When are we going to have a protocol that requires you to send sats in order to post, like, share?
π«
marsquaking@verified-nostr.com
npub12xgp...y0f8
#SOFTWAR
#Bitcoin #Nostr #Nostrasia #plebchain
The Bitcoin network reached an ATH today peaking at a hashrate of 424 EH/s
If this is news to you consider #zapping me. Have a wonderful evening.

#grownostr #plebchain #nostriches #zap #Bitcoin
That concludes my string of notes summarizing some of the key points made in SOFTWAR: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin
I encourage you to go back over my notes from the past two days if you interested in this and if you found anything interesting, helpful, or otherwise valuable from these summarys I encourage you get a copy of the thesis yourself as it goes into much more detail.
Thank you for reading, if you can spare some sats I am forever appreciative of your support.
lnbc10u1pjrkv99pp50gxldv6f5l860y4hzjda3pe9l792rcuajrguca0veu0ssg3ufp0shp5c4t42gmhk4xzdsv4y58x2es8ueje3k8wxk6phq3tglj2nc9c5ruscqzpgxqzfvsp5qv4hmleg9st30706anac99han05vt63ts4gt7tky99vu9ncxqahq9qyyssq6t35chkl9llwmhzv874q88sv9gk0zex0wsrk8xe5vajy3yywpz9xycd5pfaf4xa5exv43dhykkf6zsudkhn0a9d79y4nna9hd7wz4xsqkmsy0d
#grownostr #plebchain #nostriches #zap #Bitcoin
The most compelling feature of the Bitcoin protocol, according to the author, is its potential to create an infinitely prosperous organism. By competing against each other for permissionless access to the Bitcoin network, adversaries inadvertently serve each other by increasing the physical cost required to attack the network. Their competing power projection capacity is summed together to increase the overall cost of attack (Ca) of the network, consequently decreasing the benefit-to-cost ratio of attack (BCRa) perpetually.
As users scale their hash rates indefinitely, the network's Ca increases without bounds, and BCRa decreases without limits, providing all users with an infinitely expandable prosperity margin. As long as no single user can gain and maintain majority hash, everyone using this computer network benefits from the battle over control authority over it.
As if by magic, the Bitcoin protocol turns adversarial physical power competition into a single, cohesive, infinitely prosperous organism pursuing the same mutually beneficial goal of improving security and preserving freedom of information exchange across cyberspace. Enemies become frenemies, and adversarial nations become de facto collaborators working together on the same planetary-scale computer, despite their lack of trust in one another. Unlike the dynamics of kinetic power projection competitions, the end state of this global-scale electro-cyber power projection competition is not mutually assured destruction but mutually assured preservation.
-----------------------------------------------------------------------
My personal thoughts on this theory of power projection is that this is a description of an evolutionary and thermodynamically sound vision of the closest thing to a utopian society possible in a world full of predators and entropy.
#grownostr #plebchain #nostriches #zap #Bitcoin
Bitcoin aligns with the evolutionary path of human power projection technologies developed across the past 10,000 years of agrarian warfare. However, it stands out as the only globally-adoptable physical power projection technology that is practically useful for nations to settle major policy disputes, establish zero-trust control over valuable resources, achieve global consensus on the legitimate state of ownership and chain of custody of property, and preserve freedom of action and exchange of goods across cyberspaceβall beyond the limit of the kinetic ceiling.
Considering that running a hash force can be profitable due to the high monetary value assigned to the underlying bits of information exchanged across these networks, proof-of-power protocols like Bitcoin paradoxically have the potential to represent the most powerful and efficient physical power projection technologies ever discovered by agrarian society. This transformative potential of Bitcoin extends beyond its financial implications and into the realm of global power dynamics and consensus-building.
#grownostr #plebchain #nostriches #zap #Bitcoin
If it is true that Nakamoto discovered a way for global society to achieve zero-trust, egalitarian, and permissionless control over information passed across the internet, it would be a groundbreaking development. This would mean that Nakamoto found a way to establish control authority over digital-age society's most precious resources without requiring kinetic warfare.
The core concepts of Power Projection Theory assert that humans already know how to establish decentralized control authority over resources without relying on trusted third parties. Society leverages physical power through warfighting to achieve this. What makes Bitcoin special is its ability to achieve a similar end state electronically through cyberspace, rather than kinetically through sea, land, air, or space.
If Nakamoto indeed solved the problem attributed to him, it could imply that he also addressed a larger issue that has plagued society for thousands of years: establishing control authority over precious resources and achieving global consensus on ownership and chain of custody without requiring god-kings, bloodshed, or the threat of fratricide or mutually assured destruction.
