Osteo Myological Quantization. Note Quote.

The site of the parameters in a higher order space can also be quantized into segments, the limits of which can be no more decomposed. Such a limit may be nearly a rigid piece. In the animal body such quanta cannot but be bone pieces forming parts of the skeleton, whether lying internally as [endo]-skeleton or as almost rigid shell covering the body as external skeleton.

Note the partition of the body into three main segments: Head (cephalique), pectral (breast), caudal (tail), materializing the KH order limit M>= 3 or the KHK dimensional limit N>= 3. Notice also the quantization into more macroscopic segments such as of the abdominal part into several smaller segments beyond the KHK lower bound N=3. Lateral symmetry with a symmetry axis is remarkable. This is of course an indispensable consequence of the modified Zermelo conditions, which entails also locomotive appendages differentiating into legs for walking and wings for flying in the case of insects.


Two paragraphs of Kondo addressing the simple issues of what bones are, mammalian bi-lateral symmetry, the numbers of major body parts and their segmentation, the notion of the mathematical origins of wings, legs and arms. The dimensionality of eggs being zero, hence their need of warmth for progression to locomotion and the dimensionality of snakes being one, hence their mode of locomotion. A feature of the biological is their attention to detail, their use of line art to depict the various forms of living being – from birds to starfish to dinosaurs, the use of the full latin terminology and at all times the relationship of the various form of living being to the underlying higher order geometry and the mathematical notion of principle ideals. The human skeleton is treated as a hierarchical Kawaguchi tree with its characteristic three pronged form. The Riemannian arc length of the curve k(t) is given by the integral of the square root of a quadratic form in x’ with coefficients dependent in x’. This integrand is homogenous of the first order in x’. If we drop the quadratic property and retain the homogeneity, then we obtain the Finsler geometry. Kawaguchi geometry supposes that the integrand depends upon the higher derivatives x’’ up to the k-th derivative xk. The notation that Kondo uses is:



L Parameters N Dimensions M Derivatives

The lower part of the skeleton can be divided into three prongs, each starting from the centre as a single parametric Kawaguchi tree.

…the skeletal, muscular, gastrointestinal, circulation systems etc combine into a holo-parametric whole that can be more generally quantized, each quantum involving some osteological, neural, circulatory functions etc.

…thus globally the human body from head through trunk to limbs are quantized into a finite number of quanta.

Chinese Philosophical Pythagoreanism. Thought of the Day 14.0


The universe is just like a right-angled triangle of standard unit. The two right-angle sides oppose each other and yet also complement each other like quantum entanglement. They superpose and counterbalance each other in a system. They grow and decline, but identically equal to “1”. From this perspective, the Traditional Yin-and-Yang Double Fish Diagram and the core idea behind it is counterbalance and unity of opposites, a geometric expression of “being of beings” and an illustration of the ground of “being”, or the “being” in “being of beings”, the “one” in “one is all”. It roots in the Pythagorean Theorem and goes beyond the Pythagorean Theorem. It illustrates the idea in the Euler Equation:

e·e−iθ =(cosθ + isinθ (cosθ − isinθ) = cos2θ + sin2θ = 1),

and has opened the door of relativity, expressing the key idea of Fuzzy Set in modern mathematics developed in contemporary and modern times. “If each right-angled side multiple itself, the sum will be the square of hypotenuse. The extracted root is hypotenuse”. Thus, the xian (in Chinese meaning either “hypotenuse” or “profound”) is “profound” because we don’t understand the principle and add too much mysterious explanations to it.

This reminds us of the “Needham question”, why didn’t science rise in China? And the emotional sigh of Mr. Liang Shumin, “The Chinese culture is a pre-matured one of mankind.” In a material desire-pursuing physical world, metaphysics is so lonely and with- ering. As Heidegger pointed out, truth is hardly acceptable just because it’s too simple. Facing the rapidly-changing advancement of science, we need inquire with earnestness and reflect with self-practice, and ask ourselves whether we need “lead people to perfection” and “having known where to reset at the end, one will be able to determine the object of pursuit”, and try our best to “return to things themselves”; Facing the cultural flourishing, whether we should keep to the original intention of “speech” and come back to the original point of language.

