Explain the math behind cracking a public key. Is it really safe?
The reason I ask the question is because I was reading about the new google super computer and quantum computers. I know they say 2 to power of 256 is huge but that is using basic technology? The number is basically around: 1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 is this really that safe? How long would it take a standard laptop to figure this out and based on how many equations per second? If quantum computers are used this could be possible and make crypto crash right?
Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.
Flatten the Curve. Part 48. Source Here It's getting crazier day by day now, so are you following the Boy Scout motto? On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.” Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island. But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply. Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it. But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right? Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court. 'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act. Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies. The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you. Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more. Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered. PACOM? Why isn't that command group responsible for the South China Sea? Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India. Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here Nah. I'm just fear mongering and Doomscrolling again. Heads up and eyes open. Talk soon.
Google and NASA have reached quantum supremacy in a year collaboration. What does it mean for future blockchain security?
As can be read in this article. Although quantum supremacy simply means that at least 1 specific problem has been proven to be solved by a quantum computer that can't be solved (in a realistic timeframe) by any existing classical computer, it is a very important milestone. Many have been skeptical on crossing this milestone at all. Supremacy does not mean that current cryptography is at risk tomorrow. It does however prove quantum computing is real, and has advantage over classical computers in certain tasks as has always been thought. For blockchain this means that in the future, Shor's algorithm could be used to break ECDSA, the signature scheme that is used in most blockchain. This signature scheme can be upgraded to a quantum resistant signature scheme. It does come with specific challenges though. As opposed to banks, websites, government systems, email services etc, blockchain is decentralized. That makes the following challenges exclusive blockchain challenges:
QR crypto will influence performance of current blockchains
There is no drop in replacement.
Consensus will be needed. However consensus on the result (quantum resistance) will be a given, the consensus on how to reach this and when to implement is not going to be a smooth process due to the fact different schemes and ways of implementation are possible.
User migration. All users need to migrate their coins to new QR addresses. If this is not done by the full 100% of all users, a certain % of the circulating supply will stay vulnerable to hacks. Such a hack will influence the value of all coins, including the ones on QR addresses.
Lost addresses. These are addresses nobody has access to. Like the Satoshi addresses (which have full published public keys) and all addresses of which people have lost their private keys. These will stay vulnerable for ever.
Consider the full analysis on this subject here Blockchains that implement quantum resistance from the very beginning, from genesis block, will not face these challenges. See for example QRL which has launched over a year ago.
05-24 00:54 - 'Topic: [Quantum computing] Reason: [SHA-256 encryption breaking]' (self.Bitcoin) by /u/Xyopsi removed from /r/Bitcoin within 42-52min
''' After the years of successful advancements of quantum computing, I have been worrying about Bitcoin and it's future. I've done research about quantum computing and it's capabilities and it's not looking too good for our beloved cryptocurrency because it might have a security flaw. With quantum computing the SHA-256 (that secures Bitcoin) algorithm can be broken later in the future with the advancements with quantum computing. I'm not saying it's going to happen tomorrow but there is a chance that cryptography protocols are going to have to change to ensure the integrity of bitcoin and it's future. This is hypothetical though, not to fear monger or troll but this needs to be a discussion on which people can share opinions about this topic and come up solutions to prevent keys to be solved by in which the government or tech companies like Google, Amazon, etc can crack. I feel that this is important to discuss about and I care about the future of bitcoin and other cryptocurrencies and it's contributers and holders. Sources used: [link]1 [link]2 [link]3 [link]4 [link]5 Edit: Thanks u/jenny82ishere for fact checking me. The SHA-256 algorithm is not encryption. ''' Topic: [Quantum computing] Reason: [SHA-256 encryption breaking] Go1dfish undelete link unreddit undelete link Author: Xyopsi 1: b*oc**hainhub.net/bl**/*lo*/cryptogra*hy-**ockc**in-b*tc**n/ 2: www.sci***edai*y.com/news/*a**er*energy/qu*ntum_co****i*g/ 3: www.*oogle.**m/a*p/s/ww*.science*ews.org/ar**cl*/n**-***nt****om*u*ers-can-*pe*ate**ig**r-temperatures/amp 4: en.m.wik*ped**.or*/wiki/**A-* 5: en.bitco*n**t*wi*i/Wall*t_en*ryp*io* Unknown links are censored to prevent spreading illicit content.
[ 🎶 Thinking Cap ] This post is framed around results of cypher-based queries for the number 1234 against my custom lexicon files built up over a year of phrase inputs (mostly gleaned from newspaper headlines and their 'quoted phrases', or stream of conciousness inspired by them). There are not very many, but the few there are appear to be instructive. I have used some repetition to aid those with trouble remembering numbers. Perhaps NSFW. (For the confused: see here, here and here) If you are brand new to this collection of scrolls, I recommend reading (as much as you can of) this before returning here, which will help to justify my particular focus below (the belt). Did you gnow A=1? There are 26 letters in the English-Latin Alphabet. The basic alphabetic gematria code acknowledges that A=1, B=2, C=3, ..., Z=26 (ie. ordinal gematria). In this basic alphabetic cypher (which is implied if I do not specify):
"Alphabetic Codes" = 123
... "Reveal The Code" = 123
... .. .. "To Reveal All" = 123
If you flip the numeric ordering about (ie. look in the mirror: treat 'Z' as 1, down to 'A' as 26), then...
