Air quoting our decent conversation is lame. Softwar isn't retarded and should be explored more openly. It triggers so many people.

The most efficient means of protection are not necessarily those that inflict the highest costs on the attacker. This isn't an either encryption or using the bitcoin protocol for digital security, it is about how to use the bitcoin protocol to create such a high cost for attack that it doesn't become worth considering.

Reply to this note

Please Login to reply.

Discussion

It's a great thesis.

My assertion is it falls apart at technical implementation.

You merely end up paying for some other access mechanism via bitcoin. Bitcoin is not the actual mechanism for defense. And the actual mechanism is decoupled from Bitcoin in a way that doesn't require it or make it novel.

Fwiw, I own an original physical copy of the book and have watched all of Jason's podcast appearances. This was the same time I worked at a defense contractor who provided cyber red team augmentation to DoD. The thesis was discussed at length without finding a concrete way to demonstrate bitcoin beng used to safeguard cyberspace outside of itself.

Paying for a key doesn't mean the payment is the key. The key is the key.

Perhaps homomorphic encryption could work but im unaware of functioning specs/code for that.