AutoDidacticism

a.k.a Self-Learning

Autodidacts take learning into their own hands

Autodidacticism (also autodidactism) or self-education (also self-learning and  self-teaching) is education without the guidance of masters (such as teachers  and professors) or institutions (such as schools).

Generally, autodidacts are individuals who choose the subject they will study, their studying material, and the studying rhythm and time.

Autodidacts may or may not have formal education, and their study may be either a complement or an alternative to formal education.

Many notable contributions have been made by autodidacts.


Etymology

The term has its roots in the Ancient Greek  words αὐτός (autóslit. ’self’) and διδακτικός (didaktikos, lit. ’teaching’).

The related term didacticism defines an artistic  philosophy of education.


Features Of Autodidactism
Benefits of Being an Autodidact
Leonardo da Vinci
Rabindranath Tagore

“My advice, as in everything, is to read widely and think for yourself.

We need more dissent and less dogma.”

Camille Paglia

“For those of you who may be homeschooled: high school is that four-year asylum where they put teenagers because we have no idea what else to do with them.”

Anthony Esolen

“There is nothing to be gained by pretending that academic involvement is necessary, or even always desirable, in the quest for truth and knowledge.”

Christopher Langan

“Drop out of school before your mind rots from exposure to our mediocre educational system.

Forget about the Senior Prom and go to the library and educate yourself if you’ve got any guts.

Some of you like Pep rallies and plastic robots who tell you what to read.

Forget I mentioned it.

This song has no message.

Rise for the flag salute.”

Frank Zappa, liner notes for song “Hungry Freaks Daddy” on the album “Freak Out!

“That man is intellectually of the mass who, in the face of any problem, is satisfied with thinking the first thing he finds in his head.

On the contrary, the excellent man is he who condemns what he finds in his mind without previous effort, and only accepts as worthy of him what is still far above him and what requires a further effort in order to be reached.”

José Ortega y Gasset, The Revolt of the Masses (1929)

“When brought to the proletariat from the capitalist class, science is invariably adapted to suit capitalist interests.

What the proletariat needs is a scientific understanding of its own position in society.

That kind of science a worker cannot obtain in the officially and socially approved manner. …

For this reason he must be completely self-taught.”

Karl Kautsky

“Only the autodidacts are free.”

Nassim Nicholas Taleb, “Antifragile: Things That Gain from Disorder”

Autodidacts in Action

Sources :

http://www.goodreads.com

http://www.wikiquote.com

http://www.wikipedia.com




Kudos to @ChessurKot

I 💚 it so much i had to share it !!!

Amazing poster and imagination !!!

Shared with 💚 by Free Spirit

✌ & 💚

B-Money

Web Dai – B-Money

I am fascinated by Tim May's crypto-anarchy. 

Unlike the communities
traditionally associated with the word "anarchy", in a crypto-anarchy the
government is not temporarily destroyed but permanently forbidden and
permanently unnecessary.

It's a community where the threat of violence is
impotent because violence is impossible, and violence is impossible because its participants cannot be linked to their true names or physical locations.
 
Until now it's not clear, even theoretically, how such a community could operate.

A community is defined by the cooperation of its participants, and efficient cooperation requires a medium of exchange (money) and a way to enforce contracts.

Traditionally these services have been provided by the government or government sponsored institutions and only to legal entities.

In this article I describe a protocol by which these services can be provided to and by untraceable entities.
 
I will actually describe two protocols. The first one is impractical,because it makes heavy use of a synchronous and unjammable anonymous
broadcast channel. However it will motivate the second, more practical protocol.

In both cases I will assume the existence of an untraceable network, where senders and receivers are identified only by digital
pseudonyms (i.e. public keys) and every messages is signed by its sender
and encrypted to its receiver.
 
In the first protocol, every participant maintains a (seperate) database of how much money belongs to each pseudonym. These accounts collectively define the ownership of money, and how these accounts are updated is the subject of this protocol.
 
1. The creation of money. Anyone can create money by broadcasting the
solution to a previously unsolved computational problem. The only
conditions are that it must be easy to determine how much computing effort
it took to solve the problem and the solution must otherwise have no
value, either practical or intellectual. The number of monetary units
created is equal to the cost of the computing effort in terms of a
standard basket of commodities. For example if a problem takes 100 hours
to solve on the computer that solves it most economically, and it takes 3
standard baskets to purchase 100 hours of computing time on that computer
on the open market, then upon the broadcast of the solution to that
problem everyone credits the broadcaster's account by 3 units.
 
