Craig Wright - Bitcoin and Quantum Computing

Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.

Flatten the Curve. Part 48. Source Here
It's getting crazier day by day now, so are you following the Boy Scout motto?
On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”
Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it.
But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.
'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.
Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.
The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here
Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you.
Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
PACOM? Why isn't that command group responsible for the South China Sea?
Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.
Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Nah. I'm just fear mongering and Doomscrolling again.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]

Evidence Points to Bitcoin being an NSA-engineered Psyop to roll out One-World Digital Currency

Eye
I'm going to assume the readers who make it to this article are well informed enough that I don't have to go into the history of the global money changers and their desire for a one world currency.
(If you don't yet understand the goal of the globalist banking empire and the coming engineered collapse of the fiat currency system, you're already about 5,000 posts behind the curve.)
With that as a starting point, it's now becoming increasingly evident that Bitcoin may be a creation of the NSA and was rolled out as a "normalization" experiment to get the public familiar with digital currency.
Once this is established, the world's fiat currencies will be obliterated in an engineered debt collapse (see below for the sequence of events), then replaced with a government approved cryptocurrency with tracking of all transactions and digital wallets by the world's western governments.
NSA mathematicians detailed "digital cash" two decades ago
What evidence supports this notion?
First, take a look at this document entitled, "How to Make a Mint - The Cryptography of Anonymous Electronic Cash." This document, released in 1997 - yes, twenty years ago - detailed the overall structure and function of Bitcoin cryptocurrency.
Who authored the document?
Try not to be shocked when you learn it was authored by,
"mathematical cryptographers at the National Security Agency's Office of Information Security Research and Technology." 
The NSA, in other words, detailed key elements of Bitcoin long before Bitcoin ever came into existence.
Much of the Bitcoin protocol is detailed in this document, including signature authentication techniques, eliminating cryptocoin counterfeits through transaction authentication and several features that support anonymity and untraceability of transactions.
The document even outlines the heightened risk of money laundering that's easily accomplished with cryptocurrencies. It also describes "secure hashing" to be "both one-way and collision-free."
Although Bitcoin adds mining and a shared, peer-to-peer blockchain transaction authentication system to this structure, it's clear that the NSA was researching cryptocurrencies long before everyday users had ever heard of the term.
Note, too, that the name of the person credited with founding Bitcoin is Satoshi Nakamoto, who is reputed to have reserved one million Bitcoins for himself.
Millions of posts and online threads discuss the possible identity of Satishi Nakamoto, and some posts even claim the NSA has identified Satoshi.
However, another likely explanation is that Satoshi Nakamoto is the NSA, which means he is either working for the NSA or is a sock puppet character created by the NSA for the purpose of this whole grand experiment.
The NSA also wrote the crypto hash used by Bitcoin to secure all transactions
On top of the fact that the NSA authored a technical paper on cryptocurrency long before the arrival of Bitcoin, the agency is also the creator of the SHA-256 hash upon which every Bitcoin transaction in the world depends.
As The Hacker News (THN) explains.
"The integrity of Bitcoin depends on a hash function called **SHA-256**, which was designed by the NSA and published by the *National Institute for Standards and Technology* ([NIST](https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology))." 
THN also adds:
"If you assume that the NSA did something to SHA-256, which no outside researcher has detected, what you get is the ability, with credible and detectable action, they would be able to forge transactions. The really scary thing is somebody finds a way to find collisions in SHA-256 really fast without brute-forcing it or using lots of hardware and then they take control of the network." 
Cryptography researcher Matthew D. Green of Johns Hopkins University said.
In other words, if the SHA-256 hash, which was created by the NSA, actually has a backdoor method for cracking the encryption, it would mean the NSA could steal everybody's Bitcoins whenever it wants (call it "Zero Day.")
That same article, written by Mohit Kumar, mysteriously concludes,
"Even today it's too early to come to conclusions about Bitcoin. Possibly it was designed from day one as a tool to help maintain control of the money supplies of the world." 
And with that statement, Kumar has indeed stumbled upon the bigger goal in all this:
To seize control over the world money supply as the fiat currency system crumbles and is replaced with a one-world *digital currency controlled by globalists*. 
Think cryptography is bulletproof? Think again…
Lest you think that the cryptography of cryptocurrency is secure and bulletproof, consider this article from The Hacker News, 'Researchers Crack 1024-bit RSA Encryption in GnuPG Crypto Library,' which states,
"The attack allows an attacker to extract the secret crypto key from a system by analyzing the pattern of memory utilization or the electromagnetic outputs of the device that are emitted during the decryption process." 
Note, importantly, that this is a 1024-bit encryption system.
The same technique is also said to be able to crack 2048-bit encryption. In fact, encryption layers are cracked on a daily basis by clever hackers.
Some of those encryption layers are powering various cryptocurrencies right now. Unless you are an extremely high-level mathematician, there's no way you can know for sure whether any crypto currency is truly non-hackable.
In fact, every cryptocurrency becomes obsolete with the invention of large-scale quantum computing.
Once China manages to build a working 256-bit quantum computer, it can effectively steal all the Bitcoins in the world (plus steal most national secrets and commit other global mayhem at will).
(Video)
Ten steps to crypto-tyranny - The "big plan" by the globalists (and how it involves Bitcoin)
In summary, here's one possible plan by the globalists to seize total control over the world's money supply, savings, taxation and financial transactions while enslaving humanity.
And it all starts with Bitcoin...
  1.  Roll out the NSA-created Bitcoin to get the public excited about a digital currency. 
  2.  Quietly prepare a globalist-controlled cryptocurrency to take its place. (JP Morgan, anyone...?) 
  3.  Initiate a massive, global-scale [false flag operation](http://www.bibliotecapleyades.net/sociopolitica/sociopol_falseflag.htm) that crashes the global debt markets and sends fiat currencies down in flames (hoax alien invasion, hoax North Korean EMP attack, mass distributed power grid terrorism network, etc.) 
  4.  Blame whatever convenient enemy is politically acceptable (North Korea, "the Russians," Little Green Men or whatever it takes…) 
  5.  Allow the fiat currency debt pyramid to collapse and smolder until the sheeple get desperate. 
  6.  With great fanfare, announce a government-backed cryptocurrency replacement for all fiat currencies, and position world governments as the SAVIOR of humanity. Allow the desperate public to trade in their fiat currencies for official crypto currencies. 
  7.  [Outlaw cash](http://www.bibliotecapleyades.net/sociopolitica/sociopol_globalbanking.htm#Cashless_Society) and *criminalize gold and silver ownership by private citizens*. All in the name of "security," of course. 
  8.  Criminalize all non-official cryptocurrencies such as Bitcoin, crashing their value virtually overnight and funneling everyone into the one world government crypto, where the NSA controls the blockchain. This can easily be achieved by blaming the false flag event (see above) on some nation or group that is said to have been "funded by Bitcoin, the cryptocurrency used by terrorists." 
  9.  Require [embedded RFID](http://www.bibliotecapleyades.net/ciencia/secret_projects/implants.htm#RFID) or biometric identifiers for all transactions in order to "authenticate" the one-world digital crypto currency activities. *Mark of the Beast* becomes reality. No one is allowed to eat, travel or earn a wage without being marked. 
  10.  Once absolute control over the new one-world digital currency is achieved, weaponize the government-tracked blockchain to track all transactions, investments and commercial activities. Confiscate a portion of all crypto under the guise of "automated taxation." In an emergency, the government can even announce *negative interest rates* where your holdings automatically decrease each day. 
With all this accomplished, globalists can now roll out absolute totalitarian control over every aspect of private lives by enforcing financial "blackouts" for those individuals who criticize the government.
They can put in place automatic deductions for traffic violations, vehicle license plate taxes, internet taxes and a thousand other oppressive taxes invented by the bureaucracy.
With automatic deductions run by the government, citizens have no means to halt the endless confiscation of their "money" by totalitarian bureaucrats and their deep state lackeys.
How do you feel about your Bitcoin now...?
Video
by Mike Adams December 10, 2017 from NaturalNews Website
Source
submitted by Metaliano to conspiracy [link] [comments]

I'm writing a series about blockchain tech and possible future security risks. This is the third part of the series introducing Quantum resistant blockchains.

