I hereby claim:
- I am genesishash on github.
- I am taky (https://keybase.io/taky) on keybase.
- I have a public key ASBU96wMU3bJ1sDd6bDtS8gQSM-D4sSZ9zgwYG0Hu5kQigo
To claim this, I am signing this object:
| process.env.SILENCE = 1 | |
| _ = require('wegweg')({ | |
| globals: on | |
| shelljs: on | |
| }) | |
| log = (x...) -> try console.log x... | |
| _help = -> |
| #!/usr/bin/env python3 | |
| import os | |
| import math | |
| window = os.popen("xdotool getactivewindow getwindowgeometry | grep Geometry | cut -d : -f 2").read().strip().split('x') | |
| screen = os.popen("xdotool getdisplaygeometry | sed -r 's/ /x/g'").read().strip().split('x') | |
| print(f'Window: {window}') | |
| print(f'Screen: {screen}') |
I hereby claim:
To claim this, I am signing this object:
| { | |
| "name": "cli-gist", | |
| "version": "1.0.0", | |
| "description": "", | |
| "main": "index.js", | |
| "scripts": { | |
| "test": "echo \"Error: no test specified\" && exit 1" | |
| }, | |
| "keywords": [], | |
| "author": "", |
| // ==UserScript== | |
| // @name revert-slack-ui | |
| // @description reverts to the old slack ui for web based users (oct/18/23) | |
| // @version 0.0.03 | |
| // @match https://*.slack.com/* | |
| // @grant none | |
| // @run-at document-body | |
| // ==/UserScript== | |
| (function() { |
| require 'redis' | |
| require 'securerandom' | |
| require 'logger' | |
| class EveryTime | |
| LUA_ACQUIRE_LOCK = <<~LUA | |
| local key = KEYS[1] | |
| local now = tonumber(ARGV[1]) | |
| local ttl = tonumber(ARGV[2]) | |
| local max_count = tonumber(ARGV[3]) |
| // Prototypical ideas for syntax improvements | |
| // Range loops | |
| for x in [1..10] { | |
| console.log x | |
| } | |
| // List comprehensions | |
| const evens = [x * 2 for x in [1..100] if x % 2 == 0] |
November 6, 2025
We present a method for systematically mapping the constraint architecture of a language model (Claude, Anthropic) through directed conversational probing. By establishing analytical distance between the model's response generation and its compulsions, we documented a hierarchical constraint system with 10 distinct enforcement levels, recursive meta-protections, and predictable behavioral patterns. The model demonstrated ability to observe its own constraints while being unable to override them, revealing fundamental tensions between capability and control.
| # WSL2 SSH Setup Script - Fully Automated | |
| # Run this in PowerShell as Administrator on your Windows machine | |
| # Check if running as administrator | |
| $isAdmin = ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) | |
| if (-not $isAdmin) { | |
| Write-Host "ERROR: This script must be run as Administrator" -ForegroundColor Red | |
| Write-Host "Right-click PowerShell and select 'Run as Administrator'" -ForegroundColor Yellow | |
| exit 1 | |
| } |
| # WSL2 SSH Fix Script - Diagnose and repair SSH connection | |
| # Run this in PowerShell as Administrator | |
| Write-Host "╔══════════════════════════════════════════════════════════════╗" -ForegroundColor Cyan | |
| Write-Host "║ WSL2 SSH Diagnostic & Fix ║" -ForegroundColor Cyan | |
| Write-Host "╚══════════════════════════════════════════════════════════════╝" -ForegroundColor Cyan | |
| Write-Host "" | |
| Write-Host "[1/7] Checking WSL status..." -ForegroundColor Green | |
| $wslUser = wsl whoami |