Global Feed Post Login
Replying to Avatar Jay

SOFTWAR AUDIOBOOK - Chapter 5 Part 2 Released

In this section, learn how modern abstract power hierarchies form using software and how they are exploited. Then, we start to outline the theory behind securing cyberspace using physical cost functions and proof-of-power protocols (Bitcoin).

Zap or comment to get notifications when I release new episodes.

Fountain: https://fountain.fm/episode/BksG1HRhGF0qNNlM2El2

Podcast (Apple, Spotify, etc.): https://serve.podhome.fm/episodepage/softwar-audiobook/13

Wavlake: https://wavlake.com/episode/f597fa0b-8351-4fe3-9ed8-544d772593a4

Flare: https://flare.pub/w/naddr1qqrksej5xakrg3szypld04wr40cxlgwqpacls7v9va5lg6kfyd2vz2dna42ky5rfyl3qqqcyqqqgtwcn38pxg

Youtube: https://www.youtube.com/watch?v=d7yJT8XReuM&list=PL5MbCqTAnvl9N_meijUAhRu0nb1J2K3t5&index=13

You can also look up "SOFTWAR Audiobook" on most podcast apps or on Youtube to find it.

Download the SOFTWAR PDF: https://mega.nz/file/D0hzgCpb#qo07-vUqP-0YkjUKt92ioPNzo08ayEu3RwvWfsXRH8w

#bitcoin #nostr #grownostr #plebchain #softwar #audiobook #podcast

Avatar
The Bullish â‚¿itcoiner 8mo ago

QUEUED UP 🔥

Reply to this note

Please Login to reply.

Discussion

No replies yet.