Part 1 and part 2 will give you usefull basic blockchain knowledge that is not explained in this part.
Part 1 here
Part 2 here
Quantum resistant blockchains explained.
- How would quantum computers pose a threat to blockchain?
- Expectations in the field of quantum computer development.
- Quantum resistant blockchains
- Why is it easier to change cryptography for centralized systems such as banks and websites than for blockchain?
- Conclusion
The fact that whatever is registered on a blockchain can’t be tampered with is one of the great reasons for the success of blockchain. Looking ahead, awareness is growing in the blockchain ecosystem that quantum computers might cause the need for some changes in the cryptography that is used by blockchains to prevent hackers from forging transactions.
How would quantum computers pose a threat to blockchain?
First, let’s get a misconception out of the way. When talking about the risk quantum computers could pose for blockchain, some people think about the risk of quantum computers out-hashing classical computers. This, however, is not expected to pose a real threat when the time comes.
This paper explains why: https://arxiv.org/pdf/1710.10377.pdf "In this section, we investigate the advantage a quantum computer would have in performing the hashcash PoW used by Bitcoin. Our findings can be summarized as follows: Using Grover search, a quantum computer can perform the hashcash PoW by performing quadratically fewer hashes than is needed by a classical computer. However, the extreme speed of current specialized ASIC hardware for performing the hashcash PoW, coupled with much slower projected gate speeds for current quantum architectures, essentially negates this quadratic speedup, at the current difficulty level, giving quantum computers no advantage. Future improvements to quantum technology allowing gate speeds up to 100GHz could allow quantum computers to solve the PoW about 100 times faster than current technology.
However, such a development is unlikely in the next decade, at which point classical hardware may be much faster, and quantum technology might be so widespread that no single quantum enabled agent could dominate the PoW problem."
The real point of vulnerability is this: attacks on signatures wherein the private key is derived from the public key. That means that if someone has your public key, they can also calculate your private key, which is unthinkable using even today’s most powerful classical computers. So in the days of quantum computers, the public-private keypair will be the weak link. Quantum computers have the potential to perform specific kinds of calculations significantly faster than any normal computer. Besides that, quantum computers can run algorithms that take fewer steps to get to an outcome, taking advantage of quantum phenomena like quantum entanglement and quantum superposition. So quantum computers can run these certain algorithms that could be used to make calculations that can crack cryptography used today. https://en.wikipedia.org/wiki/Elliptic-curve_cryptography#Quantum_computing_attacks and https://eprint.iacr.org/2017/598.pdf
Most blockchains use Elliptic Curve Digital Signature Algorithm (ECDSA) cryptography. Using a quantum computer, Shor's algorithm can be used to break ECDSA. (See for reference: https://arxiv.org/abs/quant-ph/0301141 and pdf: https://arxiv.org/pdf/quant-ph/0301141.pdf ) Meaning: they can derive the private key from the public key. So if they got your public key (and a quantum computer), then they got your private key and they can create a transaction and empty your wallet.
RSA has the same vulnerability while RSA will need a stronger quantum computer to be broken than ECDSA.
At this point in time, it is already possible to run Shor’s algorithm on a quantum computer. However, the amount of qubits available right now makes its application limited. But it has been proven to work, we have exited the era of pure theory and entered the era of practical applications:
So far Shor's algorithm has the most potential, but new algorithms might appear which are more efficient. Algorithms are another area of development that makes progress and pushes quantum computer progress forward. A new algorithm called Variational Quantum Factoring is being developed and it looks quite promising. " The advantage of this new approach is that it is much less sensitive to error, does not require massive error correction, and consumes far fewer resources than would be needed with Shor’s algorithm. As such, it may be more amenable for use with the current NISQ (Noisy Intermediate Scale Quantum) computers that will be available in the near and medium term." https://quantumcomputingreport.com/news/zapata-develops-potential-alternative-to-shors-factoring-algorithm-for-nisq-quantum-computers/
It is however still in development, and only works for 18 binary bits at the time of this writing, but it shows new developments that could mean that, rather than a speedup in quantum computing development posing the most imminent threat to RSA and ECDSA, a speedup in the mathematical developments could be even more consequential. More info on VQF here: https://arxiv.org/abs/1808.08927
It all comes down to this: when your public key is visible, which is always necessary to make transactions, you are at some point in the future vulnerable for quantum attacks. (This also goes for BTC, which uses the hash of the public key as an address, but more on that in the following articles.) If you would have keypairs based on post quantum cryptography, you would not have to worry about that since in that case not even a quantum computer could derive your private key from your public key.
The conclusion is that future blockchains should be quantum resistant, using post-quantum cryptography. It’s very important to realize that post quantum cryptography is not just adding some extra characters to standard signature schemes. It’s the mathematical concept that makes it quantum resistant. to become quantm resistant, the algorithm needs to be changed. “The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat.” https://en.wikipedia.org/wiki/Post-quantum_cryptography
Expectations in the field of quantum computer development.
To give you an idea what the expectations of quantum computer development are in the field (Take note of the fact that the type and error rate of the qubits is not specified in the article. It is not said these will be enough to break ECDSA or RSA, neither is it said these will not be enough. What these articles do show, is that a huge speed up in development is expected.):
When will ECDSA be at risk? Estimates are only estimates, there are several to be found so it's hard to really tell.
The National Academy of Sciences (NAS) has made a very thourough report on the development of quantum computing. The report came out in the end of 2018. They brought together a group of scientists of over 70 people from different interconnecting fields in quantum computing who, as a group, have come up with a close to 200 pages report on the development, funding, implications and upcoming challenges for quantum computing development. But, even though this report is one of the most thourough up to date, it doesn't make an estimate on when the risk for ECDSA or RSA would occur. They acknowledge this is quite impossible due to the fact there are a lot of unknowns and due to the fact that they have to base any findings only on publicly available information, obviously excluding any non available advancements from commercial companies and national efforts. So if this group of specialized scientists can’t make an estimate, who can make that assessment? Is there any credible source to make an accurate prediction?
The conclusion at this point of time can only be that we do not know the answer to the big question "when".
Now if we don't have an answer to the question "when", then why act? The answer is simple. If we’re talking about security, most take certainty over uncertainty. To answer the question when the threat materializes, we need to guess. Whether you guess soon, or you guess not for the next three decades, both are guesses. Going for certain means you'd have to plan for the worst, hope for the best. No matter how sceptical you are, having some sort of a plan ready is a responsible thing to do. Obviously not if you're just running a blog about knitting. But for systems that carry a lot of important, private and valuable information, planning starts today. The NAS describes it quite well. What they lack in guessing, they make up in advice. They have a very clear advice:
"Even if a quantum computer that can decrypt current cryptographic ciphers is more than a decade off, the hazard of such a machine is high enough—and the time frame for transitioning to a new security protocol is sufficiently long and uncertain—that prioritization of the development, standardization, and deployment of post-quantum cryptography is critical for minimizing the chance of a potential security and privacy disaster."
Another organization that looks ahead is the National Security Agency (NSA) They have made a threat assessment in 2015. In August 2015, NSA announced that it is planning to transition "in the not too distant future" (statement of 2015) to a new cipher suite that is resistant to quantum attacks. "Unfortunately, the growth of elliptic curve use has bumped up against the fact of continued progress in the research on quantum computing, necessitating a re-evaluation of our cryptographic strategy." NSA advised: "For those partners and vendors that have not yet made the transition to Suite B algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum resistant algorithm transition.” https://en.wikipedia.org/wiki/NSA_Suite_B_Cryptography#cite_note-nsa-suite-b-1
What these organizations both advice is to start taking action. They don't say "implement this type of quantum resistant cryptography now". They don't say when at all. As said before, the "when" question is one that is a hard one to specify. It depends on the system you have, the value of the data, the consequences of postponing a security upgrade. Like I said before: you just run a blog, or a bank or a cryptocurrency? It's an individual risk assesment that's different for every organization and system. Assesments do need to be made now though. What time frame should organisationds think about when changing cryptography? How long would it take to go from the current level of security to fully quantum resistant security? What changes does it require to handle bigger signatures and is it possible to use certain types of cryptography that require to keep state? Do your users need to act, or can al work be done behind the user interface? These are important questions that one should start asking. I will elaborate on these challenges in the next articles.
Besides the unsnswered question on "when", the question on what type of quantum resistant cryptography to use is unanswered too. This also depends on the type of system you use. The NSA and NAS both point to NIST as the authority on developments and standardization of quantum resistant cryptography. NIST is running a competition right now that should end up in one or more standards for quantum resistant cryptography. The NIST competition handles criteria that should filter out a type of quantum resistant cryptography that is feasable for a wide range of systems. This takes time though. There are some new algorithms submitted and assessing the new and the more well known ones must be done thouroughly. They intend to wrap things up around 2022 - 2024. From a blockchain perspective it is important to notice that a specific type of quantum resistant cryptography is excluded from the NIST competition: Stateful Hash-Based Signatures. (LMS and XMSS) This is not because these are no good. In fact they are excelent and XMSS is accepted to be provable quantum resistant. It's due to the fact that implementations will need to be able to securely deal with the requirement to keep state. And this is not a given for most systems.
At this moment NIST intends to approve both LMS and XMSS for a specific group of applications that can deal with the statefull properties. The only loose end at this point is an advice for which applications LMS and XMSS will be adviced and for what applications it is discouraged. These questions will be answered in the beginning of april this year: https://csrc.nist.gov/news/2019/stateful-hbs-request-for-public-comments This means that quite likely LMS and XMSS will be the first type of standardized quantum resistant cryptography ever. To give a small hint: keeping state, is pretty much a naturally added property of blockchain.
Quantum resistant blockchains
“Quantum resistant” is only used to describe networks and cryptography that are secure against any attack by a quantum computer of any size in the sense that there is no algorithm known that makes it possible for a quantum computer to break the applied cryptography and thus that system.
Also, to determine if a project is fully quantum resistant, you would need to take in account not only how a separate element that is implemented in that blockchain is quantum resistant, but also the way it is implemented. As with any type of security check, there should be no backdoors, in which case your blockchain would be just a cardboard box with bulletproof glass windows. Sounds obvious, but since this is kind of new territory, there are still some misconceptions. What is considered safe now, might not be safe in the age of quantum computers. I will address some of these in the following chapters, but first I will elaborate a bit about the special vulnerability of blockchain compared to centralized systems.
Why is it easier to change cryptography for centralized systems such as banks and websites than for blockchain?
Developers of a centralized system can decide from one day to the other that they make changes and update the system without the need for consensus from the nodes. They are in charge, and they can dictate the future of the system. But a decentralized blockchain will need to reach consensus amongst the nodes to update. Meaning that the majority of the nodes will need to upgrade and thus force the blockchain to only have the new signatures to be valid. We can’t have the old signature scheme to be valid besides the new quantum resistant signature scheme. Because that would mean that the blockchain would still allow the use of vulnerable, old public- and private keys and thus the old vulnerable signatures for transactions. So at least the majority of the nodes need to upgrade to make sure that blocks which are constructed using the old rules and thus the old vulnerable signature scheme, are rejected by the network. This will eventually result in a fully upgraded network which only accepts the new post quantum signature scheme in transactions. So, consensus is needed. The most well-known example of how that can be a slow process is Bitcoin’s need to scale. Even though everybody agrees on the need for a certain result, reaching consensus amongst the community on how to get to that result is a slow and political process. Going quantum resistant will be no different, and since it will cause lesser performance due to bigger signatures and it will need hardware upgrades quite likely it will be postponed rather than be done fast and smooth due to lack of consensus. And because there are several quantum resistant signature schemes to choose from, agreement an automatic given. The discussion will be which one to use, and how and when to implement it. The need for consensus is exclusively a problem decentralized systems like blockchain will face.
Another issue for decentralized systems that change their signature scheme, is that users of decentralized blockchains will have to manually transfe migrate their coins/ tokens to a quantum safe address and that way decouple their old private key and activate a new quantum resistant private key that is part of an upgraded quantum resistant network. Users of centralized networks, on the other hand, do not need to do much, since it would be taken care of by their centralized managed system. As you know, for example, if you forget your password of your online bank account, or some website, they can always send you a link, or secret question, or in the worst case they can send you mail by post to your house address and you would be back in business. With the decentralized systems, there is no centralized entity who has your data. It is you who has this data, and only you. So in the centralized system there is a central entity who has access to all the data including all the private accessing data, and therefore this entity can pull all the strings. It can all be done behind your user interface, and you probably wouldn’t notice a thing.
And a third issue will be the lost addresses. Since no one but you has access to your funds, your funds will become inaccessible once you lose your private key. From that point, an address is lost, and the funds on that address can never be moved. So after an upgrade, those funds will never be moved to a quantum resistant address, and thus will always be vulnerable to a quantum hack.
To summarize: banks and websites are centralized systems, they will face challenges, but decentralized systems like blockchain will face some extra challenges that won't apply for centralized systems.
All issues specific for blockchain and not for banks or websites or any other centralized system.
Conclusion
Bitcoin and all currently running traditional cryptocurrencies are not excluded from this problem. In fact, it will be central to ensuring their continued existence over the coming decades. All cryptocurrencies will need to change their signature schemes in the future. When is the big guess here. I want to leave that for another discussion. There are enough certain specifics we can discuss right now on the subject of quantum resistant blockchains and the challenges that existing blockchains will face when they need to transfer. This won’t be an easy transfer. There are some huge challenges to overcome and this will not be done overnight. I will get to this in the next few articles.
Part 1, what makes blockchain reliable?
Part 2, The two most important mathematical concepts in blockchain.
Part 4A, The advantages of quantum resistance from genesis block, A
Part 4B, The advantages of quantum resistance from genesis block, B
Part 5, Why BTC will be vulnerable sooner than expected.
submitted by QRCollector to CryptoTechnology [link] [comments]