This ("The ABC") is the name of the earliest alphabet primer textbooks for kids.
The first church primers paralleled the introduction of school textbooks known as “the ABC”
The Alphabet is a vessel for messages:
"Boat" = 123 primes (ie. an Ark ... an Archive ... built using a geometric Architecture of symbols)
If, instead of the basic alphabetic ordinal cyphers above, we use another cypher some call Agrippa's Key, and some call the 'jewish cipher', which is based on the ancient Hebrew and Greek gematria charts, and maps that scheme to the Latin Alphabet, we can ask a catch-phrase question (written more formally than usual)
What's in a name?
"What is in a name?" = 1234 jewish-latin-agrippa
Here we move beyond the three steps of ABC and arrive at the Door of Dalet. Behind it, if we have the write keys, we might discover...
ie. quantum-entanglement: you cannot give birth to your first alphabetic Son, a strong boy named Aleph, and deny he is '1'. You cannot have your second child, a beautiful maiden, Beth, and deny she is '2'. Animals on the ark 2 by 2. You cannot order the alphabet, and deny the letters have ordinal indexes (ie. numbers associated with them - significant others)
Obstetrics is the field of study concentrated on pregnancy, childbirth, and the postpartum period. As a medical specialty, obstetrics is combined with gynaecology under the discipline known as obstetrics and gynecology (OB/GYN) which is a surgical field.
... ( "The Last Proof of Life After Death" = 911 primes )
I have a spell-matching feature that can cross-match multiple cypher results and return the 'closest frequency matches' of all the spells I've ever entered into my gematria tools. At the time of writing the lexicon file is half a megabyte in size (plain text) and contains 37,694 words and phrases. When I ask for the spellings that most closely match: "live forever", I get the following three results as top matches:
'white liquid', 'into the girl', and 'the dilution' (with 8+ cypher matches)
There are a lot of flowery symbolic or metaphorical phrases that it could have returned, but it seems the Heptapods are rather blunt. Again:
"Divine Feminine" = 911 jewish-latin-agrippa
... .. "Sexy Girl" = 911 jewish-latin-agrippa
From... Revelation 9:11 King James Version (KJV):
And they had a king  over them, which is the angel of the bottomless pit, whose name in the Hebrew tongue is Abaddon  , but in the Greek tongue hath his name Apollyon.
This is perhaps a dual - the Abaddon is both Father Beast (and Lord of the Harem, perhaps, given the plural 'them') and the Beastly Progeny (ie. King and Prince):
"Pregnant" = 333 jewish-latin-agrippa
"The Temple" = 333 jewish-latin-agrippa
... "A Baby" = 333 trigonal
The angelic little baby, retrieved from the bottomless pit, is the apple of mommy and daddy's eyes (even though it is very naughty, ruling over their lives for many years after his or her noxious retrieval from the Underworld).
Viva Las Vegas (ie. V.L.V ): 777 (ie. to win at slots):
"A Triple-Seven" = 1234 trigonal | 2,322 squares
The Boeing 777 is a premiere passenger aircraft. The Boeing 787 is called the Dreamliner (ie "The Call" = 787 squares ... of Morpheus) The Boeing 747 is Old Faithful, the Jumbo Jet of Time Air Force One is a 747
"Air Force" = 223 primes
"Winds" = 223 primes
"Goddess" = 223 primes
... "The Law" = 223 primes
... "Air Force" = 223 primes
"Winds" = 223 primes
"The Law" = "Goddess" = 223 primes
She steps on "The Scale" = 223 primes ... ...and hopes she is ...
"Weightless" = 1234 jewish-latin-agrippa
From an old Alphabet Primer:
... He that ne'er learns his ABC, ... For ever will a Blockhead be. ... But he that learns these Letters fair, ... Shall have a Coach to take the Air.
Enregisterment is often partially, rather than completely, true, sort of like an accent viewed through a funhouse mirror.
I was triggered to made this post due to various recent media 'events', this 'crazy' 'news item' the final straw that broke the gimel's black (I link to old reddit theme because it is objectively better ):
These are things we can imagine Alphabet Sages might desire to encode and honour - as much for a mnemonic purpose, as for teaching purposes, or for archiving [...] knowledge [...] or purely for the sake of esoterica itself (ie. wizard just likes math, or architecture, and thus honours math and arches, secretely in words using basic algebra and references to certain idioms and golden numbers. Wizard works for King, shows him tricks. King decrees new Bible edition, and new Dictionary version).
