Cryptographic Doomsday Clock

ODOMOJULI

2020-07-21T07:00:00.000Z

Cryptographic Doomsday Clock

The current time is 100 seconds to midnight.

If you say why not spam them tomorrow, I say why not today?

If you say today at 5 o'clock, I say why not 1 o'clock?

Privacy is the last luxury.

@AngeloBTC
@apple
@barackobama
@billgates
@binance
@bitcoin
@bitfinex
@cashapp
@cloudwhiteven
@coinbase
@coindesk
@crypto_bitlord
@cz_binance
@elonmusk
@floydmayweather
@gemini
@hqtrivia
@jedijamesdean
@jeffbezos
@joebiden
@justinsuntron
@kanyewest
@kimkardashian
@kucoincom
@luckyovlegends
@mattglantz
@mcnicollme
@mikebloomberg
@mrbeastyt
@ninodevries
@paultudorjone
@ripple
@satoshilite
@thesoleprano
@tronfoundation
@uber
@warrenbuffett
@wizkhalifa
@WtfffMichael
@xxxtentacion

The word luxury is derived fromluxus,which meansindulgence of the senses.

Approximately692,205,320accounts spammed withintwo hours flatusing about 40 Verified Twitter accounts.

Over 7 BTC and 1 XRP addresses, a total of roughly 12.000 BTC ($100,000+) USD was successfully scammed.

Coordinated across one Protonmail address, six Gmail addresses.

Potentially millions of accounts breached with sensitive personal information downloaded directly due to GDPR/CCPA compliancy.

At least one politician has been confirmed to have their DMs compromised.

All DMs are unencrypted and can only besoft-deleted.

There is evidence of heads of state preparing declarations of war as being drafted ahead of time on Twitter and those statements being treated as official by federal executive departments.

  • In 2013, a single tweet wiped out $139b out of the entire market.
  • In 2015, a single tweet wiped out $8b of Twitter's stock.
  • In 2018, a single tweet wiped out $1.3b of Snap's stock.
  • In 2020, a single tweet wiped out $14b of Tesla's stock.

It is this regard, we define privacy asessentialand security asnecessity.

Omne ignotum pro magnifico

Le mauvais goût mène au crime

де бы ни существовал закон, преступление может быть найдено.

During the post-Information Era regime of Total Information Awareness, pre-crime analysis andproactive arrests,privacy like any good luxury isglobalized, consolidated and diversified.Indeed, the easy of access for death and birth certificates, the amalgamation of vested interest in simplified identity commodities, and exponential growth of botnets and shell personas all indicate a significant socioeconomic trend that indicates a decaying social contract between the political elite and their respective governments.

It is not only possible, it isessential. That is the whole idea of this machine, you know.Deterrenceis the art of producing in the mind of the enemy...the fear to attack! And so, because of the automated and irrevocable decision making process which rules out human meddling, the doomsday machine is terrifying. It's simple to understand. And completelycredible, andconvincing.

Yes, but the... whole point of the doomsday machine... is lost...if you keep it a secret!Why didn't you tell the world, eh?

Consider at the very least seven main problems in digital security.

  • How to achieve privacy when someone is always listening. (encryption)
  • How to decide on a secret when everyone is watching. (key agreement)
  • How to turn one random number into unlimited random numbers. (pseudorandom number generators)
  • How to speak in a way that's impossible to imitate. (digital signatures)
  • How to help protect data without possessing it. (secret sharing)
  • How to check proofs that you can't see. (zero knowledge proofs)
  • How to process data you don't have access to. (homomorphic encryption)

Each of these mathematical fields are progressive and robust methods of scientific inquiry. However, all have their respective weaknesses not in their physical or digital implementations, but rather that even for sophisticated and mature economic societies, mathematical illiteracy or abuse of the problems is contagious and easily exploited. You require algorithmic adaptability. A mechanism for evolving beyond postmortems. Not committees with kitchensink requirements and unwieldy specifications.

κατθάνοισα δὲ κείσῃ οὐδέ ποτα
μναμοσύνα σέθεν
ἔσσετ' οὐδὲ †ποκ'†ὔστερον· οὐ
γὰρ πεδέχῃς βρόδων
τῶν ἐκ Πιερίας· ἀλλ' ἀφάνης
κἠν Ἀίδα δόμῳ
φοιτάσεις πεδ' ἀμαύρων νεκύων
ἐκπεποταμένα

There is so much that is wrong, will go wrong, or isn't even wrong about being wrong.

SOCIAL

© 2020 ODOMOJULI