The Forthcoming CryptoTrapdoor

TLDR: CIA wants you to use bitcoin, but CIA is bad and they are up to something. When you've traded your last dollars, they'll laugh and pull the plug on bitcoin. Then you will be sad.
UPDATE:
Google is developing cryptocoin tools. Ok so the problem with that is manifold
  1. ) We know google is CIA; CIA is very untrustworthy--they've spied on us illegally since 9/11 created a security state junta; they got their start with inqtel a cia company; assange says its cia; everything they do from censoring technopopulists to promoting a fugitive from the law hillary clinton (by our FBI's own admission in congress!) over a lawfully elected president, while undermining the same....all suggest Google is still CIA.
  2. ) CIA was effectively a merger of former US intelligence and expropriated Nazi intelligence and researchers (Operation Paperclip), guided by a Nazi sympathizer whose post-WW2 work was serving as a lawyer and strategist to assist Nazi officers escape punishment and hide their wealth through various financial proxies (Allen Dulles). This is our true history. Dulles also was fired by JFK and then was charged with producing the Warren Report about JFK's assassination. MKULTRA is where we drugraped teens to blackmail politicians (brownstone ops), drugraped prostitutes and soldiers (edgewood), and performed unethical human experimentation that continues to this day. That was CIA, Navy, Darpa
  3. ) I'll say it again, a Nazi sympathizer who hid nazi gold in switzerland and ran ratlines to argentina for nazi officers, who wanted to use a false flag operation to destroy Cuba but was denied, was in charge of JFK's investigation. Kind of like having a Deepstate operative like Robert Mueller type in charge of the official 9/11 report isn't it?
  4. ) CIA is Wall Street's private army.
  5. ) NSA scans your emails, your text messages, all your information---"capture it all". They have been caught several times front-running on your private data. Any screenplay you wrote, any invention you put in a file on the google drive, and investments you're planning, any business projects you're in----they have already read and are already using in an anti-competitive way, front running on your good ideas.
  6. ) Through asset forfeitures, the US Government has a majority of Bitcoin; this is from mt gox hack recovery, silk road, silk road 2, alphabay and other darknet seizures abroad of bitcoin
  7. ) The US Government has spent 6 months colluding with the media to undermine Trump with a fake story that everyone now knows is fake (except a vanishingly few marginal, sophomoric violents, antifa types in california).
  8. ) The FBI has spent now over a year maintaining a falsified document leveraged to create a disinfo to create a psychological war against US citizens, in lieu of doing their ACTUAL job of busting a now-widely known SPY RING IN CONGRESS
  9. ) The US Government (Permanent State) has been bitching, moaning, whining about every little thing Trump has done; failing to recognize his accomplishments which are objectively pro-citizen; while letting very high level criminal avoid punishment---creating a dual justice system
  10. ) Cryptocoin has skyrocketted based well beyond confidence if you look historically at DOW industrial trends...this is a bubble, an obvious bubble. Who is blowing this bubble? Well look who has the majority share
  11. ) You don't know who runs the exchanges, but the modus operandi of those who run the exchanges are that of both criminals and intelligence agencies. I suggest it's both of them working together to run the exchanges
  12. ) After all, you can't mine bitcoin now, if you do you'll lose money because electricity to mine costs more than what you'll get from mining unless you already own vast mining infrastructure--this is the marginal cost of mining. The marginal cost of mining far exceeds purchase price of bitcoin so you might as well buy it
  13. ) Who has spare bitcoin to sell, if mining is so unprofitable AND bitcoin keeps going up? Who would sell bitcoin if it's that compelling? LOL THINK! G D it. THINK!!!! Use your brain. Someone is dumping bitcoin on you, and you're eating it up, thinking you're a genius for investing in it so early.... it's a trap...it's a honeypot. Owning a bitcoin is not a illuminati scout member badge into an exclusive club you dolts
Given that the US Security-Industrial complex, the 17 agencies, primarily CIA, NSA, FBI, NGA, DoD have been using that unaccounted-for 20T dollars now to spy on--not only us, the lumpen citizens of US, but also our Congress members--through the Pakistani liaison loophole of the Awan Brothers, it's very clear that they have NOT honored the underlying principles and values of our constitution and our culture generally. They are concerned with making money by any and all possible means---even through absolute evil--and they are concerned with controlling society very rigidly through technology, psychology, exploitation of human fears, wants and aspirations.
One way to control people is through money. When society gets out of control, especially when they start to doubt, or to hate, the control imposed upon them, the government goes absolutely insane
Because we've already proven in an earlier post that the US Government is the batshit paranoid conspiracy theorist that has ever existed, and it uses any and all desperate measures to control people's minds. That is it's true purpose and operating principle above all else. Money is just a means to that end. The mental health industry is a means to that end. The music and film industries are a means to that end. Academia is a means to that end. Modern art is a means to that end. I could go on and on how the CIA has inserted itself into all aspects of culture to create an enormous establishmentarian cult, but that's not the point of this post--though mentioning this is germane to this post to the extent that it's necessary to understand in the context of the CRYPTOCOIN TRAPDOOR>>>
So what is this cryptocoin trapdoor?
Hmm. Let me try to explain this in terms of a ruse that happened to me last year. I was invited to join a sub /sphinxclub which was ostensibly an 'antimason' sub. I had been down on freemasons / jesuits (still am) at least high level ones. I see them as the common denominator in many of these strategies-of-tension around the world, and the evidence for that is overwhelming. So I joined sphinxclub and after little activity we asked the sub's creator "so what is this sub about, what are we doing here, who wants to start the dialogue". The answer was something like "we're waiting for 20 mods to be invited so we can open the trapdoor and send everyone into hell". I thought it was a joke, and then there was an 'assignment' which I believed (in my opinion) was asking people to commit an act of left-wing terrorism against a defense contractor in florida who was believed to be using electromagnetic waves as harassment and mind control to create 'mass murder shooters' like the Navy Yard shooting. Of course I'm interested in figuring out if there's truth to this, but the means was illegal, so I left.
This strategy is both a honeypot and a trapdoor. Honeypot to bring you in and waste your time (timeloop you, waste your effort otherwise spent on writing subversive essays that undermine the establihment). Trapdoor to get you put in jail.
I believe crypto is the same type of honeypot-trapdoor
Honeypot because
  1. ) Honeypot because it's going up very quickly and now bitcoin is worth more than gold
  2. ) John McAffee a renowned technologist and drug-addled madman with spooky origins says he'll eat his penis if bitcoin isn't worth more than what a million by 2020? Something like that. He allegedly has his own mining facility in latin america, iirc.
  3. ) Honeypot because Google is now going to support it
  4. ) Honeypot because US Gov is looking the other way and China supported it
Tradoor because
  1. ) China banning it
  2. ) Finanical experts warning it's a fraud
  3. ) Me warning it's a fraud because the NSA has over 2000 Qbit quantum computers now and likely runs the exchanges
  4. ) Ebay is using it -- George Webb's research tied Omidyar directly to Deepstate
  5. ) CIA is Wall Street's private army and cannot have a situation they dont' control.
  6. ) Max Keiser and Stacey Hubert have said, numerous times, with many financial guests that NSA/CIA are manipulating markets while using the media to have you believe it's anarchic...it's an illusion
  7. ) JP Morgan is trying to manipulate crypto in europe now
  8. ) If you exchange your dollars for bitcoin, and then bitcoin plummets, then the elite have just taken your last bit of wealth away
  9. ) At this point the only people who can make money off bitcoin ARE the elite, so buying crypto is a cannabalization of dollar-owners by the political elite on the industrial/retail elite -- intelligence-aligned (dynastic) rich are eating the nouveau rich; and they are eating left-coast crypto liberals also
  10. ) EDIT: Oops forgot about civil asset forfeiture of unpaid capital gains taxes on crypto being like a stock
What is your agenda with this anti-bitcoin stuff?
I have none. These are just my thoughts I'm sharing with you and why I no longer support bitcoin until such time there are laws that guarantee that these things I worry about are inhibited. In other words, we need a non-corrupt intelligence community and guarantee they aren't manipulating it before I can trust using any kind of crypto currency. I'm telling you because I want you to make sound choices with your money and be happy and have a good safe life.
The best thing you can do right now is watch this video
What can you do?
Buy gold, silver, platinum. Or a tractor. Or bullet making equipment. Because guns are worthless without bullets.
Sources
submitted by 911bodysnatchers322 to C_S_T [link] [comments]