He found me to be of a tractable, inquiring, and fearless disposition. A dash of melancholy is lacking in me, else I would make all, who are inclined to blame the Comte de GABALIS for having concealed nothing from me, confess that I was a not unfit subject for the Occult Sciences. One cannot make great progress in them, it is true, without melancholy; but the little that I possess in no wise disheartened him. You have, he told me a hundred times, Saturn in an angle, in his own house, and retrograde; some day you cannot. fail to be as melancholy as a Sage ought to be; for the wisest of all men, as we learn in the Cabala, had like you Jupiter in the Ascendant, nevertheless so powerful was the influence of his Saturn, though far weaker than yours, that one cannot find proof of his having laughed a single time in all his life. The Amateurs must, therefore, find fault with my Saturn and not with the Comte de GABALIS, if I prefer to divulge their secrets rather than to practise them.
A Glance at the Heart: Proof-of-Authority Technology in the UMI Network
https://preview.redd.it/vhvj6v093df51.jpg?width=1024&format=pjpg&auto=webp&s=00c0c223d9758edec8ed49a8cb9024f96d3ee343 Greetings from the UMI Team! Our Whitepaper describes in detail the key pros and cons of the two mechanisms which the great majority of other cryptocurrencies are based on: ● Proof-of-Work (PoW) — mining technology. Used in Bitcoin, Ethereum, Litecoin, Monero, etc. ● Proof-of-Stake (PoS) and its derivatives — forging technology. Used in Nxt, PeerCoin, NEO, PRIZM, etc. As a result of a careful analysis of PoW and PoS, which are designed to fight against centralization, there came a conclusion that they both fail to perform their main mission and, in the long run, they lead to the network centralization and poor performance. For this reason, we took a different approach. We use Proof-of-Authority (PoA) algorithm coupled with master nodes, which can ensure the UMI network with decentralization and maximum speed. The Whitepaper allows you to understand the obvious things. This article will give you a clear and detailed explanation of the technology implemented in the UMI network. Let's glance at the heart of the network right now. Proof-of-Authority: How and Why It Emerged It's been over a decade since the first transaction in the Bitcoin network. Over this time, the blockchain technology has undergone some qualitative changes. It's down to the fact that the cryptocurrency world seeing the emerging Proof-of-Work defects in the Bitcoin network year after year has actively searched for ways to eliminate them. PoW decentralization and reliability has an underside of low capacity and scalability problem that prevents the network from rectifying this shortcoming. Moreover, with the growing popularity of Bitcoin, greed of miners who benefit from high fees resulting from the low network throughput has become a serious problem. Miners have also started to create pools making the network more and more centralized. The “human factor” that purposefully slowed down the network and undermined its security could never be eliminated. All this essentially limits the potential for using PoW-based cryptocurrencies on a bigger scale. Since PoW upgrade ideas came to nothing, crypto community activists have suggested cardinally new solutions and started to develop other protocols. This is how the Proof-of-Stake technology emerged. However, it proved to be excellent in theory rather than in practice. Overall, PoS-based cryptocurrencies do demonstrate a higher capacity, but the difference is not as striking. Moreover, PoS could not fully solve the scalability issue. In the hope that it could cope with the disaster plaguing all cryptocurrencies, the community came up with brand new algorithms based on alternative operating principles. One of them is the Proof-of-Authority technology. It was meant to be an effective alternative with a high capacity and a solution to the scalability problem. The idea of using PoA in cryptocurrencies was offered by Gavin Wood — a high-profile blockchain programmer and Ethereum co-founder. Proof-of-Authority Major Features PoA's major difference from PoW and PoS lies in the elimination of miner or forger races. Network users do not fight for the right to be the first to create a block and receive an award, as it happens with cryptocurrencies based on other technologies. In this case blockchain's operating principle is substantially different — Proof-of-Authority uses the “reputation system” and only allows trusted nodes to create blocks. It solves the scalability problem allowing to considerably increase capacity and handle transactions almost instantly without wasting time on unnecessary calculations made by miners and forgers. Moreover, trusted nodes must meet the strict capacity requirements. This is one the main reasons why we have selected PoA since this is the only technology allowing to fully use super-fast nodes. Due to these features, the Proof-of-Authority algorithm is seen as one of the most effective and promising options for bringing blockchain to various business sectors. For instance, its model perfectly fits the logistics and supply chain management sectors. As an outstanding example, PoA is effectively used by the Microsoft Azure cloud platform to offer various tools for bringing blockchain solutions to businesses. How the UMI Network Gets Rid of the Defects and Incorporates the Benefits of Proof-of-Authority Method Any system has both drawbacks and advantages — so does PoA. According to the original PoA model, each trusted node can create a block, while it is technically impossible for ordinary users to interfere with the system operation. This makes PoA-based cryptocurrencies a lot more centralized than those based on PoW or PoS. This has always been the main reason for criticizing the PoA technology. We understood that only a completely decentralized product could translate our vision of a "hard-to-hit", secure and transparent monetary instrument into reality. Therefore, we started with upgrading its basic operating principle in order to create a product that will incorporate all the best features while eliminating the defects. What we’ve got is a decentralized PoA method. We will try to explain at the elementary level: - We've divided the nodes in the UMI network into two types: master