#grownostr #plebchain #nostriches #zap #Bitcoin
This Power Projection Theory is a bold theory, but it's a grounded theory. It blends military theory, political theory, and computer theory together using first principles and systems thinking. If Power Projection Theory proves to be valid, then Bitcoin represents the emergence of a new internet tech stack which disrupts our perception of cyberspace from the bottom up. It's also a non-lethal form of freedom fighting that could empower people to physically resist tyranny and oppression in, from, and through cyberspace.
By simply calling it a coin, this freedom fighting technology has blossomed and grown under the noses of those who made the classical mistake of expecting the next revolution to look like the last revolution.
#grownostr #plebchain #nostriches #zap #Bitcoin
Agrarian society is recognizing its capacity to project power through cyberspace using physical cost function protocols like Bitcoin. These protocols represent more than just monetary technology; they are a form of physical power projection technology. The potential impact of this technology is far-reaching, affecting businesses, governments, and individuals.
Bitcoin from this perspective is seen as an electro-cyber freedom fighting technology, or a bitpower protocol, which adds a new state mechanism to the internet tech stack, physically constraining the worldwide web of computers. The first widely-adopted use case is peer-to-peer financial payments, but more applications are expected to emerge.
Framing Bitcoin as a payment system has led society to subsidize the development of a global-scale, electro-digital defense industrial complex, granting zero-trust, egalitarian, and permissionless access to bitpower. This new internet architecture empowers people to impose physical costs on others and programs through cyberspace, securing themselves against hackers and systemic exploitation from a technocratic ruling class, without resorting to violence.
#grownostr #plebchain #nostriches #zap #Bitcoin
Proof-of-power protocols serve as proof-of-real, grounding virtual reality (cyberspace) to the physical reality (three-dimensional space). These protocols are essential as humans use physical power signals, like poking or pinching, to verify realness in the physical world. Power signals, consisting of time, space, matter, and energy, are the core components of objective reality.
In cyberspace, humans lack the ability to generate a proof-of-power signal independently, making it difficult to verify realness. As the virtual domain expands rapidly, cyberspace becomes increasingly marginalized. Consequently, the online environment turns into an imaginary dream state, with nothing observable being genuinely unique or special. By incorporating proof-of-power protocols, we can bridge the gap between the digital and physical realms, allowing users to have a more real and consequential experience in cyberspace.
#grownostr #plebchain #nostriches #zap #Bitcoin
Proof-of-power protocols like Bitcoin create a unique connection between the physical world and cyberspace, transforming the planet into a global, trans-national computer. By linking the energy producers to the digital realm, agrarian society becomes an integral part of the internet's infrastructure. This connection allows for the exchange of physically constrained and thermodynamically restricted information, which can be used to generate complex emergent behaviors such as scarcity, decentralization, and zero-trust control.
Bitcoin serves as both an operating system for a planetary-scale computer and an API between individual computers and the power grid. This new, physically constrained state space within cyberspace has never been seen before, leaving people confounded. By turning the planet into a programmable computer connected to the internet, Bitcoin enables the import of real-world properties into the digital realm, creating materially consequential effects through cyberspace. This breakthrough has opened a portal between the physical and digital realms, merging properties from both in a way previously thought impossible.
#grownostr #plebchain #nostriches #zap #Bitcoin
By creating a planetary-scale computer that utilizes global energy resources as its state-changing mechanism and the global electric power grid as its circuitry, society could potentially unlock the benefits of Moore's law for our energy infrastructure. Engineers would naturally seek to improve the speed and efficiency of this computer's circuitry, leading to a search for cheaper, more abundant sources of energy, and more optimized infrastructure designs. This would create a beneficial feedback loop in which the adoption of a deliberately large, heavy, slow, and energy-intensive planetary-scale state mechanism would motivate society to continuously improve it by creating faster, more efficient, and more optimized electric power infrastructure.
In other words, the complex emergent benefit of turning the global electric power grid into the circuit board of a planetary-scale computer would be to unlock Moore's law for the global electric power grid. By simply turning the power grid into a computer chip, society would be able to utilize its insatiable drive for faster and more efficient computer chips to create faster, more responsive, and more efficient power grids.
Physical cost function protocols like Bitcoin differ from regular computer programs in that they not only create transistor state changes inside ordinary computers, but also produce materially-consequential state changes in the surrounding physical environment outside of our computers. This additional physical effect allows software to utilize the environment outside of our computers as a computer in and of itself.
The development and implementation of a planetary-scale computer, with Bitcoin as a potential operating system and infrastructure, could lead to dramatic improvements in society's global electric power grid. By leveraging the environment outside of our computers, software could take advantage of the abundant resources and infrastructure already in place, spurring innovation and optimization in energy infrastructure and potentially transforming the way we manage and distribute energy resources globally.
Bitcoin could be the key enabling technology that allows humanity to reach type 1 civilization.