69 reasons I've heard why Bitcoin will fail...

It’s a Ponzi scheme Tulip bulbs! It’s a fraud Too deflationary They can just raise the 21 million coin cap We already have money that works perfectly well We already have digital currency It’s digital fiat currency You need a central bank during financial crises You need a central bank to ensure the right amount of money 21 million coins isn’t enough for the global economy It’s not real I can’t hold it in my hand No intrinsic value Nothing backs it Other than money it has no use Unlike Bitcoin, gold can be used as jewelry or in electronics No government backing I can’t pay my taxes with it They’ll just shut it down They’ll just make it illegal EMP Quantum computing Too complicated for most people I don’t understand it My financial adviser said to stay away It’s been hacked Mt Gox was hacked Used for only illegal activities like drugs and child porn When they shut Silk Road down no one will use it North Korea owns a lot of it It’s too anonymous A more anonymous coin will replace it Too volatile Can’t be a store of value No FDIC insurance if you lose your coins Once Wall St. comes in they will smash the price down and you’ll be left holding the bag No one knows who created it The NSA created it It’s a scheme by the global elite to form one world currency that they control They’ll find a bug in the software Satoshi will dump his coins and cash out Unfair benefits to early adopters Unfair coin distribution and wealth inequality Barely anyone can afford a bitcoin Blockchain is the real innovation not Bitcoin Governments will just create their own cryptocurrency Amazon will just create their own cryptocurrency The government can just shut down the internet When the electricity goes out then what? It’s a libertarian/cypherpunk fantasy Needs AML/KYC Needs proper regulation for mass adoption No one will use it because it’s value keeps going up Bitcoin is like MySpace they’ll be a newer Bitcoin 2.0 It doesn’t have smart contracts like Ethereum It’s not Turing complete What stops me from creating my own cryptocurrency? An infinite amount of cryptocurrencies can be created so it’s not scarce Not enough transactions per second It can’t scale Mining is controlled by China Mining needs to be ASIC resistant Mining is useless and a waste of energy Mining is bad for the environment Proof of stake is better than proof of work Bitcoin is evil
submitted by xcsler to Bitcoin [link] [comments]

Sorry if this is 'duh' but it would appear Cryptocoin is the New World Order's currency system of choice. They've been pushing us to it, Venezuela is the canary in the coalmine

So this just happened
An Insider's View Of The Bitcoinization Of Venezuela
Venezuela being 'saved' by cryptocoin.
This story, coupled with many other pro-crypto tales, bitcoin surpassing the value of gold, super aggro ICO values, my previous and ongoing quantum attack and exchange cia cutout 'concerns' (huge red flags) about an otherwise seemingly 'technopopulist' evolution of property exchange that I should be wholeheartedly behind, given my own populist (techo-populist) drives, principles, values...I still have pause.
I've had time to think about this and all the signs are pointing towards an inference that the decision has been made by supranationalists (CFR, Atlantic Council, Trilateral commission, Bilderberg) to get behind the cryptocurrency now. They aren't fighting it. They are supporting it. While asset forfeituring cash, warring on cash; the rest of the world is de-dollarizing and it's not because "they hate Trump". The whole world can't possibly be behind all the globalists, but boy does our media want you to think that.
Crypto could still be a honey trap like I said; but it could also be the NWO currency of choice. Either way it's not an anarchists best friend if the exhanges are run by Global; or if they can unzip the blockchain with 2000 qbit dwave computers.
Either way, if you buy into it, you're in trouble because it's clear as day that it's a bubble being created by this deepstate group, it's an illusion, and that can only mean their dominance and ability to manipulate it has reached a level of reliability that they are comfortable with.
Probably through AI, and probably through quantum DWAVE making high frequency exchanges to create artificial bullishness in regular markets as well as cryptocoin currency exchange rates.
I guess they have sauron trained on enough data that it can move stuff around quickly and keep the markets from crashing. Is this a good thing? I think it's illusion, all you're doing is stacking more jenga blocks higher which means when a crash does inevitably happen it's going to be a wider scale disaster. I personally prefer Russia's strategy of actually balancing their debt and slowly growing wealth--it's safer.
After all we find out all these online services that we use day-to-day whose advertised aim is to 'empower the people' are simply illusional. Why wouldn't financial systems be similarly illusional? They're made by the same people, what do they have that we don't? AI? Nope we got that, it's called troll accounts that are easy to spot.
Who is illusional and why are they illusional?
They are illusional because they are fake, limited hangouts that have been trojan-horsed, compromised, backdoored, powerbottomed, hijacked, phished, hacked, subsumed, tethered, moored, inculcated, incorporated, conflated and generally taken-over by the deepstate, and / or "were always deepstate we just didn't know and if you still don't know where the hell have you been exactly?"
If your government is willing to go to the lenghts they've show to go to fool you socially, why wouldn't they fool you financially? In fact many have blown the whistle for decades on the foolishness of the federal reserve and we've listened but there's not much we can do about it.
I'm still in a place where I can't recommend people run towards the NWO's sanctioned alternative to cash money system, because I think it's very unsafe---FROM THEM. So whether I'm right about it being a honeypot to siphon off your wealth and then pull the plug by bringing down the powergrid, in a totally non-believable hegelian ploy and psyop of "Korea attacked our power grid"
OR
if it's the NWO currency of choice
What is exceedingly clear to me is that bitcoin is not what it's advertised to be: a free and independent and secure money system. There's too many unanswered and non-guaranteed problems with it. I'd be safer investing in cannabis, and we know how tenuous that is.
submitted by 911bodysnatchers322 to C_S_T [link] [comments]

Steemit is probably control grid. The litmus tests are it's bitcoin basis, avaricious virality, people like WAC supporting it, and that they suppress 'conspiracy'