2. The transfer of money. If Alice (owner of pseudonym K_A) wishes to
transfer X units of money to Bob (owner of pseudonym K_B), she broadcasts
the message "I give X units of money to K_B" signed by K_A.
 
Upon the broadcast of this message, everyone debits K_A's account by X units and
credits K_B's account by X units, unless this would create a negative
balance in K_A's account in which case the message is ignored.
 
3. The effecting of contracts. A valid contract must include a maximum
reparation in case of default for each participant party to it. It should
also include a party who will perform arbitration should there be a
dispute. All parties to a contract including the arbitrator must broadcast
their signatures of it before it becomes effective. Upon the broadcast of
the contract and all signatures, every participant debits the account of
each party by the amount of his maximum reparation and credits a special
account identified by a secure hash of the contract by the sum the maximum
reparations. The contract becomes effective if the debits succeed for
every party without producing a negative balance, otherwise the contract
is ignored and the accounts are rolled back. A sample contract might look
like this:
 
K_A agrees to send K_B the solution to problem P before 0:0:0 1/1/2000.
K_B agrees to pay K_A 100 MU (monetary units) before 0:0:0 1/1/2000. K_C
agrees to perform arbitration in case of dispute. K_A agrees to pay a
maximum of 1000 MU in case of default. K_B agrees to pay a maximum of 200
MU in case of default. K_C agrees to pay a maximum of 500 MU in case of
default.
 
4. The conclusion of contracts. If a contract concludes without dispute,
each party broadcasts a signed message "The contract with SHA-1 hash H
concludes without reparations." or possibly "The contract with SHA-1 hash
H concludes with the following reparations: ..." Upon the broadcast of all
signatures, every participant credits the account of each party by the
amount of his maximum reparation, removes the contract account, then
credits or debits the account of each party according to the reparation
schedule if there is one.
 
5. The enforcement of contracts. If the parties to a contract cannot agree
on an appropriate conclusion even with the help of the arbitrator, each
party broadcasts a suggested reparation/fine schedule and any arguments or
evidence in his favor. Each participant makes a determination as to the
actual reparations and/or fines, and modifies his accounts accordingly.
 
In the second protocol, the accounts of who has how much money are kept by
a subset of the participants (called servers from now on) instead of
everyone. These servers are linked by a Usenet-style broadcast channel.

The format of transaction messages broadcasted on this channel remain the
same as in the first protocol, but the affected participants of each
transaction should verify that the message has been received and
successfully processed by a randomly selected subset of the servers.
 
Since the servers must be trusted to a degree, some mechanism is needed to
keep them honest. Each server is required to deposit a certain amount of
money in a special account to be used as potential fines or rewards for
proof of misconduct. Also, each server must periodically publish and
commit to its current money creation and money ownership databases. Each
participant should verify that his own account balances are correct and
that the sum of the account balances is not greater than the total amount
of money created. This prevents the servers, even in total collusion, from
permanently and costlessly expanding the money supply. New servers can
also use the published databases to synchronize with existing servers.
 
The protocol proposed in this article allows untraceable pseudonymous
entities to cooperate with each other more efficiently, by providing them
with a medium of exchange and a method of enforcing contracts. The
protocol can probably be made more efficient and secure, but I hope this
is a step toward making crypto-anarchy a practical as well as theoretical
possibility.
 
-------
 
Appendix A: alternative b-money creation
 
One of the more problematic parts in the b-money protocol is money
creation. This part of the protocol requires that all of the account
keepers decide and agree on the cost of particular computations.
Unfortunately because computing technology tends to advance rapidly and
not always publicly, this information may be unavailable, inaccurate, or
outdated, all of which would cause serious problems for the protocol.
 
So I propose an alternative money creation subprotocol, in which account
keepers (everyone in the first protocol, or the servers in the second
protocol) instead decide and agree on the amount of b-money to be created
each period, with the cost of creating that money determined by an
auction. Each money creation period is divided up into four phases, as
follows:
 
1. Planning. The account keepers compute and negotiate with each other to
determine an optimal increase in the money supply for the next period.

Whether or not the account keepers can reach a consensus, they each
broadcast their money creation quota and any macroeconomic calculations
done to support the figures.
 