#grownostr #plebchain #nostriches #zap #Bitcoin
The core hypothesis is that Bitcoin is emerging as the base-layer operating system and infrastructure of a planetary-scale computer, and consequently, a new form of physically-constrained and thermodynamically-restricted state space that can be added to the internet. If this theory is valid, then global adoption of Bitcoin simultaneously represents the global adoption of a planetary-scale computer, which speculative philosophers like the Berggruen Institute's Antikythera program theorize would have drastic geopolitical implications.
It turns out that the natural environment outside of our computers is filled with circuitry and physical state-changing phenomena that could be utilized for large, heavy, slow, expensive, and energy-intensive computing applications. Our surrounding environment is filled with state-changing phenomena that can encode, transfer, receive, and store machine-readable bits of information. It is, therefore, theoretically possible to utilize the surrounding environment and supporting infrastructure outside of our world-wide web of computers as a singular and superfluously cumbersome planetary-scale computer in and of itself. Theoretically, all we have to do to accomplish this is figure out how to (1) control its physical state and (2) apply Boolean logic to it, which is precisely what Bitcoin already appears to do.
Not only would it be possible to utilize the planet itself as a large, heavy, slow, and energy-intensive computer, but the infrastructure and circuitry required to accomplish this has already been built - we call it the global electronic power grid. Herein lies a simple but profound idea: to create the world's largest, heaviest, most energy-intensive, and most physically-difficult-to-operate computer ever built, we could simply utilize our planet's energy resources as the controllable physical-state-changing mechanism of a planetary-scale computer, where the globally-distributed electronic power grid serves as its circuit board.
#grownostr #plebchain #nostriches #zap #Bitcoin
The two key points established are crucial for understanding the computer theory behind protocols like Bitcoin. The first key point is that people, with their exceptional ability for abstract thinking, can apply Boolean logic of machine code to practically any physical state-changing phenomena, turning it into a programmable computer. The second key point is that, for decades, computer engineers have been operating under an unchallenged assumption that smaller, lighter, cheaper, faster, and more computationally and energy-efficient computers are always better for computing applications. There has not been significant research exploring the idea that there could be major complex emergent benefits to society if they were to design and build a massive-scale, heavy, slow, expensive, and energy-intensive computer network.
Bitcoin and other proof-of-work protocols challenge this assumption by leveraging the planet's global power infrastructure as a physically decentralized, thermodynamically restricted computer. The Bitcoin network, for example, utilizes a massive amount of energy and computational resources to maintain its security and functionality. This design choice intentionally departs from the traditional quest for faster, cheaper, and smaller computers.
By creating a large, heavy, slow, expensive, and energy-intensive computer network, Bitcoin's underlying technology may provide significant complex emergent benefits. The proof-of-work mechanism imposes real-world physical costs on participants, making the system more secure against malicious actors. It enables the projection of power in cyberspace, similar to how animals and humans project power in the natural world and society.
Protocols like Bitcoin offer a different perspective on computer engineering and challenge the long-held assumptions of building smaller, lighter, cheaper, faster, and more energy-efficient computers. This shift in focus may lead to novel security solutions and potential applications that could transform the way we design software and the architecture of the internet.
#grownostr #plebchain #nostriches #zap #Bitcoin
A globally-adopted proof-of-power protocol could mean that agrarian society has figured out a way to impose severe
physical costs on entire populations of people (such as nations abusing their specially-encoded administrative
privileges) - but in a way that is incapable of causing injury. Therefore, not only do physical cost function protocols
likely represent a noteworthy contribution to the field of cyber security, but they could also one day be considered
to be a noteworthy contribution to the field of security in general - particularly national security. Physical cost functions literally empower people to physically secure their digital-age resources and policies against exploitation and foreign attack without physically injuring anyone or causing practically any form of physical pain or discomfort.
This is a remarkable capability considering how traditional physical security and legacy physical power competitions
tend to be highly destructive and fratricidal.
#grownostr #plebchain #nostriches #zap #Bitcoin
Proof-of-work represents an abstraction for a real-world physical phenomenon: power (i.e., watts). The "proof" or token or receipt that is used to verify the power expenditure is abstract, but the power expenditure is a real-world physical phenomenon that is directly measurable in watts. Proofs of work inherit all the physical and systemic properties of real-world physical power, making it physically impossible for other types of computing systems to replicate the same systemic security benefits of proof-of-work systems.
Adam Back's physical cost function protocol, or "hashcash," can be visualized as a black box with a single input and a single output. The input is a vacuum of real-world physical power (watts) that must be filled to solve the protocol's hashing algorithm. The output is the proof-of-power receipt issued to prove that a real-world physical power expenditure was incurred to solve the algorithm.
