Twitter | Search | |
Authentic Wm. Gibson
Synopses for William Gibson novels that are definitely 100% real, but only in a timeline with greater authenticity than this one.
1,603
Tweets
366
Following
2,920
Followers
Tweets
Authentic Wm. Gibson 12h
Anyone want to go down to the Reina Sofía and spray paint 'ALEPPO' on 'Guernica' with me?
Reply Retweet Like
Authentic Wm. Gibson Sep 6
Nat.Guard deployed to quell riots among senescent BayArea boomers furious that algorithmically generated Beatles songs better than originals
Reply Retweet Like
Authentic Wm. Gibson Sep 6
Encrypted RF comms suggest a Russian synthetic microbe fleet was deployed to Wisconsin to kill cows w/external methane collection bladders.
Reply Retweet Like
Authentic Wm. Gibson retweeted
Fabienne Serrière Sep 5
life imitates art. cc 🚢🚚
Reply Retweet Like
Authentic Wm. Gibson Sep 2
ah, sure. I like the idea of examining font & playing with possible addresses until you get one that precisely matches length.
Reply Retweet Like
Authentic Wm. Gibson Sep 2
I think this is maybe right -- you'd likely be able to reduce the space of possible solutions.
Reply Retweet Like
Authentic Wm. Gibson Sep 2
for 8,000 years people have tried to make me take them seriously about kerning and I still refuse to care!!
Reply Retweet Like
Authentic Wm. Gibson Sep 2
you are literally repeating back to me what I've suggested -- that this document lets you estimate length.
Reply Retweet Like
Authentic Wm. Gibson Sep 2
Oh, absolutely. Let's say eight characters or something -- it's a ton of addresses to try, seems like that would uh stand out.
Reply Retweet Like
Authentic Wm. Gibson Sep 2
ah, see, this is why I wish I knew things. Thank you -- it's great to hear from experts.
Reply Retweet Like
Authentic Wm. Gibson Sep 2
Reply Retweet Like
Authentic Wm. Gibson Sep 2
but that wouldn't prevent one from getting through to the right guessed address, I'd just never know whether it bounced or not.
Reply Retweet Like
Authentic Wm. Gibson Sep 2
a large enough number of servers to carry out this attack, right?
Reply Retweet Like
Authentic Wm. Gibson Sep 2
That's jargon that I'm going to have to guess at from context, but I'm fairly sure I get it. But you could get around that by using..
Reply Retweet Like
Authentic Wm. Gibson Sep 2
Please let me know if anyone has any insight-- I'm sitting by a Bose Einstein condensate machine, but I'm a luddite.
Reply Retweet Like
Authentic Wm. Gibson Sep 2
Ok, sort of -- but not knowing the domain name or the length would dramatically complicate that kind of attack.
Reply Retweet Like
Authentic Wm. Gibson Sep 2
This is the question -- but even if they do, couldn't I distribute the attack from a bunch of addresses?
Reply Retweet Like
Authentic Wm. Gibson Sep 2
What's to stop me from approximating the length of Barack's email address and brute force trying to email him?
Reply Retweet Like
Authentic Wm. Gibson Aug 22
very, very slowly. My day job in research eats up nearly all my creative energy. But thank you!
Reply Retweet Like
Authentic Wm. Gibson retweeted
David Weaver Aug 2
MAKE AMERICA STRANGE AGAIN
Reply Retweet Like