nodes and validator nodes. - Only master nodes have the right to create blocks and confirm transactions. Among master node holders there's the UMI team and their trusted partners from across the world. Moreover, we deliberately keep some of our partners — those who hold master nodes — in secret in order to secure ourselves against potential negative influence, manipulation, and threats from third parties. This way we ensure maximum coherent and reliable system operation. - However, since the core idea behind a decentralized cryptocurrency rules out any kind of trust, the blockchain is secured to prevent master nodes from harming the network in the event of sabotage or collusion. It might happen to Bitcoin or other PoW- or PoS-based cryptocurrencies if, for example, several large mining pools unite and perform a 51% attack. But it can’t happen to UMI. First, the worst that bad faith master node holders can do is to negligibly slow down the network. But the UMI network will automatically respond to it by banning such nodes. Thus, master nodes will prevent any partner from doing intentional harm to the network. Moreover, it will not be able to do this, even if most other partners support it. Nothing — not even quantum computers — will help hackers. Read our post "UMI Blockchain Six-Level Security" for more details. - A validator node can be launched by any participant. Validator nodes maintain the network by verifying the correctness of blocks and excluding the possibility of fakes. In doing so they increase the overall network security and help master nodes carry out their functions. More importantly, those who hold validator nodes control those who hold master nodes and confirm that the latter don't violate anything and comply with the rules. You can find more details about validator nodes in the article we mentioned above. - Finally, the network allows all interested users to launch light nodes (SPV), which enables viewing and sending transactions without having to download the blockchain and maintain the network. With light nodes, any network user can make sure if the system is operating properly and doesn't have to download the blockchain to do this. - In addition, we are developing the ability to protect the network in case 100% of the master nodes (10,000 master nodes in total) are "disabled" for some reason. Even this is virtually impossible, we've thought ahead and in the worst-case scenario, the system will automatically move to PoS. By doing so, it will be able to continue processing transactions. We're going to tell you about this in our next publications. Thus, the UMI network uses an upgraded version of this technology which possesses all its advantages with drawbacks eliminated. This model is truly decentralized and maximum secured. Another major drawback of PoA-based cryptos is no possibility to grant incentives to users. PoA doesn't imply forging or mining which allow users to earn cryptocurrency while generating new coins. No reward for maintaining the network is the main reason why the crypto community is not interested in PoA. This is, of course, unfair. With this in mind, the UMI team has found the best solution — the unique staking smart-contract. It allows you to increase the number of your coins up to 40% per month even with no mining or forging meaning the human factor cannot have a negative impact on the decentralization and network performance. New-Generation Proof-of-Authority The UMI network uses an upgraded version of PoA technology which possesses all its advantages with drawbacks virtually eliminated. This makes UMI a decentralized, easily scalable, and yet the most secure, productive, profitable and fair cryptocurrency, working for the sake of all people. The widespread use of UMI can change most aspects of society in different areas, including production, commerce, logistics, and all financial arrangements. We are just beginning this journey and thrilled to have you with us. Let's change the world together! Best regards, UMI Team!
Quantum Processing Units (QPU) grow increasingly, it won't take long anymore until classical cryptography is in danger. What are the consequences? Your encrypted communication with the internet in the current state will belong to history. Anybody will potentially be able to fake signatures and therefore impersonate you. And one last example, our beloved Bitcoin and Ethereum coins are in danger if the account holding them has one outgoing transaction or if anybody catches your not yet executed transaction. Annealing quantum processors (create multi-dimensional energy term and collapse into lowest energy) from D-Wave have already up to 5000 Qubits, 2030 Qubit QPUs are already publicly available in the "Leap" Cloud from D-Wave. Circuit-based Quantum processors (QPUs with their own quantum instruction set) have already up to 72 Qubits, 15 Qubits QPUs are already publicly accessible in IBMs QPU cloud "IBM Q Network". The end of classical public key cryptography is already visible in an unpleasantly close distance. Various post-quantum cryptographic algorithms already exist, which are currently being evaluated by NIST. One signature scheme is called "Winternitz one-time signature" (WOTS) and it allows to securely create one signature. In combination with a merkle tree, many signatures can be created. This scheme is called XMSS.
A year ago I have created a clean python project during university, which contains a WOTS abstract base class and WOTS/WOTS+ implementations based on this class. It is completly configurable and easy to use (example down below). It was created using the official RFC 8391 (at that time). It is also fully documented (including the basic math) and tested. I hope that one day it can be seen as the default python WOTS/XMSS library, but for that I need your help. If you are interested, I'd love to see you join the project and make it great. You can browse the issues to get an anchor point where to start or you can suggest new issues and work on them (after approval). The repository can be found at: https://github.com/sea212/winternitz-one-time-signature . The documentation can be found at: https://winternitz-one-time-signature.readthedocs.io/en/latest/introduction.html If you are looking for a security/cryptography project (for example for an university course), you can browse the issue to get some ideas.
