In short, I'm not talking about spacially constrained hardware, I'm talking about applying physical constraints to the actual bitsvof information themselves (Satoshi did this part) and then using those physically constrained bits of information in ways that secure other software and networks.. that is.. to treat these bits of information in ways other than simply assigning monetary value to them.

This is the future.

Reply to this note

Please Login to reply.

Discussion

No replies yet.