Gordon Worley

San Francisco, California, United States Contact Info
1K followers 500+ connections

Join to view profile

About

I got into programming because I wanted to make computers do cool things. I consider…

Activity

Join now to see all activity

Experience & Education

  • Anrok

View Gordon’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Volunteer Experience

  • Bay Zen Center Graphic

    President

    Bay Zen Center

    - Present 4 years 7 months

    Served on the board of the Zen Center where I practice. I've served as Secretary, Treasurer, and President at various times.

  • Founder

    MacGPG

    - 3 years 5 months

    Science and Technology

    I started a project to maintain the port of GNU Privacy Guard (GPG) to Darwin/Mac OS X back when Mac OS was a very nonstandard build target. Initially this mostly meant things like patching GPG and autoconf to work with the quirks of Darwin, but eventually I became more ambitious and started work on a user-friendly native GUI application written in Objective-C. This eventually grew to working with 5 other developers and 2 translators to bring cryptographic tools to Mac users around the…

    I started a project to maintain the port of GNU Privacy Guard (GPG) to Darwin/Mac OS X back when Mac OS was a very nonstandard build target. Initially this mostly meant things like patching GPG and autoconf to work with the quirks of Darwin, but eventually I became more ambitious and started work on a user-friendly native GUI application written in Objective-C. This eventually grew to working with 5 other developers and 2 translators to bring cryptographic tools to Mac users around the world.

    I successfully handed off the project to another maintainer when I started grad school, who continued the project until it merged with another one in 2011.

    https://macgpg.sourceforge.io/

Publications

  • Robustness to fundamental uncertainty in AGI alignment

    Journal of Consciousness Studies

    The AGI alignment problem has a bimodal distribution of outcomes with most outcomes clustering around the poles of total success and existential, catastrophic failure. Consequently, attempts to solve AGI alignment should, all else equal, prefer false negatives (ignoring research programs that would have been successful) to false positives (pursuing research programs that will unexpectedly fail). Thus, we propose adopting a policy of responding to points of philosophical and practical…

    The AGI alignment problem has a bimodal distribution of outcomes with most outcomes clustering around the poles of total success and existential, catastrophic failure. Consequently, attempts to solve AGI alignment should, all else equal, prefer false negatives (ignoring research programs that would have been successful) to false positives (pursuing research programs that will unexpectedly fail). Thus, we propose adopting a policy of responding to points of philosophical and practical uncertainty associated with the alignment problem by limiting and choosing necessary assumptions to reduce the risk of false positives. Herein we explore in detail two relevant points of uncertainty that AGI alignment research hinges on---meta-ethical uncertainty and uncertainty about mental phenomena---and show how to reduce false positives in response to them.

    See publication
  • Finding dud vertices in defensive alliances and secure sets using computational tools

    University of Central Florida: Electronic Thesis

    Defensive alliances are a way of using graphs to model the defense of resources (people, buildings, countries, etc.) against attacks where the number of potential attackers against each resource is known. The initial study of defensive alliances focused on questions of minimal defensive alliances in a graph and the minimum possible size of a defensive alliance in a graph, but in order to apply defensive alliances in modeling real-world situations, additional considerations are important. In…

    Defensive alliances are a way of using graphs to model the defense of resources (people, buildings, countries, etc.) against attacks where the number of potential attackers against each resource is known. The initial study of defensive alliances focused on questions of minimal defensive alliances in a graph and the minimum possible size of a defensive alliance in a graph, but in order to apply defensive alliances in modeling real-world situations, additional considerations are important. In particular, since each vertex in a defensive alliance represents some real-world object that has a cost associated with remaining in the defensive alliance, it is important to consider the value each vertex adds to the defensive alliance. In this thesis we consider a method of assessing the efficiency of a defensive alliance, including the special case of secure sets.