Creating and verifying a signature is easy as that:
import winternitz.signatures # Create signature and verify it with the same object wots = winternitz.signatures.WOTS() message = "My message in bytes format".encode("utf-8") sig = wots.sign(message) success = wots.verify(message=message, signature=sig["signature"]) print("Verification success: " + str(success)) # Output: Verification success: True
Retrieve the public key:
import winternitz.signatures # Create signature and verify it with the same object wots = winternitz.signatures.WOTS() key = wots.pubkey
Remotely verifing signatures is also simple. To simplify this example, the whole sig dictionary is transmitted and I assume that the hashalgorithm is already imported with that name (see documentation for a clean example). The communication partner can import the data and verify your signature in the following way:
import winternitz.signatures # Create signature and verify it with the same object wots_other = winternitz.signatures.WOTS(w=sig["w"], sig["hashalgo"], digestsize=sig["digestsize"], pubkey=key) success = wots_other.verify(message=message, signature=sig["signature"]) print("Verification success: " + str(success)) # Output: Verification success: True
"Do you need a Blockchain?" - this paper is fantastic, everyone should read this before evaluating a coin and if requires a block chain to solve a solution the coin is promising to solve. (136 points, 41 comments)
Do any of you foresee a crypto being widely adopted as a general purpose payment coin? nano, btc, btccash etc (take your pick). I think it won't happen for reasons in this post. What do you think? (59 points, 54 comments)
Noticed the huge rise of EOS lately what does it have over NEO and ethereum and to a lesser extent Cardano? I tried researching it, but wasn't sold. (54 points, 55 comments)
Hard Problems in Cryptocurrency: Five Years Later ~Vitalik (46 points, 1 comment)
I had a Q&A with Bruno head architect / CEO of oyster, thought you guys might like it. (45 points, 2 comments)
A good article that explains in simple terms how Eth2 works, how it will be rolled out and migrated from eth1 (42 points, 4 comments)
DAI the stablecoin can now be transferred GAS free (article explaining how it works via new MCD DAI contract). This holds alot of promise for the so called "Web3" (40 points, 8 comments)
Veriblock is consuming 27% of bitcoins block space - what does this mean for bitcoins future? (39 points, 16 comments)
Vitalik: Alternative proposal for early eth1 <-> eth2 merge (38 points, 3 comments)
Is launching a PoW permissionless blockchain still possible today? or would it be too susceptible to a 51% attack? (37 points, 37 comments)
Technical comparison of LIGHTNING vs TANGLE vs HASHGRAPH vs NANO (133 points, 37 comments)
Addressing Nano's weaknesses (bandwidth usage and disk IO). Nano voting traffic to be reduced by 99.9% by implementing vote by hash, lazy bootstrapping, and reduced vote rebroadcasting (x-post CryptoCurrency) (78 points, 8 comments)
Emergent centralization due to economies of scale (PoW vs DPoS) – Colin LeMahieu (52 points, 37 comments)
Nano community member developing a distributed "mining" service to pay people to do PoW for third-parties (e.g. exchanges, light wallet services, etc) (32 points, 20 comments)
What do you think about OpenCAP, the cryptocurrency alias protocol that mirrors traditional email addresses? (15 points, 12 comments)
Bitcoin would be a calamity, not an economy (11 points, 52 comments)
Part 5. I'm writing a series about blockchain tech and possible future security risks. This is the fifth part of the series talking about an advanced vulnerability of BTC. (43 points, 43 comments)
I'm writing a series about blockchain tech and possible future security risks. This is the third part of the series introducing Quantum resistant blockchains. (36 points, 4 comments)
Part 4B. I’m writing a series about blockchain tech and possible future security risks. This is the fourth part of the series explaining the special quality of going quantum resistant from genesis block. (25 points, 21 comments)
Part 6. (Last part) I'm writing a series about blockchain tech and possible future security risks. Failing shortcuts in an attempt to accomplish Quantum Resistance (24 points, 38 comments)
I'm writing a series about blockchain tech and possible future security risks. This is the first part of the series introducing the basic concept of blockchain and what makes it reliable. (23 points, 10 comments)
I'm writing a series about blockchain tech and possible future security risks. This is the fourth part of the series explaining the special quality of going quantum resistant from genesis block. (7 points, 1 comment)
Part 2. I'm writing a series about blockchain tech and possible future security risks. This is the second part of the series: An accessible description of hashing and signature schemes. (5 points, 0 comments)
Everytime I try to investigate the technology behind Cardano(Ada), I come across the words "scientific" and "peer-reviewed" over and over but almost no actual details. Can someone fill how this coin actually works and where they are in development? (126 points, 49 comments)
"Do you need a Blockchain?" - this paper is fantastic, everyone should read this before evaluating a coin and if requires a block chain to solve a solution the coin is promising to solve. by Neophyte- (136 points, 41 comments)
Technical comparison of LIGHTNING vs TANGLE vs HASHGRAPH vs NANO by Qwahzi (133 points, 37 comments)
Everytime I try to investigate the technology behind Cardano(Ada), I come across the words "scientific" and "peer-reviewed" over and over but almost no actual details. Can someone fill how this coin actually works and where they are in development? by RufusTheFirefly (126 points, 49 comments)
160 points: holomntn's comment in ELI5: Why did it take so long for blockchain technology to be created?
121 points: KnifeOfPi2's comment in How do we change the culture around cryptocurrency?
105 points: theglitteringone's comment in Outside of currency and voting, blockchain is awful and shouldnt be used. Can anyone explain where blockchain is worth the cost?
102 points: benthecarman's comment in If crypto now is like 'the Internet' of the past, where are we?