2. Bidding. Anyone who wants to create b-money broadcasts a bid in the
form of <x, y> where x is the amount of b-money he wants to create, and y
is an unsolved problem from a predetermined problem class. Each problem in
this class should have a nominal cost (in MIPS-years say) which is
publicly agreed on.
 
3. Computation. After seeing the bids, the ones who placed bids in the
bidding phase may now solve the problems in their bids and broadcast the
solutions.
 
4. Money creation. Each account keeper accepts the highest bids (among
those who actually broadcasted solutions) in terms of nominal cost per
unit of b-money created and credits the bidders' accounts accordingly

http://www.weidai.com/bmoney.txt

Shared with 💚 by Free Spirit

✌ & 💚

The War for a Free Internet

The War for a Free Internet

David Vorick

Feb 14

” I came of age on the Internet. By the age of 13, I had more friends whose faces I would never see than I had peers in the classroom. Most of them won’t realize today who I am even if they are reading this now. Most of them didn’t realize I was decades their junior.

When my father was growing up, his freedom was his bicycle. It gave him access to friends, to a job, freedom from his parents, and ultimately space to carve out a personality that he could call his own. He wanted nothing more than to pass these gifts along to me, and it was often to his dismay and frustration that I never found the same joy in my bike that he had found in his.

I was too young to realize it at the time, but I had received the same gifts as my father.

Where my father’s freedom was his bicycle, my freedom was my keyboard.

A denizen of dozens of forums and hundreds of websites, countless hours each weekend contributed elements to my personality that raised me to be someone beyond anything I could have become in my hometown alone.

As middle school became high school, my online hours began to exceed my offline hours. By my sophomore year of college I was spending more than 80 hours per week on the Internet.

The Internet has become the keystone of modern society, a fact that has not been overlooked by our corporate giants.

As the 2010’s progressed, the Internet became a massive land grab. A hundred thousand independently operated forums became one front page of the Internet.

Personal cards, handwritten letters, and cozy phonecalls turned into a single wall that wished you “Happy Birthday” 1,000 times on what was often not even the right day.

What used to be an endless exploration of hand curated forums and webpages turned into a bottomless pit of AI generated filth carefully crafted by teams of PhDs with the sole intention of getting you to stare at your phone for just a little bit longer.

The modern Internet has been absolutely steamrolled by the likes of Google, Facebook, and Amazon.

As these platforms have festered, they’ve made it clear that we’re here to play by their rules.

They decide which of our friends we get updates from.

They decide how large a nose ring can be before a content creator gets demonetized and loses their livelihood.

An uncomfortable percentage of our time is spent under the tyranny of whatever logic was implemented in the pursuit of higher profits next quarter.

Somewhere underneath it all, real people are living every day, taking what breaths they can between the inescapable deluge of content spawning from a clinical addiction to their devices.

The next wave of teenagers are coming of age in this environment and they are suffocating. Suicide rates are up almost 50% since 2007 for people under the age of 24.

The modern Internet is making us miserable.

Our overlords have captured our souls by bringing us gifts of amazing technology and bundling with those gifts chains and cages that capture our minds and manipulate us to maximize their bottom line.

The time has come to stand up for ourselves, for our health, and for the next generation.

The time has come to start the War for a Free Internet. “

WRITTEN BY

David Vorick

Shared with 💚 by Free Spirit

  • CBDC’s Tyranny Is Coming
    How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money whenever they deemed fit but they could also devalue the currency. Lack of privacy The government will be aware of all of … Continue reading CBDC’s Tyranny Is Coming
  • 100 Based things
    Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to truly ensure that what someone is saying is true is to verify it yourself. Relying on trust to make important decisions is … Continue reading 100 Based things
  • CypherPunk Movement
    THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography for the People Encryption was primarily used for military purposes before the 1970s. People at that time were living in an analog … Continue reading CypherPunk Movement
  • Block 170 – First ever bitcoin transaction
    The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used because it is a more expensive, less private, and less secure way of receiving bitcoin than other methods. • Transaction: f4184fc596403b9d638783cf57adfe4c75c605f6356fbc91338530e9831e9e16Timestamp: ‎2009-01-12 … Continue reading Block 170 – First ever bitcoin transaction
  • The Art of War Quotes
    The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The work, which is attributed to the ancient Chinese military strategist Sun Tzu (“Master Sun”), is composed of 13 chapters. Each one is … Continue reading The Art of War Quotes
With 💚