Facing the complicated world, human beings need another renaissance to search, keep and return to the “1” to create “a community of common destiny”. The philosophical element of traditional Chinese culture and the dialectical unity of Marxism could make continuing contributions to the aim since whether ancient or modern, Chinese or foreign, arts or sciences, they must be “unified” in basic principle of the universe.

Games and Virtual Environments: Playing in the Dark. Could These be Havens for Criminal Networks?

Pixelated unrecognizable hooded cyber criminal

Both British and American agencies have identified games and virtual environments, which they term “GVEs,” as havens for illegal activity. Released documents show that, because of fears that “criminal networks could use the games to communicate secretly, move money or plot attacks,” intelligence operatives have entered the video game terrain as virtual spies. While there, the spies create “make-believe characters to snoop,” “recruit informers,” and collect “data and contents of communications between players,” because features common to video games, such as “fake identities,” and “voice and text chats” provide an ideal place for criminal organizations to operate. A 2008 document released by the National Security Agency (NSA) warned that, although “[o]nline games might seem innocuous . . . they ha[ve] the potential to be a ‘target-rich communication network’ allowing intelligence suspects ‘a way to hide in plain sight.’”

Furthermore, according to the NSA, “Massively Multiplayer Online Games (MMOG) are ideal locations” for criminals “because of the enormous scale on which they are played,” featuring thousands of subscribers simultaneously using various servers hosted in a wide array of places, including on gamers’ own dedicated servers. Additionally, GVEs may often be accessed “via mobile devices connected wirelessly,” such as phones, handhelds, or laptops. Through connections to online gaming environments, these types of devices allow for an additional place where users can interact, connect, or share. These sites can be “advertised” in online games and password-protected so that they function essentially as private meeting places for criminal organizations.

Consequently, the online gaming landscape poses a unique challenge for law enforcement because it not only involves a new realm wherein criminal organizations thrive, but it also represents communications that more closely involve innocent parties and are more technically difficult to intercept. As a result, law enforcement around the world will need to make difficult decisions regarding surveillance and regulation of these types of communications.

The technical difficulties posed by in-game communications raise an especially difficult dilemma for law enforcement because they present issues in an area skirting the edge of law enforcement’s technological ability. Often times, even if law enforcement agencies have the legal authority to conduct surveillance, they do not have the technical capability to survey the use of communications like those that take place in online games. The Federal Bureau of Investigation (FBI) labels this difficulty the “going dark” problem, which explains how intelligence-gathering officials lack the technological ability to carry out intelligence gathering as quickly as required. That problem manifests itself as an inability for prosecutors to effectively track and counteract criminal behavior on large scales, as was the case in 2009, when the Drug Enforcement Agency learned of an international drug and weapons smuggling ring with operations in North and South America, Europe, and Africa. Because the leader of that ring knew which communications lacked “intercept solutions,” much of the ring still functions today. The primary difficulty in prosecuting crimes like these relates to law enforcement’s desire to access data in real or near-real time, rather than to access stored information.

In the wake of these interests, how governments approach the regulation and surveillance of online games will greatly affect their citizens and a broad swath of the business world. Examining how law enforcement can effectively monitor and combat organized criminal activity that involves the use of online games.

PLAYING IN THE DARK by Mathew Ruskin

Main Stuxnet DLL: Installing Stuxnet into the Infected Machine


When the main DLL begins the execution. It unupx itself (as the DLL is upxed) and then checks the configuration data of this stuxnet sample and checks the environment to choose if it will continue or exit from the beginning.

It checks if the configuration data is correct and recent and then it checks the admin rights. If it’s not running on administrator level, it uses one of two zero-day vulnerabilities to escalate the privileges and run in the administrator level.

CVE-2010-2743(MS-10-073) – Win32K.sys Keyboard Layout Vulnerability CVE-xxxx-xxxx(MS-xx-xxx) – Windows Task Scheduler Vulnerability

These two vulnerabilities allow the worm to escalate the privileges and run in a new process (“csrss.exe” in case of Win32K.sys) or as a new task in the Task Scheduler case.

It makes also some other checks like checking on 64bits or 32bits and so on.

After everything goes right and the environment is prepared to be infected by stuxnet, it injects itself into another process to install itself from that process. The injection begins by searching for an Antivirus application installed in the machine.