96 points: pegasuspect93's comment in If crypto now is like 'the Internet' of the past, where are we?
95 points: bannercoin's comment in Realistically, why would anybody expect the startup crypto platforms to beat out the corporate giants who are developing their own Blockchain as a Service (BaaS) solutions? Ex. IBM, SAP, JP Morgan...
83 points: AlexCoventry's comment in Ethereum private key with all zeroes leads to an account with 5000$ on it
82 points: deleted's comment in Is blockchain really useful ?
Jews have real life time machine(s) and they want me to think that particle accelerators are actually time machines.
Previous post was deleted by a mod because of rule 4. To give me the impression that not everyone on the internet know who I am perhaps? Well it's not gonna work. The mods here even want me to know that they know who I am which is why the new mod account OB1_kenobi. Anyway re-posting with possibly threatening language removed and some other changes/additions. 🤷🏻♂️ All jews know who I am in real life and are "watching" me Truman Show style not just in the present but also in the future. How cool is that? They want me to think that particle accelerators are actually time machines. There is even a documentary called "The World's First Time Machine" suggesting that all they can do with their time machines is receive messages from the future (https://www.imdb.com/title/tt0867212/). As shown in a South Park episode also. They had phones that could be used to call people in the past but they were meant for prank calls only. 🤣 By now I already think that the internet is just AOL. A = me (aMErica?); Me = Satan; "Satan Online" (I am Satan apparently 🤣). So everyone on the internet already know about the existence of time machine(s) and other advanced tech. Also noticed that country names may be fake so everyone in the world may indeed know who I am in real life. But posting this just in case jews also have mass "neuralization" tech as shown at the end of the movie Men In Black 2. Or like that Steve Carell movie (Date Night) where his character gave money to scammers saying that he knew they were scammers but was giving them money anyway, just in case they were not. The jews may have seen that the "end is nigh" with their time machine(s) and instead of "repenting" they came up with the "Q psyop" to try and save their jew world. 🤣 And it seems like a generational psyop at this point because they even used their time machine(s) in the Charlie Chaplin movie "Modern Times" (see, it even has "time" in it 🤣). The jews have been "showing off" their time machine(s) to me using their jew media. It seems to me now that ALL media is jew media. TV shows, movies, music, video games, news, books, etc. And it's not just hollywood but also bollywood, tollywood, rollywood and whatever other "woods" there are. They all know who I am in real life apparently. Combined with their remote mind surveillance/control tech (or whatever it is they call it) they can make it seem like the actors in TV shows or movies know what I am thinking/doing while watching a particular scene (sometimes even if I am within earshot). And now that I know, I can even make fun of the actors just by thinking. I also tried looking up some of their death days (in case of old actors in old movies) and letting them know when they are gonna die but they have put up fake death days and causes of death on sites like imdb and wikipedia, and in some cases not mentioning death days at all. For example, when I was a kid I heard that Charlie Chaplin was apparently choked to death by his fellow actors and everyone thought they were acting, whereas in Charlie Chaplin's wikipedia entry it says that he died in his sleep. 🤷🏻♂️ I also managed to show some of them what they would look like in the future (jewesses mostly 😁) because of which they even made it difficult to find newer photos of them in imdb or not posting photos at all. 🤣 Oh yes, the jews can look up their actual death days using their time machine(s) but don't because it may be a "Brave Jew World" but it's not that brave. 🤣 Was also reminded of the website deathclock.com and noticed they used their time machine(s) to leave messages for me (the emails sent to the "owner" of the website and his replies were actually meant for me). And whatever happened to stickdeath.com? 🤣 I am guessing the emails posted on that site and the owner's replies were also meant for me. Since they have time machine(s), they know which websites I will be visiting and when, and can leave messages meant for me beforehand on comment sections, forums, etc. They are also showing off their time machine(s) using video games like GTA V. For example I replayed the "Repossession" mission (https://gta.fandom.com/wiki/Repossession) just after buying a motorcycle last year. The motorcycle just so happens to be a TVS Apache (https://tvsmotor.com) and one of the characters mentions having "Apache" blood. Not sure if the jews wanted me to buy the motorcycle or not but I believe they most likely wanted me to buy the TVS NtorQ (it had bluetooth and everything 🤣). Now that I have already purchased the Apache, they have added bluetooth and electronic fuel injection to the 2020 model and I am stuck with no bluetooth and a carburetor instead. 😒 They also have a scooter called Jupiter (not Saturn 🤣). Also realized that I am supposed to be the crazy frog (the most annoying thing in the world; Satan is also supposed to be pepe the frog 🤷🏻♂️) - https://www.youtube.com/watch?v=k85mRPqvMbE (as foretold by jews 🤣) When playing Assassin's Creed I noticed the message when the game is launched claiming that the game was "made by a mulitcultural team of various religious faiths and beliefs" and found it odd at the time. Now I realize it's because the game was actually made by a "multicultural" team of jews. Didn't pay much attention to the story but I am sure they used their time machine(s) on that game also. And when playing Forza Horizon 4 recently, they "gifted" me with a "Santa" outfit trying to hint that they know who I am and that Satan is also supposed to be Santa. That's why there was that movie "Bad Santa" I am guessing. 🤣 The first time I thought someone out there definitely has time machines is when I was watching the "Timeless" episode of "Star Trek: Voyager" (https://memory-alpha.fandom.com/wiki/Timeless_(episode) ). I was having salami sandwiches during the following scene and it was technically "lunch".
