« on: 14/11/2018 22:36:21 »
You're wrong about light dilation. Light traveling from a point at higher gravitational energy to lower is blue shifted. It happens between Earth orbit and Earth's surface. It has nothing to do with any singularity.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
The magnetic field itself is produced by electrical currents in the liquid nickel/iron, produced by magnetohydrodynamic effects.Thanks. This is the key piece of information left out of every explanation I've heard.
the iron-nickel material moves and thus the magnetic field is createdNo, movement of iron and/or nickel won't produce a magnetic field in liquid form any more than it does when they are solid. There must be net charge motion.
None of them require simultaneityQM requires that when the state of one member of an entangled set is observed, the states of all other members is fixed, in that instant. This is exactly what QM requires.
The TOR browser does this, and apparently it is fairly slow.Encryption doesn't have to be slow. The overhead of TOR isn't local, it's due to routing connections through multiple servers.
You can't use it to transmit information, so relativity and causality are preserved.
Action-at-a-distance REQUIRES simultaneity. In the action-at-a-distance interpretation of entanglement, the observation of one particle of an entangled pair will alter, in that instant (simultaneous for all observers), the state of the other.
You mean 'spooky action' right?
Yeah, maybe it does. But 'simultaneity' is one thing to prove in a laboratory, another outside it. Think you will find it impossible. And if we assume the entanglement to be 'one entity' then there is no 'spooky action' at all. Just a question of lack of geometry, well, sort of? "They" just wasn't smart enough to realize that "they" was embedded in (the geometry of) SpaceTime, eh, sort of, again
There is processing and communications overhead in multiple encryption. The TOR browser does this, and apparently it is fairly slow.TOR routes through different servers to hide the identity of the user. Traffic is routed between random servers, often in different countries. This isn't necessary for normal security. All that's needed is for the contents of traffic to be secure. Encryption isn't necessarily slow or require large overhead. The problem is that companies don't bother because customers don't insist.
There is also the question of how much security you need for text which will be displayed unencrypted on a public discussion forum, vs the password for your bank account.
One goal of security is to increase the availability of your data to yourself, and whoever else you choose to allow access.No, the goal of security is to ensure that nobody can access the data except those who are entitled to it. Minimizing overhead and inconvenience is a design goal but not a goal of security. You don't put locks on your door so that people can enter your home... you put locks on so nobody without a key can enter. You accept the inconvenience in return for the security.
- But if the security is too good, you can't access your data because you keep mistyping your 50-character password, or you have to retype your password every 5 minutes, or you have to remember 5 different passwords to purchase a book online. Or even if the bank suspends payment because you made a purchase from a company you haven't used before...