This repository has been archived by the owner on Aug 25, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 138
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
docs: tutorials: rolling alice: architecting alice: entering wonderla…
…nd: What We Do When 1+1 No Longer Equals 2
- Loading branch information
John Andersen
authored
Aug 10, 2024
1 parent
34055dd
commit 4d054ce
Showing
1 changed file
with
33 additions
and
1 deletion.
There are no files selected for viewing
34 changes: 33 additions & 1 deletion
34
docs/tutorials/rolling_alice/0000_architecting_alice/0011_entering_wonderland.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,35 @@ | ||
# Volume 0: Chapter 11: Entering Wonderland | ||
# Rolling Alice: Volume 0: Chapter 11: Entering Wonderland | ||
|
||
## The Meaning of Meaningless Riddles | ||
|
||
The Merits of Insanity: With enough Chaos comes a closer to objective view of reality. The meaning of meaningless riddles once reaching full insanity becomes only that they are meaningless. They cease to be riddles. | ||
|
||
We drop them via policy on federation and re-evaluate past thoughts. Tthe prioritizer as supply chain analysis of thoughts shows the data seeding those riddles does not in fact come from trusted TCBs. | ||
|
||
```python | ||
Good_Insane = prioritizer.value_chain_analysis(Good_Insane + Good_Insane) | ||
``` | ||
|
||
These TCBs might have gone the bad way of insane. | ||
|
||
```python | ||
Bad_Insane = prioritizer.value_chain_analysis(Good_Insane + Bad_Insane) | ||
``` | ||
|
||
## What We Do When 1+1 No Longer Equals 2 | ||
|
||
Upon detection of a faulty root of trust we must trigger re-evaluation of tainted trains of thought | ||
Roots of trust may begin producing data ungrounded from any shared reality in error through no fault of their own. We must attempt to reconstruct affected trains of thought via GUAC and the like to identify deviations and recorded and hypothetical risk tolerance violations. | ||
|
||
continuous reevaluation of old trains of thought | ||
Discovery phase (execution of scientific process) yields results with higher trust / TCB assurances | ||
re-train | ||
Kick off CI/CD/MLOps | ||
The dionysian discovery method: shift left to high entropy (insanity) to re-check theories within previously unknown contexts given new data events which triggered re-eval which came from higher trust boundries | ||
|
||
- TODO | ||
- [ ] Index federated data by entities which affected it so we can purge our cache as needed | ||
|
||
## Notes for this draft tutorial | ||
|
||
> Multi stage hermetic builds enable isolated dynamic analysis. We'll use the assets, operations, flows from Party Planning to think up the stage which sources pip index from earlier stages. This will lets Alice play with new ideas within an isolated (non distructive, no internet) connected environment. |