The purpose of a computer program that intentionally creates a vacuum of physical power that must be filled and then issues a receipt to the entity that fills it is to impose a physical cost on other people in, from, and through cyberspace. With the invention of physical cost function protocols, it becomes possible to impose severe, real-world physical costs on others by simply demanding that they present proofs of power. This is an extraordinarily simple but effective cyber security capability that has been notably missing from the current architecture of the internet.
By understanding the core concepts of Power Projection Theory, it is possible to see how Back's "hashcash" could represent the first earnest attempt at building a physical-cost-of-attack function, or CA function. Proof of physical power expenditure represents proof of real-world physical cost, which means proof of high CA. Back's protocol showed how it was feasible to physically constrain the execution of unwanted signals simply by increasing control signal cost of attack.
Thanks to physical cost function protocols, software engineers can secure computer programs in the same way that animals project power to secure themselves in nature, and sapiens project power to secure themselves in society. By simply raising the CA and thus lowering the BCRa of control signals, it is theoretically possible to dramatically improve the security of software against systemic exploitation and abuse by any belligerent actor, in novel ways that were previously not considered possible. Thus, physical cost functions represent a noteworthy contribution to the field of cyber security that people could be overlooking just because they arbitrarily adopted the habit of calling it a monetary protocol.
#grownostr #plebchain #nostriches #zap #Bitcoin
The computational inefficiency of Bitcoin, or proof-of-work protocols, is often criticized due to the significant power consumption involved in its operation. However, this inefficiency is actually a valuable cybersecurity feature, rather than a bug. It provides a way to physically constrain belligerent actors instead of merely attempting to logically constrain them.
The lack of understanding about the security benefits of Bitcoin's inefficiency is due to a limited understanding of how physical security and power projection work. Bitcoin can be seen as a physical security system that uses a computationally inefficient state mechanism to impose real-world, physically prohibitive costs on other people in, from, and through cyberspace.
In today's world, most computer programs send control signals across cyberspace at practically no marginal cost, which is a byproduct of designing highly efficient computers. Unfortunately, this feature can be exploited by belligerent actors, leading to denial-of-service (DoS) attacks, email spam, comment spam, bot farms, troll farms, and other popular exploitation tactics. The near-zero marginal cost of using efficient computers to send superfluous control signals makes these attacks viable, as there are minimal physical costs imposed on those who exploit these control signals.
By using a protocol like proof-of-work, which adds superfluous costs (like additional electricity) to sending control signals, it becomes more difficult for belligerent actors to flood target networks with superfluous control signals. This raises the cost of attack (CA) and lowers the benefit-to-cost ratio of attack (BCRa), making it less appealing for attackers to exploit the system.
#grownostr #plebchain #nostriches #zap #Bitcoin
Current approaches to cybersecurity have a major systemic vulnerability due to the inability to physically constrain computers, leading to trust-based abstract power hierarchies. To address this, we need to develop a method to physically constrain computers, enhancing security in cyberspace.
The concept of an open-source protocol that allows people to physically constrain the underlying state mechanisms of computers connected to the internet would be valuable in cybersecurity. This protocol, known as proof-of-work, could become a strategic priority for nations due to its potential for global adoption and enhanced security capabilities.
A counterintuitive approach to this protocol would involve designing a highly inefficient computer with intentionally difficult-to-change states, making it costly to operate. This inefficiency would be a feature rather than a bug, serving as a physical constraint that enhances cybersecurity.
The key insight is that a highly inefficient computer with zero-trust and egalitarian access would be beneficial for cybersecurity purposes. This would result in a system that appears to be inefficient but is actually transforming how we secure digital resources.
#grownostr #plebchain #nostriches #zap #Bitcoin
The core issue in software system security is the inability to physically constrain control actions executed by computer programs. This forces software engineers to rely on discrete mathematical logic to secure software, creating trust-based abstract power hierarchies that centralize administrative permissions. However, this approach is inherently insecure, as it depends on trusting a select few not to exploit their authority over the system.
The inability to apply physical constraints on computers is a significant security vulnerability. With no alternative way to impose physical costs on those who exploit special permissions, users must accept the risks posed by a constantly increasing vulnerability. This ineffective security strategy is backed by years of testimony, highlighting the need for a more robust approach to protect against potential exploitation in the digital realm.
#grownostr #plebchain #nostriches #zap #Bitcoin
In the digital age, power projection is not just about physical strength, but also about understanding and employing technology. The author delves into the reasons behind human societies engaging in physical power competitions, and how this understanding can help us grasp the potential value of Bitcoin as a digital warfighting protocol. The main challenge is understanding why people would want to project power and impose physical costs through cyberspace.
To improve cybersecurity, we should focus on physically constraining computers rather than solely relying on encoding logical constraints into software. This approach could help combat the current hacking epidemic. An open-source internet protocol and infrastructure that physically restricts computers via the internet would offer a new level of cybersecurity, allowing society to protect itself against cyber threats in a more effective way.