That's unlikely. The Chinese are fine with just putting their own muslims, the Uyghurs in concentration camps. And there are high mountains between Afghanistan and China, so the idea of a huge influx of Taliban to China is absurd.
Has anybody seen the The War Machine? I think it portrays extremely well just how the US has handled this war (even if it likely takes some artistics freedoms). Out of sight, out of mind — ssu
The correspondence theory of truth is only part of the story. In common with all expansive theories of truth it's misleading. So there are folk who accept the correspondence theory of truth, and accept that 12/6=2 is true, and hence conclude that there are things to which 12/6=2 corresponds. That's one of the excuses offered for Platonism. — Banno
Mathematics corresponds to the structure of reality — litewave
So, what is going on there can become an invitation for the next
Power (China) to get involved. — Number2018
There is no such thing as a steady state system in computing. What exactly are you talking about? Non-volatile memory? Give an example of a 'steady state system'. — emancipate
Alternatively, simply use a dedicated IDS rather than software designed for a completely different purpose (rollback functionality). — emancipate
’Normal processes' with the appropriate privilege level must and do have constant read/write access to root. — emancipate
You could have the kernel monitor whenever write operations are attempted on root, and report them then. — darthbarracuda
Processes can't open files without going through the kernel, which checks the permissions of the user against the permissions of the file. — darthbarracuda
How? — darthbarracuda
If this TimeShift program gets hacked, it could have its revert abilities removed. — darthbarracuda
So the point is, how would the computer function if every time the OS needed to modify the kernel's data structures, you backed those changes out?
What if a friendly actor needs to make a change to this root folder for legitimate reasons? — darthbarracuda
What if this TimeShift program gets hacked in some way? It seems like a major security vulnerability for a program other than the kernel to have access to this sort of thing. — darthbarracuda
Couldn't you get a crypto hash of whatever files you're worried about and then set up a cronjob to periodically calculate the hash and compare it to the stored one? If the hashes don't match, time to restore a backup. That's an oversimplified idea that is already in use. — darthbarracuda
I'm confused, the kernel is already "mounted" in RAM if you mean that it already has its code in some location in RAM. The kernel (and OS in general) needs to be in RAM so context switching to kernel space and subsequent kernel operations is as fast as possible. After all, the OS is just another process which happens to have been given special privileges by the CPU during the boot sequence. — darthbarracuda
Are you proposing that the operating system monitors itself? — darthbarracuda
So are you proposing to speed up computers, or detect unauthorized intrusions? — fishfry
ECC Ram is just error-correcting memory. It wouldn't offer any functional difference from any other kind of RAM. So I didn't understand that part. — fishfry
How would it be able to "predetermine the state of a computer?" Are you talking about branch prediction? This is a 20 or 30 year old idea as far as I know. — fishfry
What does it mean to directly interact with the OS? Of course the software directly interacts with the hardware. So I'm afraid I couldn't make sense of this line and kind of got stuck here. — fishfry
If you choose to be consistent, you would have to say that choosing and pragmatism and highlighting and posting on philosophy forums are also just neurotransmitters and chemicals in da brain. — unenlightened
The fact that they occur together suggests a relationship, sure. — bert1
But an identity is not right. The two things have different properties — bert1
Well that is part of what "moods" are but certainly not the entire story. — prothero
Limits of both language and scientific description probably apply. — prothero
Scientific laws are really mostly just uncontested theories. — Outlander
The modulator on a guitar amp is not the sound it simply has a large amount of control over it. — Outlander
All the logical devices - the detailed twiddles and manipulations of our language - combine, Wittgenstein tells us at 5.511, into an infinitely fine network, forming 'the great mirror' - that is to say, the mirror of language, whose logical character makes it reflect the world and makes its individual sentences say that such-and-such is the case. — Anscombe, G. E. M. An Introduction to Wittgenstein's Tractatus. 1971. G. E. M. Anscombe, pg. 164
Thus when the Tractatus tells us that 'Logic is transcendental', it does not mean that the propositions of logic state transcendental truths; it means that they, like all other propositions, shew something that pervades everything sayable and is itself unsayable. — Anscombe, G. E. M. An Introduction to Wittgenstein's Tractatus. 1971. G. E. M. Anscombe, pg. 166
So, it comes out that it is illegitimate to speak of 'an I'. 'From inside' means only 'as I know things'; I describe those things - something, however, I cannot communicate or express: I try to, by saying I speak 'from an inside point of view'. But there is no other point of view. Suppose others too speak of the 'inside point of view'? That is my experience of my supposition of spoken words. — Anscombe, G. E. M. An Introduction to Wittgenstein's Tractatus. 1971. G. E. M. Anscombe, pg. 166
Here we see that solipsism strictly carried out coincides with realism. The I in solipsism shrinks to an extensionless point and there remains the reality coordinated with it. — Anscombe, G. E. M. An Introduction to Wittgenstein's Tractatus. 1971. G. E. M. Anscombe, pg. 166
SO, give me some indication of having read the relevant bits. Tell me what you think they say. — Banno
Who's that, then?
Tell me about him. — Banno