Steemit is based on bitcoin, they claim. That makes it censorship resistant, they say. We honestly don't know their backend, we have to trust that they aren't casting an illusion on us by publishing technical details of steemit's working that don't actually match reality. It would be trivial to spoof the alleged activity and mechanisms of bitcoin on steemit. If you don't get to see the backend, you just have to believe them. They use their own steemit currency also.
It does seem, however, to be legit if people are getting paid. But there are ways to spoof that also...you could have an internal currency and 'curators' who decide what something is worth (see the 'bernie sanders scam dollarvigilante' post below).
For example, the US government has unlimited money ('QE') to spend on a successful propaganda campaign to destroy reddit. After all, knowledge is power and the total fucking distrust of the american people towards the government is priceless.
Secondly, if Bitcoin itself is a scam, then steemit is a scam too.
Bitcoin involves cracking a code. Who has the most / best equipment to crack codes? The NSA. They have a few trillion dollars invested in a whole building that is a computer. Because of US Military Intelligence's (USMI's) NSA PRISM, bitcoin is an Elitist system you no longer have access to. I'll expand.
You can no longer make money on it if you didn't get in on it from the get-go. It's a ponzi scheme. In order to mine for bitcoin, you have to have expensive equipment. You can't buy enough equipment now to make enough bitcoin to pay for it and make a narrow margin, because of the way the system has worked. In the beginning, mining was easy, but now it's all mined out and more computer power + time is needed to unlock harder puzzles. That's just how it works.
So to start now, you'd need an astronomical investment in computer equipment and lots of spare, discounted energy, like for example a solar farm. No one has that. It's inherently more elitist as time goes on. If you started now, with your computer, it would take over 20 yrs on average to get a bitcoin block, if you ever did get one--which you might not.
My point is that bitcoin has always been elitists, never democratic. It was never based on anything other than who has the most energy and technology. People who got started early have the equipment, so does the USMI. USMI also has unlimited power: they have excess coal reserves, some hydro, some solar and wind, and lots of natural gas and fracking petrol; they also have nukes, which means 'cheaper oil than everywhere else in the world....or else'.
Therefore, the people who will have the most bitcoin at the end of the day is the US military and the 1%, period.
It's also pretty clear the NSA are developing quantum computers. People have speculated that bitcoin at present does not use quantum safe algorithms, and therefore at some point the US Mil can steal all the bitcoin that hasn't been transferred into a paper wallet. That paper does no good either because the moment that bitcoin is put into a usable electronic wallet and a firewall opened, bam, it could be taken by an omnipresent AI agent that's running as several autonomous micro instances in your dishwasher, nest AC controller, your amazon dash button, your iphone, etc.
First they fight you, then they win
Only Governments engage in activities that involve inhibiting or threatening cryptocurrencies (and it's useful to mention they fight crypto tools generally...they fought pgp, they fought phpphone, they fought tor, they fought i2p, freenet, torrent, VPNs, they totally undermined SSL with heartbleed, etc).
Then the Silkroad busts. Other darknet sites. Hacks on bitcoin exchanges and banks. Threats of TOR being undermined, heartbleed SSL bug making everyone question everything's security.
Who ended up with that money? The 1%.. The NSA? <-- coin telegraph or cointel-egraph
You will notice the US Government fought bitcoin at first, trying to rope in the IRS, the SEC and trying to lawyer up on bitcoin, threatening everyone who was playing, and dissuading everyone from getting in on bitcoin. (interesting, eh?)
Until the moment they seized the 20M or so in bitcoin from silkroad. And that happened around the same time the exchanges were starting to be compromised and bitcoin stolen. Then suddenly, the US changed its tune and bitcoin is no longer a threat. Why is that? Think!
It's that now that bitcoin has value (ie: bitcoin now has the potential to be exchanged for goods and services because of the public's trust of the currency to have said value), and that if the US has the lion's share of bitcoin, well they wouldn't to go fighting against a currency because that would only destroy its value. They aren't going to destroy their own wealth, or act against it, in other words.
Avarice and SCAM
When I first went to Steemit, this article was prominent. Now you can't find it unless you search. Everyone should read, esp. about how Sanders is abusing the system.
https://steemit.com/steemit/@dollarvigilante/steemit-is-a-scam-how-bernie-sanders-screwed-me
Yet, it's now back up to 2k+ Which is good.
Also this user 'knows the CEO' and made 12k in one month, isn't that something. Too bad I don't know the CEO
https://www.reddit.com/steemit/comments/4qug59/is_steemit_legit/d4y7yow https://www.reddit.com/steemit/comments/4qug59/is_steemit_legit/d4z2je1
and yet
https://www.reddit.com/steemit/comments/4tmrgy/steem_is_scam_proof_inside/
Conspiracy tag suppression
https://www.reddit.com/conspiracy/comments/4x54ij/steemit_selfcensorship_of_tag_conspiracy_it/
WAC supports it, so it's control grid
https://www.reddit.com/conspiracy/comments/4yily6/steemit_a_reddit_alternative_takes_up_steam_with/d6nyazx
Fluke, you are my faaather
https://np.reddit.com/conspiracy/comments/4w5man/luke_the_snook_wacoffski/
But! Corbett supports it
I trust James Corbett, but I don't know why he's so quick to jump on steemit. Seems premature, especially since they clearly suppress the conspiracy tag.
And knowing the relationship of bitcoin to power (it's a petrol-backed currency!!!!!!!!!!!!!!), and given he's made a documentary based on the history of petrol, he should know better than to back a dubious cryptocurrency based on oil. Period.
https://www.reddit.com/conspiracy/comments/4x5tsk/corbettreport_video_on_shilling_out_of_control/
Trust but verify
I'm ok with something new. In fact I tried Steemit and I like it. However, very few saw my post, nor will many. Because it was tagged conspiracy as primary, and conspiracy will not show up in lists. You have to get to conspiracy by gaming the url manually. That's lame.
No Response from Support I've told steemit about this, but I've not even gotten an email response to say, we'll respond when we can. It's literally gone into a black hole. Steemit also did not respond to another unrelated support question I sent days before the 'glitch' support email.
Fragmentation
If you think I'm 'throwing shade' on steemit, I'm not. I'm asking valid questions and pointing out things you might have missed. Shill away if you must, but I'm pretty much convinced that Steemit is just control grid, designed to fragment the /conspiracy and other communities on reddit primarily (since it's an alternative to reddit). They tried this with voat and they are trying again by monetizing it. You see that's the killer app. Trying to tempt you with money. Only problem is, it's based on bitcoin and it pays out ... what if bitcoin falls apart...as it was designed to do....all along.
submitted by 911bodysnatchers322 to conspiracy [link] [comments]

A modest proposal (radical pruning for long-term scaling)

I hesitate to post stuff like this, because I'm really not close enough to the project, may not know about past discussions of the same idea, and am not volunteering to do the significant work involved. But still, maybe the suggestion, or the reinforcement of the ideas, is valuable...

Summary

I think the unlimited growth of "permanent" data gets too little attention in blockchain currencies, including Monero.
People obviously do pay attention to scaling. In the case of Monero, the roadmap talks about using sidechains to take stuff off of the main chain. In the end, though, the main chain grows without bound. If Monero really succeeds, that chain could in fact get very, very big, regardless of optimization. Wikipedia says there are 7.4 billion people on this planet. What if each of them makes one transaction a week? One a day?
The problem seems worse for Monero than for, say, Bitcoin, because Monero can't even identify (and therefore merge or selectively prune) spent outputs.
You could, however, bound the chain size by simply throwing away everything older than some particular age; not partial pruning, but complete elimination of the blocks. Obviously you could still end up with a huge chain, but there'd be a finite limit on its size. The biggest cost would that outputs ended up with an expiration date.
If Monero is lucky, something like that may eventually be a technical necessity. For political and governance reasons, if there's any real chance it will ever have to be done, I think it should be done soon. It may not be possible to do it later.

Permanence considered harmful

The phrase "without bound" is intrinsically scary, but permanent retention has other bad effects.
  1. Raw cost and node incentives: Cryptocurrencies generally compensate miners, but not nodes. Once something is on the chain, the network has to store it for free.
    In the limit, permanent storage (and bandwidth for starting up new nodes) will always become the biggest actual cost, exceeding mining or anything else. Even if "the limit" is never reached, it's still a big cost.
    It's hard to imagine many people carrying that cost out of love, so you could get weird disruptions caused by the node operators using ad-hoc tactics to get some kind of compensation. Those could be economic disruptors or they could be privacy disruptors. On the other hand, if the network finds a way to build in node incentives, high storage costs may simply mean those incentives have to be more than anybody actually wants to pay.
  2. Centralization: The bigger the chain, the more centralization you have, and the fewer nodes you have. You may be able spread out the storage, but in the end there are only going to be N replicas of any given part of the chain.
  3. Freeloading: The only critical reason to keep old blocks forever seems to be to guarantee that an output you got however long ago will be spendable forever, without you doing anything to maintain it. But that's not necessarily a good thing.
    Blockchain permanence encourages "store of value freeloading". People who just want to hold the currency pay no fees (and generate no cover traffic), even though they create a real cost to the network at large. Holders are subsidized by the people who actually do transactions. So are people who just want to use the chain as a notary for non-currency purposes, although I don't know if that can happen in Monero the way it can in Bitcoin.
  4. Lost-money waste: If some outside event prevents money from ever being spendable, the blockchain still has to track that money. If somebody totally loses all her private keys, the chain still holds onto her outputs forever, even though they'll never be spendable. If a multisig escrow runs into an unresolvable dispute, the chain is left holding the bag.
  5. Unreliability: Something could unavoidably invalidate old data (Hello, quantum...). At that point permanence has no value, and anything that requires permanence breaks.
  6. Complexity: If you have to split or spread a large data set, you're going to have to do something relatively complicated. Even tiered storage is complicated compared to non-tiered storage. Distributed storage is worse. Spreading things out looks especially tricky for a currency where any given transaction may mix in any given set of outputs. Complexity is bad for reliability, bad for security, and bad for being able to understand your privacy guarantees.
  7. Performance: Bigger data sets are just slower; there's a cost to getting data from the next tier or from another shard or whatever. That's especially true if the data set may not have very good locality properties... and large anonymity sets don't usually like locality.
  8. Privacy: I suspect, but have no actual knowledge, that it's harder to pick a plausible set of mixins if the chain has a huge range of transaction ages.