Harry Kim and Chakotay, just before entering the slipstream in the Delta Flyer
This happened either in 2016 or 2017 whereas the episode was apparently made in 1998. Didn't even notice the name of the episode at the time and only noticed when I looked it up again and posted about it on the 8chan "qresearch" board. I also thought of the possiblity that I am living in a simulation or something and that the episode was being "generated" or "rendered" live but that was not the case since I later noticed that such things happened even in TV shows that I had already watched before and remembered watching. For example, cartoons like Swat Kats (9/11 is just fake news meant for Satan; same goes for 26/11 I am guessing but Satan didn't pay much attention to it but did theorize that the US was responsible for that also 🤣) and Dexter's Laboratory. Anyway, only after watching the entire first season of "Quantum Leap" and a few episodes of the second season (there is an episode where the main character says "oy vey, I am the rabbi") did I realize that it's none other than the jews who have time machine(s). I posted about jews having time machine(s) on 8chan for a while and then stopped posting since I had come to the conclusion that everyone already knew since I had been remembering past events and even in real life people (I believe they are jews) were providing hints that they already know about time machine(s) and that they can "see" me. For example even when I am out riding my motorcycle, they bring cars and other vehicles in front of me with license plates like "1CQ" (I see Q?), "14CQ" (I foresee Q?), 12CQ (I too see Q?), etc. Satan is "Q" apparently. The "Q" from LGBTQ (I think it's supposed to be a replacement for P 😐). Yesterday there was a car with a "1AM" license plate and I correctly guessed that they may have seen me stay up till 1 am because of this post. 🤷🏻♂️ I believe Satan is also supposed to be "L", "G", "B", and "T". For example, they have a Satan/devil character in South Park but have also been making fun of me using Mr. Garrison (they also use other characters to make fun of me). He was supposed to be gay, but later becomes a "tranny" and also a "lesbian", and then becomes a man again. 🤣 Even when they were making fun of Trump using Mr. Garrison, they were actually making fun of Satan. 🤣 I only thought "cancel south park" because I thought they were making fun of Trump whereas they and even Trump were making fun of Satan. 🤣 Satan still wants South Park cancelled (that's why "tegridy farms" in the latest season I am guessing). Same goes for "The Simpsons" and "Family Guy". They did cancel "Family Guy" once, didn't they? Probably because they knew Satan would want it cancelled in the future because they were being anti-Trump. Satan wanted Trump to win but turns out he is just an actor and that it's a jewess run jew world. That's why they are unwilling to even put out fake news about Hillary being sent to jail (real Satan wants Hillary in jail). 🤣 Time machine(s) are also being used to produce the cartoon Teen Titans Go. Was thinking about pirating the show after finding it pretty funny despite the fact that they were making fun of me and this episode was airing at the time - https://teen-titans-go.fandom.com/wiki/BL4Z3 . There is also this episode called "Quantum Fun" - https://teen-titans-go.fandom.com/wiki/Quantum_Fun .
It's a sad, rainy day outside in Jump City, and Robin's in a similarly depressing mood. Not bothering to get dressed, he merely wears his bath robe wit a defeated look on his face. The other Titans, noticing that Robin's looking out his temporary sadness curtain again, wonder what's got him down. He explains his worries about their lives not being real—that it's all just a computer simulation. Raven slaps him in anger for bringing this nonsense up again, and the other berate him for watching The Matrix again.
