (one-way functions exist!)

The Collatz Conjecture is an iterative process with two equations whereby given any initial integer, the eventual result will be 1. No counterexample has been found since the conjecture was made in 1937 despite testing every positive integer up to and far beyond a trillion. The conjecture remains unproven. It is also impossible to predict how many iterations it will take for any starting value to converge to 1. 

I believe cryptographically secure random numbers can also be made through an iterative process. Alternating the natural logarithm and sine seem to work particularly well as they consistently produce a decimal with at least 10 digits. Before explaining it further, I will give a brief overview of the one-time pad method of cryptography. This is the only encryption method which is theoretically unbreakable.

Here's how it works. First, a plaintext dictionary is made where each unique word is assigned a 4-digit code between 0000 and 9999. That gives a vocabulary of 10,000 words, which is more than enough for clear communication. In any language, a vocabulary of 6,000 words covers about 95% of what is written or spoken. When the message is being encrypted, a random 4-digit number from a pad is added to each code word. Because there are two unknowns (the code word and the random number) but only one "equation" (the encrypted message), there is no way for an interceptor to decode the message. The only times encrypted messages from one-time pads have been cracked happened when the same set of random numbers were used for multiple messages.   

I don't know how the KGB generated its random numbers, but I suspect they started out with something like tables of square roots, trigonometric functions, or logarithms. Those were worked out to 4 decimal places in old reference books such as Machinery's Handbook. 

The problem with trying to use an equation or a group of them to produce random numbers through iteration is if the number of digits being iterated is the same as the seed value, eventually the seed value will be produced by one of the iterations. The obvious solution to this is to make the seed value a different number of digits than the iteration values. Here are a few examples to clarify:

If I use the calculator on my phone take the sine, logarithm, or square root of almost any 2-digit number, I will get a 10-digit decimal. I can use the first 8 digits to make two 4-digit code groups and use the last 2 digits to iterate the process. 

sin(10) = 0.1736481777

sin(77) = 0.9743700648

sin(48) = 0.7431448255

I get the following as random numbers: 1736, 4817, 9743, 7006, 7431, 4482. 

If I iterate further, I get stuck in a loop of sin(42), sin(64), and sin(63). This pattern, I suspect, plays out for every function similar to the Collatz conjecture. It probably also plays out for any combination of functions. 

For the purposes of cryptography, it doesn't matter if a function or set of functions gets stuck in a loop so long as that takes several hundred iterations to happen. 

If I start with a 3-digit seed value, and alternate ln and sin, I get something like this:

ln(123) = 4.8121843554

sin(54) = 0.8090169944

ln(44) = 3.7841896339

sin(39) = 0.6293203910 

With this method, it is impossible for the iteration to produce the seed value because the number of digits is different. It is possible, even likely, that this set of equations will get stuck in a loop after enough iterations. A computer program would be useful for checking that. Thus, to send an encrypted 
message using this system, all the two communicants need are a shared code group dictionary, seed value, set of equations, and their phone calculators. 

It would take some work to identify which combinations of equations and seed values produce the most random numbers before getting stuck in a loop. Here again computers would be useful. Finding the right combination of equations and seed values would be akin to the search for large prime numbers. 

Even if the nature of the encryption algorithm was public knowledge, this method would still require a brute force attack to break. An attacker would need to try different equations and different seed values. The number of possibilities for both are very large. For example, both the functions above could be multiplied by some constant or have some value added. That would introduce even more unknowns. 

I used to believe any code produced by a machine could be broken by a machine. Some algorithms really have the secret sauce. In short, one-way functions exist.