Why do it now?

Unless the expectation of permanence is quashed early, I'm afraid various factors will lock it in. And the best way to quash that expectation is to decide early, then actually remove permanence ASAP.
Obviously there's no certainty that permanence will ever have to be removed, or that conditions will change to make that difficult. But that's the safe way to bet. Removing permanence now is relatively inexpensive.

Politics

Remember how Bitcoin sudden couldn't agree on even slightly contentious changes?
In a few years, I think changing permanence will be very hard politically. I'd expect it to be about as hard as changing the proof of work, and almost as hard as changing the emission curve. And those will be very hard changes to make if adoption keeps growing.

Don't touch my money!

Cryptocurrency seems to attract people who want money that can never go away. Many want it to be as durable as gold, and think of it mainly as an untouchable "nest egg". If you suddenly tell them it can evaporate unless they do some new thing like renewing outputs, then surely many of them will see that as a takeaway and a betrayal. They'll have that reflex even if the reasons are obvious and the actual cost and effort are tiny.
You might say that'd be silly, and I'd agree with you... but I think it'll happen nonetheless. I think it may happen even if permanence goes away now, and I'm sure it'll happen if permanence goes away later.
Wouldn't it be better to try to keep such expectations from building up? What happens to the currency if people go around claiming it's a ripoff?

Fear for the uninvolved

Perhaps a more justifiable concern: suppose somebody buys Monero next year. They assume it's permanent because nobody told them otherwise and that's how blockchains work today. They pay no attention for 10 years, and then discover their money's gone away.
Sure, that person should have paid more attention, but that doesn't mean anybody should want them to get screwed. Changing now minimizes the number of people who might be in that postion later.
And even if you, the reader, don't care about oblivious people, others will. There will be those who really want to protect them, and some of those protectors will have influence. They won't necessarily all be in the community, either; what happens if regulators tell major exchanges that they are on the hook if any unprepared person loses money because of this "unannounced change"?
Imagine the outcry if a government decided to expire cash in circulation. Actually, you don't have to imagine it; it happens from time to time. Look how much work those governments put into warning everybody, and how much heat they get if they don't. The Monero community can't warn people that way. So it pays to avoid it being a big issue.

Conspiracy theories

"Monero's been infiltrated! They want you to renew your money so the NSA can trace the transactions! Wake up, sheeple! (obXKCD)". The more relatively casual users Monero accumulates, the worse this will get. And mass adoption is all about the casual users.

Not invented here

Don't forget the political and technical issues you get with trying to do a protocol change once there are a lot of implementations. Today, Monero has one node implementation and a handful of wallets. In the future, a lot more people will have to coordinate on any change. I really like Monero's periodic hardfork system, but it doesn't solve everything.

Technical lock-in

On the technical project management side, there's also the risk of "technical debt" making it really hard to actually remove permanence. Permanence assumptions could get baked into Monero itself, or into critically important related technology. They might not even always be obvious assumptions. Undoing that could be hard.

Get ready now

There's a chance that non-permanence could be forced on the community, if not by sheer chain size, then by something like quantum computing making old signatures fundamentally meaningless. It should be fairly easy to move new transactions to a new signature scheme, but you would still lose the old ones. It would be good to be prepared in advance if that happened, and the best way to prepare for something is to make it the normal and expected thing.

Straw man

Here's a crude outline.
I'd suggest announcing something like this as The Plan immediately, and building it into the software as soon as reasonably possible.
I've written it to talk about times in years, because real time is easier for users to deal with than block counts. If the time accounting has to be done in blocks instead, that's not the end of the world.

Immediately fix wallets

Starting as soon as possible, wallets prepare for impermanence:
  1. Wallets automatically renew old outputs by sweeping those outputs back to themselves.
    By default, each output is renewed when it's about a year old. The exact timing is randomized, mostly to improve renewals' value as cover traffic. An output is eligible to be put in a renewal transaction when it reaches an age drawn from a uniform distribution between 9 and 15 months. Such renewals are batched up in some sane way. Anything older than 15 months is always renewed immediately.
    Users can change those parameters, and can manually renew their balances if they know they'll be offline for a while.
  2. A wallet will warn you if you try to make the renewal time more than about 2 years
  3. It will also warn you if you seem to be using it very infrequently.

2020 hard fork

As of about the beginning of 2020, outputs more than three years old cannot be spent, full stop. After that same time, nothing is expected to keep any chain data more than three years old.
If you haven't run your wallet for very long time, it may not have been able to renew older outputs, and may show a lower balance when you do run it. If you haven't run your wallet for three years, your balance will be zero.

"Concept" changes

There's no traceability to the genesis block. The main evidence that any given three-year collection of blocks is "the" chain is the hashpower that's gone into creating that collection, although you could of course "pin" some old blocks in the software itself.
I think this implies that there can never be proof of stake mining, but I could be wrong.
Money is conceptually only traceable to the oldest retained block, not necessarily to the one where it was mined.

Miscellaneous

Sidechains and whatnot, when implemented, are expected to "check in" and confirm their relationships with the main chain at least annually (I assume they would anyway, but this would be a hard requirement).
submitted by Hizonner to Monero [link] [comments]

This morning I sent an email to a friend "Is bitcoin paying for N. Korea's rocketry program?" then a few hours later, True Pundit released an article, "North Korea is hacking bitcoin exchanges as currency value soars, expert says" -- WTF is going on?

1055am EST
North Korea is hacking bitcoin exchanges as currency value soars, expert says
Here's my email. It's pretty unpolished. It was a shower thought
908am EST
I guess it goes to what you consider consumer confidence to be
It's possible that the market cap on BTC is expanding rapidly with adoption, that is NOT what causes the value of BTC to increase, quite the opposite in terms of supply and demand
so what makes BTC's value go up?
constant trading
now if you have AI bots behind the exchanges (running the exchanges) and those ai bots are darpa projects, then you have bascailly have the military 'coaxing people through gaslighting' into adopting, by using their vanity and avarice and urgent fear of missing out against them.
By jumping in early they get to say, 'haha you missed the boat and I made out big: suckers!'
and they get digital dollars from nowhere, kind of like infinite-QE of goldman sachs, only they are using incremental injections of QE from goldman sachs to finance the uptick on BTC's price...it's essentially a QE laundering scheme that's powered by fee-less (VIP) high speed electronic trading by AI bots, with possible inputs from DWAVE quantum computers and PRISM / Cryptologic supercompters of the nsa...after all it seems much more profitable
But why?
N Korea
As Byegone pointed out, very smartly I might add, DPRK's rocketry program advanced 40 years in 6-7 months time or so. Impossible. Impossible without outside help.
China.
CIA.
Could be both.
But they'd have to pay for 40 yrs of advancement and I can assure you that the CIAs vassal state of DPRK--that just inaugurated their first vaseline plant 3 yrs ago, and has a turnip shortage and people starving on the street (deplorables) does not have money to continually and inexplicably blast PNE's under mountains for reasons unknown (probably doing state infrastructure work TBH...freeing up minerals or blast-mining)
Well if you had to finance 40 yrs of advancement, how would you do it? You'd agree to the terms of the CIA to do everything they say for the next several decades. You will be a limited hangout. You will wage a fake war with us. You will take our computers and our hackers. you will run terror false flags and become a terror outsource company for us for the next couple of decades. You won't have to pay but you will have to do as we say or we'll take it all away. Ok, DPRK? Ok, they say
And then Bitcoin becomes a way for people to inject their dollars into a black hole that effectively gets funnelled to China, in order for china to build their rocketry program
Why do I think China? Look at the base of the rockets of the pictures they released. Same design> CHINAS DESIGN. Those are chinese rockets.
Front Running on Email
I can't help but think that someone passed on this idea, or that an unknown 3rd party is front running by reading emails and maybe mine flagged something somewhere due to the proximal keywords. They read it and were like, 'huh, we've got to manage this shit harder, the plebs are finding out'
Or this is just a huge coincidence
But name another news story that links bitcoin to DPRK in the recent past. Can't do it can you? You'd have to go quite a long ways. I know this is a temporal bias but still, it seems significant.
submitted by 911bodysnatchers322 to TruthLeaks [link] [comments]

Mass Surveillance News Collection from 2010

>>>>>>>>> Mass Surveillance
>>>>>>>>> Cognitive Infiltration and Mass Social Psychology Abuse
>>>>>>>> Smartphone Intrusion, Remote activation of Mics and Cameras
>>>>>>>>>>>>>>>>>>>>>>> Ways and Means; Technology and Law
>>>>>>> AT&T
>>>>>>>>>> Amazon, Apple, Facebook, Google, Microsoft, Twitter, Yahoo
>>>>>>>> Goals
>>>>>>>>>>> Lies, Coverups, Resource Misuse, and Danger of Tacit Complicity
>>>>>> Global Deep State Cooperation and Imitation
>>>>>>>>> Hardware, Rootkit, FIrmware Spyware
>>>>>>>> Blowback
>>>>>> Exoteric, Stated Goals of the Security State Have Failed
....CONTINUED IN COMMENTS
submitted by 911bodysnatchers322 to conspiracy [link] [comments]