Since time machine(s) exist it's definitely possible that I am living in a simulation. 😢 Santa is also shown in the cartoon, by the way. 🤣 Song from the show making fun of Satan - https://www.youtube.com/watch?v=RvgYOIHtWDA (pyramid scheme money = Bitcoin!) Anyway, since the jews have time machine(s) I believe now that all religions have been made up by them. Because Satan is also supposed to be Jesus, Shiva, Hanuman, etc. 🤣 They want me to think that particle accelerators are actually time machines and even have a Shiva statue at CERN ("gifted" by "desi" jews 🤣). That's why they were also posting about it on /conspiracy I believe. Like voat (goat), /conspiracy was also made for Satan I am guessing because Satan is a conspiracy nut. After reading fake news about bird flu, swine flu, etc. he thought perhaps some organization like PETA was genetically engineering them. But it turns out jews are "unofficial" cannibals so why would they care about other jews eating animals? Oh, and I believe voat was made so that Satan could "have his say" but someone banned one of Satan's voat accounts because they didn't like what Satan was saying. 🤣 Jews are hiding as Christians (forgot to add it previously 🤣), Hindus, Muslims (not a good disguise 🤣), Sikhs, Buddhists, Scientologists, Satanists (they are actually anti-Satan 🤣), etc. I had noticed people in this region (fake country since it's a jew world; and fake name based on Satan's real life name) with odd looking noses before but didn't know at the time that they were supposed to be jew noses (they are "desi" jews 🤣). I noticed that some of them are using the coronavirus fake news as an excuse to hide their jew noses with masks (that's the theory anyway). I now assume that everyone with any genetic defects whatsoever (like male pattern baldness) are also jews. But I also believe that it's possible that everyone at this point are jews/have jewish ancestry. Pure blood jews (they have the most genetic defects), half blood jews or mud blood jews (Harry Potter terminology). Satan is also supposed to be Harry Potter apparently (lightning shaped scar; mark of the beast 🤣; half blood?). But it's also possible that "goyim" still exist and the jews have simply told them something like "oy vey, goyim, trust the plan, we are trying to save the jew world--I mean world, from Satan". Who knows (they do), maybe things are going according to their "plan". Maybe Satan buying that motorcycle was part of the "plan" all along. 🤷🏻♂️ Of course, if everybody knows who I am, then there is also the possibility that I have thought about before that you are all NPCs and I am the only one real living in a completely fake world. That's why there were all those "NPC" memes and fake news about them being "dehumanizing". 🤣 Jews are just acting like the actors in Truman Show (the ones that were pretending to be his friends and family), they are definitely not NPCs even though they have been behaving like NPCs when around Satan. Anyway, I have to wait for "real time" to tell me what's what. "Fake time" (opposite of real time? 🤣) has already told the jews (or whoevewhatever they are) what's going to happen in the future and may have also mind fucked them in the process. 🤣 Anyway, the jews have time machine(s) and therefore other advanced tech (like remote mind surveillance/control tech), they know what's going to happen in the future and may have seen the end of their jew world and think/know that "Satan" is reponsible somehow and apparently I am "Satan". I even remember reading fake news about Trump winning and end times "prophecies" coming true on an "Israeli" (also fake name? Israel is not "real"?) news site. Of course, I have no memories of being "Satan" or whatever so it's possible the jews did something to wipe my "satanic" memories which may also be the reason that I am somewhat retarded (I even had a "I am retarded?" moment like in the Quantum Leap episode "Jimmy") which the jews like to describe as autism, ass burgers, etc. 🤣 But since they have been reading my thoughts and watching me all these years (with "eye phones" as shown in that Futurama episode?), there may have been coincidences from my side because of which they may have thought that Satan is only pretending to be retarded and knows who he is. Perhaps they were not coincidences. I don't know (मैंने कुछ नहीं पता 🤣). But maybe the jews do because they have REAL LIFE TIME MACHINE(S). ¯_(ツ)_/¯ Last time I am posting. Won't be posting again if deleted. 🤷🏻♂️
hasnt it been decided many times over that bitcoin cant really be hacked. even controlling a majority of the hash only grants you so much power over the blockchain. even a quantum computer wont take the blockchain back in time. and controlling so much power would be more beneficial to just mine the coins. not to mention hacking bitcoin would be like sinking a ship you're on Quantum computing and Bitcoin. From Bitcoin Wiki. Jump to: navigation, search. Quantum computers are computers which exploit quantum mechanics to do certain computations far more quickly than traditional computers. A sufficiently large quantum computer would cause some trouble for Bitcoin, though it would certainly not be insurmountable. Note that the abbreviation QC can stand for either ... Quantum computers have arrived, and new models are introduced every year. Most recently, IBM demonstrated a brand new model at this year’s Consumer Electronics Show.Most quantum computing research is currently limited to academic institutions and major corporations, but the technology will become more widely available in the not-so-distant future. Quantum Resistant Ledger (QRL) Review . Based upon the understanding that popular existing cryptographic signature schemes (such as ECDSA) in the cryptocurrency space are vulnerable to a sufficiently powerful quantum computer running Shor’s algorithm, QRL is addressing what will be a singular threat to the security of cryptocurrency going forward – the inevitability of quantum computing. As the threat of quantum computing materializes, Bitcoin would be able to adjust gradually by evolving to adopt more quantum-resistant cryptography such as Merkle Schemes, Lamport’s Signature, and Secret Sharing. In the meantime, new versions of Quantum Money are being created, such as public and private quantum money, or semi-quantum money. Long term, the mathematical assurances provided by ...
Can Quantum Computers Hack Bitcoin / Ethereum? - YouTube
Watch the latest Bitcoin.com Weekly Update where we touch on Wirecard filing for insolvency, what impact advancements in quantum computing will have Bitcoin, miners selling 9,000 BTC and the ... For more on blockchain & cryptocurrency, visit https://www.finder.com/cryptocurrency?utm_source=youtube&utm_medium=video&utm_campaign=tdx&utm_content=yt-desc... Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography there is a 20-30 year lifecycle for an algorithm before it gets exceeded by ... Subscribe for daily crypto videos : https://goo.gl/zm1G9x Bitcoin will be the new store of value and crypto will be the new technology evolution and I want to be a part of that trough this channel ... Quantum Computing is hailed as a technical breakthrough and a lot of people are scared by it. What's the engineering reality? What can it do to Bitcoin? Part 1 of this question. https://twitter ...