This article is machine translated
Show original
[Jason Lowery(@JasonPLowery)'s SOFTWAR]
'A new theory on power projection and the national strategic importance of BTC'
Chapter 5. Tactics of Power Projection in Cyberspace twitter.com/atomicbtc/status/1...

Among the largest abstract power hierarchies in the world, there is one encoded in software. It is Apple, Google, Facebook, Amazon, X, etc. They are operated as abstract power hierarchies with centralized control. In the 21st century, whoever controls the software wields abstract power.

So how do we protect our property rights, our press rights, our voice rights from the growing threat of digital oppression? Is it reasonable to simply trust them? The solution lies in Bitcoin. Bitcoin is attractive not only as a monetary system but also as cybersecurity. twitter.com/atomicbtc/status/1...
A new belief system
Computers converted the symbols or patterns we perceive into 'bits' of discrete binary information, just as we convert them into words.
Programmers designed them to operate as if they were real, using abstractions, in the same way that people think.

People were fascinated by the fact that they were simply looking at light-emitting diodes and circuit boards attached to a glass surface, but they thought it was real. Computers can be considered symbol-generating abstract reality machines. Software is just a belief system, and that belief system is vulnerable to exploitation and abuse.

Software Security Issues
Cybercrime is the third largest economy after the US and China.
According to Cybersecurity Ventures, cybercrime is expected to reach $10.5 trillion by 2025.
President Biden has passed an executive order to address this.
The reason software security is difficult is because software is flexible, but its expansion in online spaces is unlimited.
In particular, even a small change can cause an unexpected fatal error, and the damage can be infinitely large.
youtu.be/e56hY9Es7MQ?si=_1GOtY...
“Don’t try to bend the spoon. It’s impossible. Instead, try to realize the truth. There is no spoon.” - Boymonk, The Matrix -
Also, the way software engineers create abstractions for the intended function, each subjectively interpreting the language (annotations, etc.)

I think this is one of the main reasons why Bitcoin is misunderstood by the public. People are constantly arguing about the nature of Bitcoin in arbitrary and meaningless categories like ‘cryptocurrency’ and ‘blockchain’, but they are forgetting that the term ‘Bitcoin’ itself is technically based. twitter.com/atomicbtc/status/1...
Creating an abstract power hierarchy using software
In a trust-based system, only a select few people are given access/control to avoid exploiting the software. This results in a ruling class and a ruled class. It is also necessary to trust that the ruling class will not abuse its control.

However, Bitcoin has no ruling class, no one can abuse control authority alone, and the abstract power hierarchy is maintained equally. Just as agricultural societies formed agricultural empires, cyberspace also seems to have formed cyber empires from the threat of oppressive new kings. twitter.com/atomicbtc/status/1...
Physical Resistance to the New Monarchs of the Digital Age
The next inevitable step seems to be cyber warfare.
As computers have evolved to the size of pockets and become more dependent on them, it seems that the war will be fought over unauthorized and controlled digital resources in this cyber empire. twitter.com/atomicbtc/status/1...
As new ruling classes and abstract powers of empires emerge, they will likely tire of being systematically exploited on an unprecedented scale and will invent and deploy new forms of electronic cyberwarfare. Their cyberwar protocols will use the same technologies as physical security to maintain security. (Example: Figure)

Projection of power through cyberspace in cyberspace
To constrain software, direct physical restrictions are more advantageous.
However, physical restrictions seem like very inefficient programs (e.g. secure USB). Therefore, something that is implemented in-house is needed, and imposing physical costs is the solution.
To impose a physical cost, you can charge a control signal in watts, and that's proof-of-work. Proof-of-work increases the physical cost of abusing the control signal. As the physical cost of spamming and attacking increases, CA increases and BCRA decreases. (Prosperity margin increases.) twitter.com/atomicbtc/status/1...
A New Computer Theory About Bitcoin
“Satoshi opened a portal from the physical realm to the digital realm, and energy began to flow into cyberspace, bringing it to life.”
-Michael Saylor-
youtu.be/ARkcQqDWg0E?si=HJWeWN...
Planetary computers will dramatically improve the global power grid, reducing waste and increasing energy efficiency.
These physically distributed, thermodynamic planetary computers will leverage the global power infrastructure to convert information into bits.
Proof-of-work will be linked into a single system. twitter.com/atomicbtc/status/1...
These systems can be used to impose significant physical costs on others by requiring them to operate or pass through them.
For now, these ideas are little more than a theory exploring the benefits of proof-of-work, but with further investigation, their strategic value for Bitcoin cannot be underestimated. twitter.com/atomicbtc/status/1...
There is no second best
Many software engineers claim that Bitcoin can be replicated as a metaphor for a more energy-efficient ‘cryptocurrency’, but this claim is based on a lack of understanding of power projection and thermodynamics.
youtu.be/08gf9akDJgQ?si=A6bFnE...
The ‘stake’ in Proof of Stake does not physically exist and CA is effectively 0. The more it is adopted, the higher the attack cost-benefit increases infinitely. Also, so-called ‘slashing’ is not preventable and can be exploited by those in power because top stakers have the incentive and means to slash users. twitter.com/atomicbtc/status/1...

To emphasize how different Bitcoin is, we call it Bitpower instead of Bitcoin.
Bitpower is the amount of electricity that can be transferred through cyberspace, converted into bits of information.
If we describe this power output and recognize it as a transfer of actual power, Bitcoin is clearly the dominant protocol. twitter.com/atomicbtc/status/1...

Softwar
When we look a little further, one thing to note about Satoshi Nakamoto's design is that while the supply of bitpower is limited, paradoxically, the amount of the same bitpower (electricity) is infinite.
That is Gabriel's horn, wielded by the angel Gabriel.
The internal volume of the soul is fixed, but the surface area of the soul is infinite, aka Gabriel's Horn Paradox.
21 million bitcoins are fixed (volume), but an unlimited number of people can input infinitely more power (surface area).
And anyone who accesses Bitpower has infinite projected power.

Mutually Assured Preservation
El Salvador's actions show that countries are beginning to see Bitcoin as a security candidate.
If Bitcoin is adopted by other countries, it can be systematically verified as a secure computer network. (No country has been able to hack Bitcoin to date.) twitter.com/nayibbukele/status...
The Bitcoin protocol transforms the adversarial physical power competition into a mutually beneficial security enhancement. The adversaries become de facto partners working on the same planetary computer, even though they do not trust each other. The end state of the electronic cyberpower projection competition is not assured destruction, but mutually assured preservation. twitter.com/atomicbtc/status/1...

Chapter 6. National Strategy and Bitcoin twitter.com/atomicbtc/status/1...
Sector:
From Twitter
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments
Share
Relevant content





