01 March 2015

Afterfuture

I thought for Future Day that I could talk about the past.

     Buddha, "things are not as they appear, nor are they otherwise."

What is a block-chain? Let me take creative licence here. Imagine a page of a book, any book in the world, past present or future. That's a block-chain, with a difference, it's infinite and exact. Let's say that where that page ends, the next word is the first word on the page, an infinite loop, but no matter where the word is. 

Now that you get the scrolling idea, it also logs events. Let's say you buy a soda (pop), then the transaction would be linked to the fourth thru sixth words. Every transaction, via bits, attached to specific places. In Linux you know these as symbolic links. Transactions can overlap on the block-chain, but the bit stays intact. Using this process the user remains anonymous, commercially speaking, if the database is secure the second level comparison requires decryption thus protecting the identity. Otherwise all transactions would be public. Using a 'phrase' from the block-chain is similar to using an Info-Hash to authenticate files (briefcases). 

P2P software is massively intrusive in file discovery, learning what files where are what size and seeks them out to download them, resuming downloads that way are mostly download resumes/resumations where they stopped, whereas torrents are people sharing only file-names until transfer, (using torrent tracker sites or personal invitations,) when a torrent (file) is shared #passivevoice that file is indexed by properties and each one and zero (1 & 0) catalog listed, so that each piece can be downloaded by distance and availability instead of bandwidth and CPU strength. Each file is also listed with specifics that allow the files to be identified as verified torrents, so that the pieces of the desired torrent can be assembled from many locations, done so by using a type of Info-Hash identification, and some user input. 

So what are the bits in blockchains? Imagine that the computers are bitmining for the next digit in the decimals of Pi. Now include that with searches for other unknown things, things that the majority of us, myself included cannot mine by mind or with scratch paper, uncertainties that can't even be known, such as what is Pi^2, and then Pi^3, (or if you multiplied those), and other defined and intangible mathematical uncertainties. Math is a good deal about balancing equations, either directly or thru extraction, to find uncertainties beyond what tallying can produce, and so since the Square (*Pi^2) can't be verified to completion (because the decimals continue ad infinitum), the bit miners attempt to find strings (segments) known and/or provable. Anything discovered adds to the size of a block-chain.

The advent of bitcoin increases a difficulty to money laundering because each transaction is monitored. Torrents, despite using fragmentation to download, are not anonymous either. Block-chains aren't exaction something easily put into words in any short measure, but my most weak of grasps on the topic reminds me of a Mobius strip; it's a strip twisted half and conjoined into a loop so that despite being a two dimensional plane it only has one side as a two-dimensional object. 3D if you make one...

In my opinion nature has created a solution to the mobius strip by creating the fractal, which I can only imagine is bitmined by using blockchain verification torrent processing between multiple devices that use artificial-dna data storage, which I wish was called 3DNA so I could type it faster. 

Not sponsored by futureday.org, if you can't visit the link, blame a government who think, oddly enough for Zorro's sake, that TCP isn't enough and contrarily that IP wont advance. Think about it with strict logical confinement, technology has advanced already light-years beyond the hive mind (common) capability, or it hasn't. Two times four is eight, three times eleven is thirty three, four times thirty two is one-hundred twenty eight. And so on. Minus two, minus four, minus eight, minus sixteen. And so on. And that's only our addresses, a portion of which identify hardware, which can be forged, spoofed, replicated, simulated, virtualized, counterfeited, and not to forget, targeted. And, "net neutrality," which is everything except neutrality because evolution is not something government funds, is like paying inspectors to stand in a street that already has traffic-lights to stop traffic and see if people are mocking them for standing in the street. The dictatorship has a detailed record of your physical and digital existence in clear violation of your privacy rights, NN is them coming to terms with their guilt and their predecessors' crimes as they try to justify or dignify further violation. Not for "making the internet free" because localities can use their own lines instead of seizing private property to reinvent the internet but more slowly and expensively.