The Forthcoming Crypto Trapdoor

TLDR: CIA wants you to use bitcoin, but CIA is bad and they are up to something. When you've traded your last dollars, they'll laugh and pull the plug on bitcoin. Then you will be sad.
Google is developing cryptocoin tools. Ok so the problem with that is manifold
  1. ) We know google is CIA; CIA is very untrustworthy--they've spied on us illegally since 9/11 created a security state junta; they got their start with inqtel a cia company; assange says its cia; everything they do from censoring technopopulists to promoting a fugitive from the law hillary clinton (by our FBI's own admission in congress!) over a lawfully elected president, while undermining the same....all suggest Google is still CIA.
  2. ) CIA was effectively a merger of former US intelligence and expropriated Nazi intelligence and researchers (Operation Paperclip), guided by a Nazi sympathizer whose post-WW2 work was serving as a lawyer and strategist to assist Nazi officers escape punishment and hide their wealth through various financial proxies (Allen Dulles). This is our true history. Dulles also was fired by JFK and then was charged with producing the Warren Report about JFK's assassination. MKULTRA is where we drugraped teens to blackmail politicians (brownstone ops), drugraped prostitutes and soldiers (edgewood), and performed unethical human experimentation that continues to this day. That was CIA, Navy, Darpa
  3. ) I'll say it again, a Nazi sympathizer who hid nazi gold in switzerland and ran ratlines to argentina for nazi officers, who wanted to use a false flag operation to destroy Cuba but was denied, was in charge of JFK's investigation. Kind of like having a Deepstate operative like Robert Mueller type in charge of the official 9/11 report isn't it?
  4. ) CIA is Wall Street's private army.
  5. ) NSA scans your emails, your text messages, all your information---"capture it all". They have been caught several times front-running on your private data. Any screenplay you wrote, any invention you put in a file on the google drive, and investments you're planning, any business projects you're in----they have already read and are already using in an anti-competitive way, front running on your good ideas.
  6. ) Through asset forfeitures, the US Government has a majority of Bitcoin; this is from mt gox hack recovery, silk road, silk road 2, alphabay and other darknet seizures abroad of bitcoin
  7. ) The US Government has spent 6 months colluding with the media to undermine Trump with a fake story that everyone now knows is fake (except a vanishingly few marginal, sophomoric violents, antifa types in california).
  8. ) The FBI has spent now over a year maintaining a falsified document leveraged to create a disinfo to create a psychological war against US citizens, in lieu of doing their ACTUAL job of busting a now-widely known SPY RING IN CONGRESS
  9. ) The US Government (Permanent State) has been bitching, moaning, whining about every little thing Trump has done; failing to recognize his accomplishments which are objectively pro-citizen; while letting very high level criminal avoid punishment---creating a dual justice system
  10. ) Cryptocoin has skyrocketted based well beyond confidence if you look historically at DOW industrial trends...this is a bubble, an obvious bubble. Who is blowing this bubble? Well look who has the majority share
  11. ) You don't know who runs the exchanges, but the modus operandi of those who run the exchanges are that of both criminals and intelligence agencies. I suggest it's both of them working together to run the exchanges
  12. ) After all, you can't mine bitcoin now, if you do you'll lose money because electricity to mine costs more than what you'll get from mining unless you already own vast mining infrastructure--this is the marginal cost of mining. The marginal cost of mining far exceeds purchase price of bitcoin so you might as well buy it
  13. ) Who has spare bitcoin to sell, if mining is so unprofitable AND bitcoin keeps going up? Who would sell bitcoin if it's that compelling? LOL THINK! G D it. THINK!!!! Use your brain. Someone is dumping bitcoin on you, and you're eating it up, thinking you're a genius for investing in it so early.... it's a trap...it's a honeypot. Owning a bitcoin is not a illuminati scout member badge into an exclusive club you dolts
Given that the US Security-Industrial complex, the 17 agencies, primarily CIA, NSA, FBI, NGA, DoD have been using that unaccounted-for 20T dollars now to spy on--not only us, the lumpen citizens of US, but also our Congress members--through the Pakistani liaison loophole of the Awan Brothers, it's very clear that they have NOT honored the underlying principles and values of our constitution and our culture generally. They are concerned with making money by any and all possible means---even through absolute evil--and they are concerned with controlling society very rigidly through technology, psychology, exploitation of human fears, wants and aspirations.
One way to control people is through money. When society gets out of control, especially when they start to doubt, or to hate, the control imposed upon them, the government goes absolutely insane
Because we've already proven in an earlier post that the US Government is the batshit paranoid conspiracy theorist that has ever existed, and it uses any and all desperate measures to control people's minds. That is it's true purpose and operating principle above all else. Money is just a means to that end. The mental health industry is a means to that end. The music and film industries are a means to that end. Academia is a means to that end. Modern art is a means to that end. I could go on and on how the CIA has inserted itself into all aspects of culture to create an enormous establishmentarian cult, but that's not the point of this post--though mentioning this is germane to this post to the extent that it's necessary to understand in the context of the CRYPTOCOIN TRAPDOOR>>>
So what is this cryptocoin trapdoor?
Hmm. Let me try to explain this in terms of a ruse that happened to me last year. I was invited to join a sub /sphinxclub which was ostensibly an 'antimason' sub. I had been down on freemasons / jesuits (still am) at least high level ones. I see them as the common denominator in many of these strategies-of-tension around the world, and the evidence for that is overwhelming. So I joined sphinxclub and after little activity we asked the sub's creator "so what is this sub about, what are we doing here, who wants to start the dialogue". The answer was something like "we're waiting for 20 mods to be invited so we can open the trapdoor and send everyone into hell". I thought it was a joke, and then there was an 'assignment' which I believed (in my opinion) was asking people to commit an act of left-wing terrorism against a defense contractor in florida who was believed to be using electromagnetic waves as harassment and mind control to create 'mass murder shooters' like the Navy Yard shooting. Of course I'm interested in figuring out if there's truth to this, but the means was illegal, so I left.
This strategy is both a honeypot and a trapdoor. Honeypot to bring you in and waste your time (timeloop you, waste your effort otherwise spent on writing subversive essays that undermine the establihment). Trapdoor to get you put in jail.
I believe crypto is the same type of honeypot-trapdoor
Honeypot because
  1. ) Honeypot because it's going up very quickly and now bitcoin is worth more than gold
  2. ) John McAffee a renowned technologist and drug-addled madman with spooky origins says he'll eat his penis if bitcoin isn't worth more than what a million by 2020? Something like that. He allegedly has his own mining facility in latin america, iirc.
  3. ) Honeypot because Google is now going to support it
  4. ) Honeypot because US Gov is looking the other way and China supported it
Tradoor because
  1. ) China banning it
  2. ) Finanical experts warning it's a fraud
  3. ) Me warning it's a fraud because the NSA has over 2000 Qbit quantum computers now and likely runs the exchanges
  4. ) Ebay is using it -- George Webb's research tied Omidyar directly to Deepstate
  5. ) CIA is Wall Street's private army and cannot have a situation they dont' control.
  6. ) Max Keiser and Stacey Hubert have said, numerous times, with many financial guests that NSA/CIA are manipulating markets while using the media to have you believe it's anarchic...it's an illusion
  7. ) JP Morgan is trying to manipulate crypto in europe now
  8. ) If you exchange your dollars for bitcoin, and then bitcoin plummets, then the elite have just taken your last bit of wealth away
  9. ) At this point the only people who can make money off bitcoin ARE the elite, so buying crypto is a cannabalization of dollar-owners by the political elite on the industrial/retail elite -- intelligence-aligned (dynastic) rich are eating the nouveau rich; and they are eating left-coast crypto liberals also
  10. ) EDIT: Oops forgot about civil asset forfeiture of unpaid capital gains taxes on crypto being like a stock
What is your agenda with this anti-bitcoin stuff?
I have none. These are just my thoughts I'm sharing with you and why I no longer support bitcoin until such time there are laws that guarantee that these things I worry about are inhibited. In other words, we need a non-corrupt intelligence community and guarantee they aren't manipulating it before I can trust using any kind of crypto currency. I'm telling you because I want you to make sound choices with your money and be happy and have a good safe life.
The best thing you can do right now is watch this video
What can you do?
Buy gold, silver, platinum. Or a tractor. Or bullet making equipment. Because guns are worthless without bullets.
Sources
submitted by 911bodysnatchers322 to TruthLeaks [link] [comments]

