Iām an engineer. Give me concrete implementation details. Love the softwar theory but canāt see how it actually is implemented. Hand waved theorems are good. Lots of things started that way but I need some code to work with. Or a concrete example.
Discussion
One very concrete example is signing totally uncensorable messages, i.e. securing your first amendment right to speak openly and freely.
Securing the freedom of information flow in cyberspace.
Fair.
I donāt follow the weapon thesis then. For background I spent 11yrs 4mo and 3 days working for DoD in the Intel Community at strategic and tactical levels.
If at the core of our system and its power is the money system it uses, using another system outside of its control is war on the system
š¤
#Bitcoin ASICs are human-out-of-the-loop warfighting drones engaged in a non-lethal probabilistic physical power competition to determine the legitimate state of ownership and chain of custody of the underlying resource and the privilege of authoring the next block.
This enables humanity to use a non-lethal warfare protocol to establish their intraspecies dominance hierarchy.
š¤·āāļø
Have to admit I didn't read full the OP... because humans, culture is the only constant on power and warfar, the original programing. What you, primordial, propose (inferring from other parts of this post) will lead to a Borg like scenario, because power. But it will also fail because entropy, there must be a counter balance to hold, like others mentioned "meat space". A hammer or a sun going supernova you can not escape, just enjoy the day that you have and love as much as you you can.
The weapon thesis is we use physical power to secure every other domain of objective physical reality.
We are now using physical power to secure cyberspace.
I understand that. How does one attack with bitcoin?
you guys are making an entire thread without spelling "software" correctly !
that is blatherbot work
One doesnāt. This whole idea that bitcoin is a weapon (which was walked back by lowry) is nonsense. An honest decentralized ledger is not āpower projectionā that will take your enemies down. Watch the TFTC podcast with Jason, he couldnāt come up with one example of how bitcoinās hashrate secures anything other than bitcoin. He claims that somehow putting info behind a bitcoin paywall is revolutionary. Very skeptical about the whole thing. Lopp has a good article responding to his thesis.
How you should think about it is simply in terms of physical security. Not necessarily offense or defense.
The physically costly bits of information secured by proof-of-work can be used to drastically increase the cost of attacking your computer network to the point where it's literally too physically costly for any attackers to even attempt attacking.
A weapon can be either passive or active physical power projection.
A wall is technically a passive physical power projection weapon.
People think in terms of offense and defense.. but the right way to think of it is passive and active tactics, techniques, and technologies that allow you to achieve physical security.
> The physically costly bits of information secured by proof-of-work can be used to drastically increase the cost of attacking your computer network to the point where it's literally too physically costly for any attackers to even attempt attacking.
What bits are secured aside from the time chain ledger? This is general hand waving. How do you secure something other than bitcoin using bitcoin?
Design an API that requires all control actions, or especially sensitive control actions to be stamped with X amount of bitpower, therefore verifying a superfluous physical cost was paid to send the control signal.
It's not actually that complicated lmao.
> Design an API
This is exactly what Iām asking for. I donāt think you can. I donāt think anyone can. Lots of theories fall flat at practical application and I think softwar is one of them. Cool theory, doesnāt work in practice.
> itās not actually that complicated lmao.
So give me the concrete design for the API and stop with the theoretical word salad. I understand the thesis and all it entails. Doesnāt mean shit if you canāt deliver functioning code.
Who says functioning code hasn't already been implemented. Bitcoins network PROVES this concept is totally valid.
#Bitcoin is the implementation
