Anonymous ID: 178871 March 16, 2018, 6:01 p.m. No.690895   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1156

>>690850

The current cryptocurrencies promise all sorts of security and fidelity and the proponents of those systems don't appear to be aware of just how compromised ALL of the hardware and software is. Without solving that, you don't even have a place to start. For this reason, I totally ignore cryptocurrencies.

 

Implementing a robust distributed system isn't all that hard. Then how is it that there are no whitepapers coming out of academia about it? All of the experts (and I have researched this) believe it is impossible. Uh....cabal much? They're simply destroying anyone's career that touches on that subject and funding the hell out of anyone who publishes anything saying it is a "holy grail".

 

They do the same thing with fusion reactors (which exist) and electromagnetic propulsion systems (which exist.) They change the education of these disciplines in order to obfuscate the understanding such that those educated to be experts will miss the details necessary to do this.

 

Tesla's work is a great example of this. They say Wardencliffe was about transmitting wireless energy. What was it really about? I know, but I'm not going to slide the board (or get gagged with an NSL.) These techniques of misinformation are incredibly powerful and have been in place for well over 100 years.

 

Back to the direct point - yes, if you incentivize participation, you solve the entire 'business' of the network. Have the price paid for resources fluctuate based on need. If there's more need, it is more profitable to provide those resources. If you use a lot, hey, just pay for it and everyone wins. No business necessary - no bills - no access charges, etc.

 

Regarding "badge" - badges, tokens, shiny 'rewards' that online systems like games give the player when they accomplish some goal. They're stupid. Let's teach people that those things are worthless and other things are valuable. Like, for example, LEARNING SHIT AND BEING PRODUCTIVE.

Anonymous ID: 178871 March 16, 2018, 6:26 p.m. No.691189   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1200 >>1283 >>1316

>>691156

>The Spectre and Meltdown problems will get worked out and are due to be solved S2 2018.

I'm not trusting ANY CPUs. I'm building my own computers that are secure regardless of any hardware exploits. I think that's the future of machines because it doesn't cost much more. You need 2 CPUs and a good software implementation - that's it.

 

>There are LOTS of white papersโ€ฆ

This is new then. Fortunately, I've known how to do it for a very long time. It sickens me that any pressure was put against it in the first place.

 

Feel free to call BS without proof on Wardencliffe. It won't change my behavior.

Anonymous ID: 178871 March 16, 2018, 6:28 p.m. No.691225   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1336

>>691200

You could use any [insecure] OS [like linux] on the internal CPU but should should wrote your own system top-to-bottom on the outside CPU. Put the internal CPU in a Faraday cage and only communicate with the outside CPU serially, with a direct hardware [not smart] interface. This eliminates all hardware/peripheral attack vectors.

 

If you think any OS you can get from the internet is secure, you are SORELY mistaken.

Anonymous ID: 178871 March 16, 2018, 6:36 p.m. No.691297   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1348

>>691283

The CPU is very likely compromised unless you hardware firewall it through a serial interface and Faraday cage. Have a nice day.

 

You have to remember, the cabal owns all of the CPU producers. Do the math. They want into your machines. The internet of things is their way to get you to make huge botnets for them for free.

Anonymous ID: 178871 March 16, 2018, 6:44 p.m. No.691369   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1382 >>1467

>>691336

It is even worse if you consider that these CPUs have been proven to have extra cores in them. Even without extra cores, it is relatively trivial to insert hardware exploits in a CPU and the ONLY way to find it would be to laser shave the CPU, map it with an electron microscope and reverse engineer it. Then see if there's anything there that doesn't match the specifications.

 

Given what I've seen, ALL of the CPUs have been comped for a very long time. Any peripherals with DMA access to RAM (at any time, like USB) are also comped with sophistcated attacks. We're just not aware of all of the exploits so it seems rational to say there aren't exploits. Bollocks.

 

Yeah. Consumers will do that. /NOT