Cryptography in 2016 — Overview of how fast things are changing…

Encryption using unthinkable numbers due to their length in digits is the most important aspect of our digital security in the early 21st century. It is so difficult because finding the greatest common denominator to determine if a number is prime, requires looping through every digit until a particular number you are checking to ensure it is only divisible by two and itself. It is a very time consuming process. our every day processors used in literally almost all of humanity technology. Processors are wonderful because they perform so many different tasks, although it is usually necessary to develop a proprietary method for complex applications. Breaking encryption is considered one of the most complex applications due to the amount of operations required to find the digits may take years.
Human science projects have performed highly complicated, or resource intense applications such as crowd sourcing computers to scour for aliens. General population has lot of interest due to the nature of how it relates to their religion, and our historic records. Cracking an encryption key is not important for a random user browsing the internet because it doesn’t relate to them at all. The incentive to donate their computing power ceases to play a role. Specialized data centers have to be utilized with the most sophisticated algorithms, and resources which only because of sheer numbers may succeed.
RSA encryption is the most widely used because it is actively happening almost as consistent as we breathe within a web browser. It depends on the web servers having a set of two large prime numbers that they had generated in secrecy so that another party cannot easily match the pair. It performs arithmetic operations using these prime numbers such as multiplication, and division. It requires the specific two prime numbers to be exact to obtain the original data before it was encrypted. The prime numbers could have hundreds of digits within them which is incomprehensible for a human to perform arithmetic operations with. Computers have methods for easily generating these primes however it requires two different primes to reverse the mathematic operations to obtain the original information.
RSA code breaking would require a function to find every prime number. Primes that are found would have to be used with other primes using the same search method, and then attempting to use those primes with the operations on the particular data. It would still depend on whether or not you know what the data looks like to determine if the prime numbers were the particular key pair used. The hurdles are absolutely realistic and is the main concept behind the trust left with these cryptographic methods.
Primes are generated using an initial seed which puts them anywhere between several digits to hundreds of digits within the number itself. It is such a large address space that the computer would exhaust its memory attempting to keep a list to attempt to perform the operations after each unlisted prime is found. You may imagine in the context of web browsers themselves requiring a gigabyte of RAM at times for particularly graphical, or video intense features of sites. It would be exponentially larger, and would grow at a rate while also increasing the time it takes to attempt the verification as each new prime is found. The software has to attempt to pair every prime found with all new primes which means the longer the list becomes the longer it will take. It becomes infeasible quite quickly.
The current technology in the year 2016 has amazing circumstances such as cloud, extremely fast bandwidth, Moor’s law almost maxed out, and the ability for any small business to have the crunching power of the most important companies on the planet. It becomes possible to reconsider the original methods for attempting to crack these keys in a way that expands the speed, and memory limitations of prior attacks. All sorts of crafty projects exist to coordinate, plan, and optimize results consisting of billions of separate operations. These processes ultimately answers the most critical, or basic problems in our society. Siri performs countless multiplication, and comparison operations just to begin to recognize your speech as particular areas of interest. These calculations are being used on every syllable, or word that you speak which exponentially increases the complexity. It was inevitably successful, and is being used by mass consumers for any categories that Apple believes we may request as buyers of their products.
Cyber war programs worldwide have drastically increased in funding within the past decade. NSA revelations amongst other Chinese, and Russian hacks are causing security to become the cornerstone of any corporations natural due diligence. The budgets of small countries for these areas will exceed tens of thousands of salaries for individuals working within the fields. Resources are being poured into it like never before, and the criminal activity has surpassed the drug trade recently. It would be neglectful to imagine that people wouldn’t revisit the cryptography side of security to attempt to increase probability of success.
I’ve spent a lot of time researching, and considering the abilities of our current technology and the relationships with security infrastructure in place today. I am not pouring money, or man hours into these concepts but believe that they need to be considered a legitimate concern. Quantum computing allows mathematical functions to attempt calculations at such a higher rate that it will be feasible to break our current encryption technology within a short few years. Everything that you communicate across the internet today may be read sooner than anyone would want to believe. Data centers, and internet providers can create long term dumps of encrypted traffic with intention of decrypting it in the future.
It requires a new set of methods which will raise bar and ensure security for the foreseeable future. It is important to do this as quickly as possible because the internet is a backwards compatible network. Most of the protocols were developed in the 1970s region of our history. Large portions of information being thrown onto the internet is going to stay as it is using the same software for many years. It is impossible to fix some problems with particular sets of core protocols regardless of how dangerous they may be abused. The longer that we believe our current encryption technology is secure directly affects the amount of abuse, fraud, manipulation, and other activities will take place in the near future. It would render things such as insider trading to become as normal as Russia having it legalized.
Bitcoin is a cutting edge economic experiment with more than 10 billion of assets that solely relies on encryption algorithms which contain these same limitations. Anyone could shift funds anywhere within the Bitcoin network with even small vulnerabilities found within their methods. Secure socket layer which web browsers use to protect banking transactions amongst many other datasets has the same reliability on encryption being secure. Bitcoin is extremely interesting because of the vast number of accounts which are publicly available to anyone who downloads the software.
Cryptography is infeasible to waste those expensive resources to undermine a single encryption key. However, if you were to attempt to break every Bitcoin address with funds in it simultaneously then your chances of success are increased by the exact amount of those addresses. It relies on some very low level technical knowledge, and circumstances as well but I’m just attempting to deliver a state of mind to you. SSL projects exist today which contain all known websites certificates so that they can verify other variables within them. The same concept of increasing that probability exist there as well.
It is also feasible to attack the session keys themselves. Proceeding from this direction would allow you to record all communications between various hosts which would amount to thousands rapidly, and then attempt to brute force the keys for them all at once. It would be increase the probability of success although its tough to determine beforehand whether the particular encrypted communication is of any value. The session keys themselves are far less difficult to crack being other algorithms. It is the concept that since the keys change so often that it is not the correct approach. SSH encrypted management connections for web servers, and various other technologies are also of major concern. It is more likely to have sensitive data, and could easily be retrieved from major internet providers without causing delay in the traffic due to the majority being console based access.
The realistic nature depends on your goals regarding various encrypted information. The best possibility would be to obtain as much information as possible. It would ensure that the resources, and budget would make sense. If you do not have a backdoor, then you should have almost billions of attempts to decrypt communications for every prime match that is found.
Wouldn’t you like to know that there isn’t only a single needle in that haystack your attempting to scour? I’d like to address some concepts for distributing, and attacking each individual cryptographic use case but it really would require decent engineering and testing. The fact remains that things are not as they were even five years ago. It is only a matter of time that the average hackers in basements begin to obtain access to encrypted data on a mass scale to allow them to have millions, or billions of needles in their cracking environments.
Please discuss questions, or comments. I am willing to work with anyone who is interested in attacking the top 5 major protocols. I do have some extra CPU resources, and possibly enough RAM to attack them with a well optimized system. I have the majority of the distribution specification handled but I would need help developing all of the modular systems for verification against each algorithm. I do not have time to deal with the entire project. The data is not something I am shopping around for either.
submitted by mikeguidry to Information_Security [link] [comments]

NSA Believe that Current Cryptography Algorithms Are Broken by New Quantum Computers? Bitcoin vs Quantencomputer / Wie sicher sind Kryptowährungen? Bitcoin and the NSA, Mark of the Beast Technology Revisiting BitCoin's Dysfunctional Nature Bitcoin and Quantum Computing  Are Quantum Computers a Threat to Bitcoin ?

Once China manages to build a working 256-bit quantum computer, it can effectively steal all the Bitcoins in the world (plus steal most national secrets and commit other global mayhem at will). Ten steps to crypto-tyranny: The “big plan” by the globalists (and how it involves Bitcoin) In summary, here’s one possible plan by the globalists to seize total control over the world’s money ... Quantum computing might be closer than we thought, thanks to a series of newly developed scientific methods. Furthermore, a new implementation of Shor’s algorithm increases the urgency of getting Bitcoin ready for the advent of quantum computing. Also read: NIST Starts Developing Quantum-Resistant Cryptography StandardsSponsored Links Quantum Computing Breakthroughs Todd Holmdahl At present ... r/Bitcoin: A community dedicated to Bitcoin, the currency of the Internet. Bitcoin is a distributed, worldwide, decentralized digital money … Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcuts. r/Bitcoin. log in sign up. User account menu. 0. NSA is building a Quantum Computer that can break all forms of encryption, is Bitcoin doomed? Close. 0 ... Bitcoin and Quantum Computing. Craig Wright (Bitcoin SV is Bitcoin.) Follow. Jan 23, 2019 · 4 min read. Even if a quantum computer existed — they do not — Bitcoin would be fine. Quantum ... Bitcoin is quantum resistant. Economically, it thus merely becomes viable to attack well-known and reused Bitcoin addresses that have exposed public keys and which hold large amounts of value for periods longer than 30 days. Even at the face value, we can demonstrate that it is not of concern. A large organisation that has a fixed address for receiving payments and ones that are derived from ...

[index] [18402] [25050] [21063] [11137] [23956] [2447] [34591] [44948] [7928] [41582]

NSA Believe that Current Cryptography Algorithms Are Broken by New Quantum Computers?

This video is unavailable. Watch Queue Queue. Watch Queue Queue The NSA released code, whether purposefully or not I cannot tell, to the Internet to use to hack other computers, requiring Bitcoin payments by the hackers to restore the computers. Wannacry was ... Bitcoin schon 245x gestorben 🚀 Staaten wollen eigene Kryptowährung 🚀 News 30.01 BTC, Ripple, Tron... - Duration: 15:42. Investment Academy Bitcoin, Aktien und ETFs 10,661 views An NSA Quantum-Resistant Cryptocurrency, and Pomp Doesn’t Own BTC??? The Crypto Ginger. Loading... Unsubscribe from The Crypto Ginger? Cancel Unsubscribe. Working... Subscribe Subscribed ... Quantum computing is a new way to build computers that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers.

#