    See publication
  • Bounding the Security Number of a Graph

    Proceedings of CGTC 37

    Given a graph G, the security number of G is the cardinality of a minimum secure set of G, the smallest set of vertices S ⊆ V (G) such that for all X ⊆ S, |N[X] ∩ S| ≥ |N[X] − S|. It is believed to be computationally difficult to find the security number of large graphs, so we present techniques for reducing the difficulty of both finding a secure set and determining bounds on the security number.

    Other authors
    • Matt Gordon
    • Ronald D. Dutton
    See publication
  • Applications of quantum message sealing

    arXiv

    In 2003, Bechmann-Pasquinucci introduced the concept of quantum seals, a quantum analogue to wax seals used to close letters and envelopes. Since then, some improvements on the method have been found. We first review the current quantum sealing techniques, then introduce and discuss potential applications of quantum message sealing, and conclude with some discussion of the limitations of quantum seals.

    See publication
  • Quantum Watermarking by Frequency of Error when Observing Qubits in Dissimilar Bases

    arXiv

    We present a so-called fuzzy watermarking scheme based on the relative frequency of error in observing qubits in a dissimilar basis from the one in which they were written. Then we discuss possible attacks on the system and speculate on how to implement this watermarking scheme for particular kinds of messages (images, formated text, etc.).

    See publication

Courses

  • Algebra

    -

  • Algorithms and Data Structures

    -

  • Approximation Algorithms

    -

  • Combinatorics and Graph Theory

    -

  • Compilers and Assemblers

    -

  • Complex Variables

    -

  • Cryptography

    -

  • Discrete Structures

    -

  • Language and Automata Theory

    -

  • Measures and Probability

    -

  • Network Theory

    -

  • Operating Systems

    -

  • Operator Theory

    -

  • Program Analysis

    -

  • Programming Languages

    -

  • Technical Writing

    -

  • Topology

    -

  • Transaction Processing Systems

    -

Projects

  • HTTPray

    -

    Built a Ruby gem to send HTTP requests using non-blocking IO because no such gem existed. Existing gems relied on either threads or fibers, which in Ruby have performance problems, and the goal was to build a library that would support truly fast sending of HTTP requests with no risk of blocking the VM or otherwise using extra resources. Developed while at AdStage to support sending event, error, and other telemetry data from Ruby services to Sumo Logic.

    See project
  • storm-deploy

    -

    Fork of original storm-deploy from Nathan Marz that adds considerable functionality that we needed at Korrelate. Storm-deploy is a provisioning and deployment tool for Storm clusters build in Clojure with Pallet. Extended features include support for multiple configs, command line configs, Splunk and New Relic integration, and greater reliability.

    Other creators
    See project
  • Mac GPG

    -

    Written in a combination of C, Objective-C, and bash scripts, the MacGPG suite of tools provided a graphical user interface to the GnuPG public-key encryption tools, an open source software project that replicates much of the functionality of the commercial PGP public-key encryption program. Aspects of the suite I worked on included a program for editing GnuPG preferences, a program for processing files through GnuPG's various encryption/decryption algorithms, a keychain management tool, and a…

    Written in a combination of C, Objective-C, and bash scripts, the MacGPG suite of tools provided a graphical user interface to the GnuPG public-key encryption tools, an open source software project that replicates much of the functionality of the commercial PGP public-key encryption program. Aspects of the suite I worked on included a program for editing GnuPG preferences, a program for processing files through GnuPG's various encryption/decryption algorithms, a keychain management tool, and a library for accessing GnuPG functionality through Objective-C calls.

    Other creators
    See project

Languages

  • English

    Native or bilingual proficiency

Organizations

  • Upsilon Pi Epsilon

    Member

    -

    Computer Science honor society.

  • Sigma Tau Delta

    Associate Member

    -

    English honor society.

Recommendations received

2 people have recommended Gordon

Join now to view

More activity by Gordon

View Gordon’s full profile

  • See who you know in common
  • Get introduced
  • Contact Gordon directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Gordon Worley in United States

Add new skills with these courses