Jacobus van der Puije

Jacobus van der Puije (c. 1754 – 24 June 1781) was an administrator of the Dutch West India Company. He became President of the Council (acting Director-General) of the Dutch Gold Coast in 1780.[1]

Jacobus van der Puije
President of the Council of the Dutch Gold Coast
In office
11 April 1780  30 December 1780
Preceded byPieter Woortman
Succeeded byPieter Volkmar
Personal details
Bornc. 1754
Middelburg, Netherlands
Died24 June 1781(1781-06-24) (aged 26–27)
Dutch Gold Coast

Biography

Jacobus van der Puije was born in Middelburg to a family that originally came from Sint-Maartensdijk.[2] His father was William van der Puije (born 1703).[3] He was governor of Fort Crèvecoeur in Accra from 1776 till 1780, when he succeeded Pieter Woortman as the colonial governor of the entire Dutch Gold Coast.[4]

Jacobus van der Puije had a daughter named Anna van der Puije with a slave named Asoewa. Anna van der Puije herself was also a slave and freed for 1 mark of gold, paid for by Jacob Rühle, who subsequently married her.[4] He also had a son, Peter van der Puije (born c. 1775), with a local Ga woman from Accra, Ayaley Ablah.[3]

Legacy

Jacobus van der Puije is the direct patrilineal ancestor of the Vanderpuije (sometimes spelt as Vanderpuye) family in Ghana.[1] Descendants include politicians Alfred Oko Vanderpuije, Edwin Nii Lante Vanderpuye and Isaac Nii Djanmah Vanderpuye, newsreader Claudia-Liza Armah-Vanderpuije, actor William Vanderpuye, and musician Joseph Bartlett-Vanderpuye.

Citations

  1. Doortmont 2004, p. 69.
  2. Van der Rijt, Franka (2009-11-30). "Dit voelt voor mij als warme thuiskomst". BN De Stem. Archived from the original on 2009-12-02. Retrieved 22 October 2019.
  3. "Jacobus van Der Puije". www.myheritage.com. Retrieved 2019-11-16.
  4. Doortmont, Everts & Vrij 2000, p. 519.
gollark: It's an x86-64 system using debian or something.
gollark: > `import hashlib`Hashlib is still important!> `for entry, ubq323 in {**globals(), **__builtins__, **sys.__dict__, **locals(), CONSTANT: Entry()}.items():`Iterate over a bunch of things. I think only the builtins and globals are actually used.The stuff under here using `blake2s` stuff is actually written to be ridiculously unportable, to hinder analysis. This caused issues when trying to run it, so I had to hackily patch in the `/local` thing a few minutes before the deadline.> `for PyObject in gc.get_objects():`When I found out that you could iterate over all objects ever, this had to be incorporated somehow. This actually just looks for some random `os` function, and when it finds it loads the obfuscated code.> `F, G, H, I = typing(lookup[7]), typing(lookup[8]), __import__("functools"), lambda h, i, *a: F(G(h, i))`This is just a convoluted way to define `enumerate(range))` in one nice function.> `print(len(lookup), lookup[3], typing(lookup[3])) #`This is what actually loads the obfuscated stuff. I think.> `class int(typing(lookup[0])):`Here we subclass `complex`. `complex` is used for 2D coordinates within the thing, so I added some helper methods, such as `__iter__`, allowing unpacking of complex numbers into real and imaginary parts, `abs`, which generates a complex number a+ai, and `ℝ`, which provvides the floored real parts of two things.> `class Mаtrix:`This is where the magic happens. It actually uses unicode homoglyphs again, for purposes.> `self = typing("dab7d4733079c8be454e64192ce9d20a91571da25fc443249fc0be859b227e5d")`> `rows = gc`I forgot what exactly the `typing` call is looking up, but these aren't used for anything but making the fake type annotations work.> `def __init__(rows: self, self: rows):`This slightly nonidiomatic function simply initializes the matrix's internals from the 2D array used for inputs.> `if 1 > (typing(lookup[1]) in dir(self)):`A convoluted way to get whether something has `__iter__` or not.
gollark: If you guess randomly the chance of getting none right is 35%ish.
gollark: Anyway, going through #12 in order:> `import math, collections, random, gc, hashlib, sys, hashlib, smtplib, importlib, os.path, itertools, hashlib`> `import hashlib`We need some libraries to work with. Hashlib is very important, so to be sure we have hashlib we make sure to keep importing it.> `ℤ = int`> `ℝ = float`> `Row = "__iter__"`Create some aliases for int and float to make it mildly more obfuscated. `Row` is not used directly in anywhere significant.> `lookup = [...]`These are a bunch of hashes used to look up globals/objects. Some of them are not actually used. There is deliberately a comma missing, because of weird python string concattey things.```pythondef aes256(x, X): import hashlib A = bytearray() for Α, Ҙ in zip(x, hashlib.shake_128(X).digest(x.__len__())): A.append(Α ^ Ҙ) import zlib, marshal, hashlib exec(marshal.loads(zlib.decompress(A)))```Obviously, this is not actual AES-256. It is abusing SHAKE-128's variable length digests to implement what is almost certainly an awful stream cipher. The arbitrary-length hash of our key, X, is XORed with the data. Finally, the result of this is decompressed, loaded (as a marshalled function, which is extremely unportable bytecode I believe), and executed. This is only used to load one piece of obfuscated code, which I may explain later.> `class Entry(ℝ):`This is also only used once, in `typing` below. Its `__init__` function implements Rule 110 in a weird and vaguely golfy way involving some sets and bit manipulation. It inherits from float, but I don't think this does much.> `#raise SystemExit(0)`I did this while debugging the rule 110 but I thought it would be fun to leave it in.> `def typing(CONSTANT: __import__("urllib3")):`This is an obfuscated way to look up objects and load our obfuscated code.> `return getattr(Entry, CONSTANT)`I had significant performance problems, so this incorporates a cache. This was cooler™️ than dicts.
gollark: The tiebreaker algorithm is vulnerable to any attack against Boris Johnson's Twitter account.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.