3:36 (Music to Sleep To)

3:36 (Music to Sleep To) is the first album of ambient music by Poppy composed along with polysomnographists from the Washington University School of Medicine, in St. Louis, Missouri.[1][2][3] The album was self-released on Bandcamp on October 17, 2016.

3:36 (Music to Sleep To)
Soundtrack album by
ReleasedOctober 17, 2016 (2016-10-17)
Recorded2016
GenreAmbient
Length44:22
Poppy chronology
Bubblebath
(2016)
3:36 (Music to Sleep To)
(2016)
Poppy.Computer
(2017)

Critical reception

Rolling Stone magazine called the album "intentionally soporific".[4]

Track listing

All music is composed by Titanic Sinclair and Poppy.

3:36 (Music to Sleep To)[3]
No.TitleLength
1."Obnoxious Blocks"4:42
2."Mind Aide"4:34
3."Catholic Camera"3:59
4."Drop in the Ocean"4:38
5."Me Time Me"4:46
6."Phonic"4:32
7."Glass Milk"4:04
8."Telepathy"4:06
9."Air People"4:36
10."Doctor Bite"4:25
Total length:44:22
gollark: <@!206233133228490752> Sorry to bother you, but keypairs generated by `ccecc.py` and the ECC library in use in potatOS appear to have different-length private and public keys, which is a problem.EDIT: okay, apparently it's because I've been accidentally using a *different* ECC thing from SMT or something, and it has these parameters instead:```---- Elliptic Curve Arithmetic---- About the Curve Itself-- Field Size: 192 bits-- Field Modulus (p): 65533 * 2^176 + 3-- Equation: x^2 + y^2 = 1 + 108 * x^2 * y^2-- Parameters: Edwards Curve with c = 1, and d = 108-- Curve Order (n): 4 * 1569203598118192102418711808268118358122924911136798015831-- Cofactor (h): 4-- Generator Order (q): 1569203598118192102418711808268118358122924911136798015831---- About the Curve's Security-- Current best attack security: 94.822 bits (Pollard's Rho)-- Rho Security: log2(0.884 * sqrt(q)) = 94.822-- Transfer Security? Yes: p ~= q; k > 20-- Field Discriminant Security? Yes: t = 67602300638727286331433024168; s = 2^2; |D| = 5134296629560551493299993292204775496868940529592107064435 > 2^100-- Rigidity? A little, the parameters are somewhat small.-- XZ/YZ Ladder Security? No: Single coordinate ladders are insecure, so they can't be used.-- Small Subgroup Security? Yes: Secret keys are calculated modulo 4q.-- Invalid Curve Security? Yes: Any point to be multiplied is checked beforehand.-- Invalid Curve Twist Security? No: The curve is not protected against single coordinate ladder attacks, so don't use them.-- Completeness? Yes: The curve is an Edwards Curve with non-square d and square a, so the curve is complete.-- Indistinguishability? No: The curve does not support indistinguishability maps.```so I might just have to ship *two* versions to keep compatibility with old signatures.
gollark: > 2. precompilation to lua bytecode and compressionThis was considered, but the furthest I went was having some programs compressed on disk.
gollark: > 1. multiple layers of sandboxing (a "system" layer that implements a few things, a "features" layer that implements most of potatOS's inter-sandboxing API and some features, a "process manager" layer which has inter-process separation and ways for processes to communicate, and a "BIOS" layer that implements features like PotatoBIOS)Seems impractical, although it probably *could* fix a lot of problems
gollark: There's a list.
gollark: Lots of them.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.