Even municipal networks, exercising free-speech rights to operate in PODUNK, YOURSTATEHERE aren't exactly culpable, let's imagine muni networks are real, only a complete invasion of privacy could barely tackle 1% of threats that telecom do, as proven by countries failing at it, because telecoms protect the network integrity and a token rings preserve targets. When security becomes another government failure they'll mandate and lease threat assessment back to the private sector, while blaming them, charging the taxpayers and providing slower service. Another "signature legislative achievement" is a bad idea. The internet is not something that can be built anymore, especially not if you were born before it was.


And.... countries with 1+9+8+4 have beaten their population into submission, the network that manipulators emulate and prevent, will soon be impervious to neanderthals that think a 2000-page law is healthy. 2000 pages is a manifesto of combined incriminatory schizophrenic illness. Yeah, but I spread mine over decades, isn't law, typed myself. Laws control freedom as mountains stop wind.

¿Por qué no flipas para día futuro?

"Hive Mind" is a process based on schematics, at most vaguely similar to fault-tolerance, and is better understood in different literature. You can read an abstract "Blockchains as a Granular Universal Transaction System" to get an inclination and lead into links and the prior, but it's only 'light reading' if you speak nerd (high lexical retention) or tech, else think of a Wikipedia that couldn't make errors. 

Quis custodiet ipsos custodes? Can block-chaining be used to privatize the internet? Well it can guarantee access, and it can revoke it. It's really a political question. Guaranteeing a private internet by handing it over to a government isn't actually private at all, aside from the debate of eminent domain (ethics). With the transactions being secured the fiscal transaction element to the process still requires administration, opening such system administration to open source standard loses privacy for sake of robustness. I'm sure that such privatization separates bit-coins from tender (notes), but that becomes a concern of private sector (republic) and how it chooses to implement the public sector (democracy). The power vacuum (hegemony) involved is no different than if actual money is unjustly manipulated/devalued, by bureaucrats interior XOR exterior.

Example 1: Imagine a password-manager, now imagine it as hacked. Run diagnostics, upgrade, #loop.

There's no legal (logic) argument for penalizing privatized currency because, despite what some can say, government did not invent the digits of Pi, nor does it create representation-value (especially if it renounces its right) ; therefore, unlike precious metals, bit-coins are not tied to the physical realm. Despite that being profound, humanity, you've earned another official paradox. The completed process is called a "Distributed Web" and falls into the category of 'best laid plans' to pay people to pretend they're working. Or in this case, making everyone a cache (backup) server and peer-to-peer, many hands make light work, but it would never be private again. Sometimes communications across gateways becomes essential, for example, in cases of dictatorships or fanatics a distributed network security communication protocols [any alternative ipsec protocol] embedded in the hardware redistributes the power of madmen. I feel I've said too much, damnedest, where are my manners, or madwomen. It may be necessary as bureaucrats replace public legislation with secret (corrupt) "regulations," of self-granted monarchist (litigation) powers, which do all except make regular. 

In the current timeline, it's a great idea for power grids and governments to decentralize, such as distribute power cells and separation-of-powers (fault tolerance, ahem), but divine (natural) communication protocols are already in place. Pay (capitalism) for your services with bit-coins or whatever, which is an endorsement even tho I'd thought I'd be condemning it as a world currency, sometimes trophies are trophies and ice cream is ice cream. Much like government, paying people doesn't increase their intelligence, and yet somebody always tries. Block-chaining is 4th tier authentication, but using it for redundancy is futile and distributed, but passive interference for implied security. Access control's weakness is still social engineering, if a control list is imposed the absolutists will have poised themselves for eradication by their own devices.

It would avert needs to identify vulnerabilities by knowing where the attacks originate, but people would develop new languages, such is our way, to avoid detection and leagues of functionary inspectors would provide all the security of private guards for public transportation whom are trying to reinvent the wheel. The opposite in some way to that of the world, we are fixed points in time or natural destroyers of pestilence, it is in our code to destroy the old guards and disuse their tinpot dictators.

Practice makes perfect, perfect makes practice.

[note to subscribers: related cyber and magic stories soon]

Luya, 
~mjb