QUEUED UP 🔥
SOFTWAR AUDIOBOOK - Chapter 5 Part 2 Released

In this section, learn how modern abstract power hierarchies form using software and how they are exploited. Then, we start to outline the theory behind securing cyberspace using physical cost functions and proof-of-power protocols (Bitcoin).
Zap or comment to get notifications when I release new episodes.
Fountain: https://fountain.fm/episode/BksG1HRhGF0qNNlM2El2
Podcast (Apple, Spotify, etc.): https://serve.podhome.fm/episodepage/softwar-audiobook/13
Wavlake: https://wavlake.com/episode/f597fa0b-8351-4fe3-9ed8-544d772593a4
Youtube: https://www.youtube.com/watch?v=d7yJT8XReuM&list=PL5MbCqTAnvl9N_meijUAhRu0nb1J2K3t5&index=13
You can also look up "SOFTWAR Audiobook" on most podcast apps or on Youtube to find it.
Download the SOFTWAR PDF: https://mega.nz/file/D0hzgCpb#qo07-vUqP-0YkjUKt92ioPNzo08ayEu3RwvWfsXRH8w
#bitcoin #nostr #grownostr #plebchain #softwar #audiobook #podcast
Discussion
No replies yet.