Why Nostr? What is Njump?
2024-11-07 15:27:50

Valjean on Nostr: This text by Jason Lowery helped me to understand his Softwar theory about Bitcoin ...

This text by Jason Lowery helped me to understand his Softwar theory about Bitcoin and cyberspace security:

In our three-dimensional world, we secure our assets by imposing physical costs on potential threats. For example, we protect gold with massive vault doors that intruders must physically break through. We secure national borders with military defenses that adversaries must physically overcome.

Armies secure land by imposing physical costs (measured in watts) on adversaries operating in, from, and through land.

Navies secure the sea by imposing physical costs (measured in watts) on adversaries operating in, from, and through the sea.

Air Forces secure air space by imposing physical costs (measured in watts) on adversaries operating in, from, and through air space.

Space Forces secure outer space by imposing physical costs (measured in watts) on adversaries operating in, from, and through outer space.

Cyber Forces secure cyber space by... encoding logic that adversaries can easily hack/exploit.

This reveals a major flaw: we’ve been using the wrong approach to secure cyberspace. Unlike the way we secure land, sea, air, and space, the way we secure cyberspace relies solely on encoded logic (software), not on imposing physical costs, for security.

To secure information/assets in cyberspace in a way that is consistent with other domains, the world needs to adopt a universal protocol that imposes a tangible physical cost on adversaries. This can be achieved by developing a protocol that digitizes the cost of physical power expenditure (measured in watts) and imposes those costs on cyber threats. Enter reusable Proof-of-Work (PoW) protocols.

Proof-of-Work (PoW) secures software by requiring a self-imposed, extra energy expenditure.

By creating a protocol where a certain amount of energy (watts) must be expended to execute commands, access networks, or transmit data, we establish a system that imposes a physical cost on adversaries attempting to disrupt or exploit cyberspace. This aligns our approach to cyber security to the approach we use to secure assets and access to all four other domains.

To that end, Bitcoin isn't a "coin" at all. It's Bitpower - the digital projection of physical power into cyberspace. We can use this network to PHYSICALLY secure information rather than LOGICALLY secure information. We're already using it to secure information we voluntarily choose to call financial information, hence why we call it a "coin."

In the future, people will use this "Bitpower protocol" as a self-imposed physical constraint for transferring info, sending command signals, accessing networks, etc etc. This will dramatically reduce the attack surface and impose physical costs on malicious actors. It will also make "Bitpower" tokens extremely valuable, for reasons that transcend its current use as "digital gold."

Author Public Key
npub1k6utgx0p9gkjkvnv2qfm3vxrw89n3f5xzhl4adlcrggtwdsum2csvvh8gh