Depending on the antivirus application (AVP or McAfee or what?), stuxnet chooses the process to inject itself into. If there’s no antivirus program it chooses “lsass.exe”….

The Function #16 begins by checking the configuration data and be sure that everything is ready to begin the installation. And also, it checks if the there’s a value in the registry with this name “NTVDM TRACE” in

SOFTWARE\Microsoft\Windows\CurrentVersion\MS-DOS Emulation

And then, it checks if this value equal to “19790509”. This special number seems a date “May 9, 1979” and this date has a historical meaning “Habib Elghanian was executed by a firing squad in Tehran sending shock waves through the closely knit Iranian Jewish community”….


Conjuncted: All Sciences Are Still Externalist.


Constructor Theory seeks to express all fundamental scientific theories in terms of a dichotomy between possible and impossible physical transformations (Deutsch). Accordingly, a task A is said to be possible (A✓) if the laws of nature impose no restrictions on how (accurately) A could be performed, nor on how well the agents that are capable of approximately performing it could retain their ability to do so. Otherwise A is considered to be impossible (A✘). Deutsch argues that in both quantum theory and general relativity, “time is treated anomalously”. He sees the problem in that time is not among the entities to which both theories attribute “objective existence (namely quantum observables and geometrical objects respectively), yet those entities change with time”. Is not this an interesting appraisal? According to him “there is widespread agreement that there must be a way of treating time ‘intrinsically’ (i.e. as emerging from the relationships between physical objects such as clocks) rather than ‘extrinsically’ (as an unphysical parameter on which physical quantities somehow depend).” However, Deutsch reckons, it would be difficult to accommodate this in the prevailing conception, “every part of which (initial state; laws of motion; time-evolution) assumes that extrinsic status”. According to Constructor Theory it is “both natural and unavoidable to treat both time and space intrinsically: they do not appear in the foundations of the theory, but are emergent properties of classes of tasks …”. Note that the differentiation between “intrinsic” and “extrinsic” has different meaning than the one used in phenomenological philosophy.

Other projections, such as the Circular Theory (Yardley) and the Structural Theory of Everything (Josephson) also question the laws underlying the foundations of physics. However, as long as they consider placing events “over time” extrinsically, they are all of the same kind: non-phenomenological. (Note that duration has two definitions: endo and exo). This is a very interesting conclusion in Steven M. Rosen’s words:

The point may be that, in physics, time is treated ‘extrinsically’ because it does not lend itself to being formulated in objectivist terms, i.e., as something that is limited to the context of the objectified physical world.

Therefore, the terms “intrinsic” and “extrinsic” in Deutsch’s objectivist usage are both “extrinsic” in the phenomenological sense: both are limited to a physicalistic paradigm that excludes the internal perspective of a lived (bodily) subjectivity or an agent-dependent reality (Rössler), a continuing durée (Bergson). This appears to be the key to all the “trouble with physics” (Smolin), and not only with physics.  In their 2012 paper No entailing laws, but enablement in the evolution of the biosphere Longo, Montévil and Kauffman claim that biological evolution “marks the end of a physics world view of law entailed dynamics” (Longo et al.). They argue that the evolutionary phase space or space of possibilities constituted of interactions between organisms, biological niches and ecosystems is “ever changing, intrinsically indeterminate and even (mathematically) unprestatable”. Hence, the authors’ claim that it is impossible to know “ahead of time the ‘niches’ which constitute the boundary conditions on selection” in order to formulate laws of motion for evolution. They call this effect “radical emergence”, from life to life. In their study of biological evolution, Longo and colleagues carried close comparisons with physics. They investigated the mathematical constructions of phase spaces and the role of symmetries as invariant preserving transformations, and introduced the notion of “enablement” to restrict causal analyses to Batesonian differential cases. The authors have shown that mutations or other “causal differences” at the core of evolution enable the establishment of non-conservation principles, in contrast to physical dynamics, which is largely based on conservation principles as symmetries. Their new notion of “extended criticality” also helps to understand the distinctiveness of the living state of matter when compared to the non-animal one. However, their approach to both physics and biology is also non-phenomenological. The possibility for endo states that can trigger the “(genetic) switches of mutation” has not been examined in their model. All sciences are (still) externalist.