Please ask MARA about Stratum v2 while in Vegas.
Thank you for your attention to this matter.
average_bitcoiner
average@primal.net
npub160t5...yjc9
sum divided by count
Mempool on the sats standard now?
※ recap: Scoping jumble.virginiafreedom.tech as a fiefdom on chat.virginiafreedom.tech — forked Jumble, patched all
relay constants to our relay, built and deployed. Next: verify in a browser that only
wss://chat.virginiafreedom.tech WebSocket connections appear.
I don't get paid enough for all the theatre.
There's a strong correlation between Trump enjoyoors and STRC enjoyoors.
It's very telling of value alignment.


STT on for grok to give me:
# Bitcoin as a Secure Channel in Cyberspace: Unpacking Softwar, Proof-of-Publication, and the Heatpunk Movement
**By Bitcoin Veterans**
*April 2026*
In the evolving conversation around Jason Lowery’s *Softwar* framework, one idea keeps surfacing with fresh clarity: **Bitcoin isn’t trying to shield the entire internet.** Instead, it functions as a powerful, energy-backed *secure channel* for passing signals and ordering information inside your own chosen slice of cyberspace.
I’ve been chewing on this with Grok, and the nuances are worth unpacking in detail.
## Softwar: Electro-Cyber Power Projection
Softwar — the term Lowery coined in his MIT thesis — describes Bitcoin’s unique ability to project power *in, from, and through* cyberspace without kinetic force. At its core, Bitcoin uses proof-of-work (PoW) to anchor digital information to physical reality (energy and hashrate).
An attacker doesn’t just need better code or social engineering; they must out-spend real-world electricity. That makes attacks *physically expensive*. It’s non-kinetic warfare for the digital age.
## Bitcoin as Your Secure Channel (Not a Universal Shield)
Bitcoin gives you — whether you’re a military entity, a nation-state, a corporation, or even a small group — a **provably reliable way to publish and chronologically order information**.
- It’s a **proof-of-publication** ledger.
- Once data is buried under enough cumulative work, rewriting history becomes absurdly costly.
- The result is cryptographically enforced, immutable chronological ordering.
This is sufficient for high-stakes applications: secure command-and-control, uncensorable value transfer, or any messaging where trust in the record matters.
**Important clarification**: Bitcoin does *not* blanket the entire internet and make every bit of data impregnable for everyone forever. It secures *your* channels. Other players can (and will) run their own networks, protocols, and comms. Bitcoin doesn’t confiscate cyberspace — it simply gives anyone who opts in a new, energy-backed enforcement layer.
## Permissionless Asymmetry: Energy Is the New Battlefield
Here’s where it gets strategically interesting. Bitcoin mining is radically permissionless. The “economic entities of hashrate” can be as small as a handful of people who control energy sources.
You don’t need a central authority’s blessing. You need electrons and silicon.
This creates healthy asymmetry:
- Small, energy-smart groups (or even individual households) can participate meaningfully.
- You don’t need planet-scale energy to defend *your own* channel — just enough to keep your timestamped data credible.
The foundation is energy itself. Those who control energy control the ability to secure channels in cyberspace.
## The Heatpunk Movement: Decentralization You Can Feel
One of the most exciting developments right now is the **heatpunk** (or “hashrate heatpunk”) movement.
People are installing miners in homes, garages, and small businesses specifically to capture waste heat for:
- Space heating
- Water heating
- Greenhouses
- Other practical uses
Devices like Heatbit, custom immersion setups, and retrofitted ASIC heaters are turning “waste” heat into a feature that actually subsidizes electricity costs.
**Why this matters for the network**:
- Electricity bill offset → home mining becomes economically viable again.
- Nodes + hashrate literally in every house → massive geographic and political decentralization.
- More participants securing the ledger with their own energy → dramatically harder for any single actor (state or otherwise) to dominate or censor.
This bottom-up, energy-based resilience is exactly what makes Bitcoin’s permissionless security model antifragile at global scale.
## Tying It All Together
Bitcoin/softwar isn’t the one ring to rule all of cyberspace.
It’s a protocol that lets *you* raise and project electro-cyber forces to protect your own bits of information (financial or otherwise) by making attacks expensive in real energy.
It’s permissionless enough that small, energy-smart groups can participate meaningfully. Movements like the heatpunks make that participation not only possible but economically attractive.
That’s why it feels like such a clean fit for military-grade secure channels — without pretending it’s some totalizing shield.
---
**What’s next?**
If you’re running a node, experimenting with home mining, or thinking about how Bitcoin changes power projection in the 21st century, drop your thoughts below. The heatpunk wave is just getting started — and the more of us turning waste heat into hashrate, the stronger the network becomes.
*Stay sovereign.*
#weedstr
Looks like our girls didn't make it. Trying for a direct sow with two seeds. A bit late but oh well. I did a shit job starting inside and had too much water. The cups got moldy and the plants weren't strong because I drown them. *sigh*


on Softwar.
Trust the theory. Don't verify.
I have ideas that align with his idea of a macro computer.
but how does Bitcoin enforce control mechanisms for computers?
It's not that I disagree with the theory. It's that I demand proof. It's a cool theory. But falls apart at implementation because the world is messy. The cloud is just someone else's computer.
-------------------------
Economically it all checks out
Game theoretically.
Protocol spec for softwar? It's supposed to be useful in cyberspace. Protocols are the rules if cyberspace. Show me a protocol spec.
Specs are great but show me code.
Code is great. Let me run it.
PoW secures the chain; not exogenous data. The given state of any arbitrary bits can change whenever my computer wills it to change. Snapshotting those bits don't prevent me from changing the bits. It allows for detection of the change but does not prevent the change.
You can take a picture of your car, but it won't prevent it's theft or damage.
The chain is immutable.
Everything else is not
(this thread prompted by a good friend. ty fren)
I have ideas that align with his idea of a macro computer.
but how does Bitcoin enforce control mechanisms for computers?
It's not that I disagree with the theory. It's that I demand proof. It's a cool theory. But falls apart at implementation because the world is messy. The cloud is just someone else's computer.
-------------------------
Economically it all checks out
Game theoretically.
Protocol spec for softwar? It's supposed to be useful in cyberspace. Protocols are the rules if cyberspace. Show me a protocol spec.
Specs are great but show me code.
Code is great. Let me run it.
PoW secures the chain; not exogenous data. The given state of any arbitrary bits can change whenever my computer wills it to change. Snapshotting those bits don't prevent me from changing the bits. It allows for detection of the change but does not prevent the change.
You can take a picture of your car, but it won't prevent it's theft or damage.
The chain is immutable.
Everything else is not
(this thread prompted by a good friend. ty fren)Buckets on the girls tonight. Supposed to hit 32F.
Earlier today there was snow. Three of the four girls looked rough. One was OK. #weedstr #growstr


GM. enjoy the Lord's day