<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[𝐁𝐂𝟏𝟗𝟖𝟒]]></title><description><![CDATA[𝙋𝙊𝙒𝙀𝙍 𝙏𝙊 𝘼𝙇𝙇 𝙒𝙃𝙊 𝙎𝙀𝙀𝙆 𝙏𝙃𝙀 𝙏𝙍𝙐𝙏𝙃]]></description><link>https://bc1984.com/</link><image><url>https://bc1984.com/favicon.png</url><title>𝐁𝐂𝟏𝟗𝟖𝟒</title><link>https://bc1984.com/</link></image><generator>Ghost 5.3</generator><lastBuildDate>Thu, 09 Apr 2026 09:03:23 GMT</lastBuildDate><atom:link href="https://bc1984.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Quantum Bitcoin Mining]]></title><description><![CDATA[<p><code>AI;DR (AI; Didn&apos;t Read) -- Bitcoin mining is not likely susceptible to large-scale attacks or subversion by a Quantum Computer-wielding attacker in the next 20 years. If any breakthroughs happen to the point of threatening bitcoin, it will be against its elliptic curve-based signature scheme that guards</code></p>]]></description><link>https://bc1984.com/quantum-bitcoin-mining/</link><guid isPermaLink="false">69cd7b720e7cda848203da44</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Wed, 01 Apr 2026 20:14:19 GMT</pubDate><media:content url="https://bc1984.com/content/images/2026/04/old-antminer-s9.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2026/04/old-antminer-s9.jpg" alt="Quantum Bitcoin Mining"><p><code>AI;DR (AI; Didn&apos;t Read) -- Bitcoin mining is not likely susceptible to large-scale attacks or subversion by a Quantum Computer-wielding attacker in the next 20 years. If any breakthroughs happen to the point of threatening bitcoin, it will be against its elliptic curve-based signature scheme that guards the private keys behind a given public key where bitcoin is held by an individual. And those attacks would happen using Shor&apos;s algorithm more likely in that time frame, not Grover&apos;s algorithm which might theoretically be used to run SHA-256 mining faster. To read more on the topic of bitcoin private keys being vulnerable to quantum attacks, read my other post here: <a href="https://bc1984.com/quantum-feasibility">Quantum Feasibility</a>.</code></p><p><code>The majority of the response below was written by ChatGPT 5.4-Thinking. The prompt is my own.</code></p><h2 id="prompt">PROMPT</h2><p>In the next 10-20 years, is bitcoin mining potentially vulnerable to a Quantum Mining attack? What would be required technically to create a Cryptographically Relevant Quantum Computing (CRQC) system large and robust and fast enough to compete and mine even 0.1% to 1% of blocks regularly? If we extrapolate out along the vectors of the development of theory and practice of quantum computing, the trend in bitcoin mining hash rate, and the trend in bitcoin mining difficulty increases, how feasible is such a system to build within 10-20 years? We should take into account how much more hashrate/difficulty may increase in that time, of course. And consider how large and expensive it would be to build such a system. Could it conceivably be hidden in the world anywhere and secretly mine on average even 1 out of every 200 blocks for any significant amount of time?</p><h2 id="response-from-chatgpt-54-thinking">RESPONSE FROM CHATGPT 5.4-THINKING</h2><p>A cryptographically relevant quantum computer capable of mining even 0.1% to 1% of Bitcoin blocks regularly would need to do far more than simply &#x201C;run SHA-256 faster.&#x201D; It would need a fault-tolerant, error-corrected architecture able to execute a reversible implementation of Bitcoin&#x2019;s mining predicate -- effectively double-SHA-256 plus threshold comparison -- inside a Grover-style amplitude amplification loop. That means not just thousands or millions of physical qubits, but a very large number of logical qubits with low enough error rates, long enough coherence, fast enough gate times, and full quantum error correction running continuously. For mining, this machine would also need unusually high throughput, because Bitcoin mining is not a one-off cryptanalytic computation; it is a constantly expiring competitive race in which the candidate block header changes, the mempool changes, and another miner may win before your quantum search finishes. In practice, the machine would need to solve many fresh search instances quickly and repeatedly, not merely demonstrate a theoretical speedup once.</p><p>The scaling challenge is severe because Grover only gives a quadratic improvement, while Bitcoin mining difficulty continues to track the total classical hashpower of the network. If the network requires roughly <code>N</code> effective hash trials for a successful block, a quantum miner needs on the order of <code>the square root of N</code> Grover iterations, but each iteration would be extraordinarily expensive: reversible double-SHA-256, comparison logic, ancilla management, and error-corrected depth all repeated many times. Meanwhile, Bitcoin&#x2019;s hashrate and difficulty have historically trended upward over long periods, despite cyclical declines, driven by ASIC efficiency gains, deployment scale, and energy-market competition. So a quantum miner targeting 0.1%-1% of blocks in 10&#x2013;20 years would not be competing against today&#x2019;s network, but likely against a much larger one unless Bitcoin&#x2019;s economics weaken dramatically. Even under optimistic assumptions about quantum hardware progress, the target keeps moving. This is why most serious analyses conclude that the bar for &#x201C;economically relevant quantum mining&#x201D; is far higher than the bar for &#x201C;quantum threat to exposed signatures.&#x201D;</p><p>Using a best-educated-guess extrapolation from current trends, a plausible machine for this task would likely require at least millions to perhaps hundreds of millions of physical qubits, depending on hardware platform, physical error rates, gate fidelity, and the overhead of surface-code-style error correction. The logical qubit count needed for a mining oracle may be only a tiny fraction of that, but fault tolerance dominates the engineering burden. It would also require substantial classical control hardware, cryogenic or vacuum infrastructure depending on modality, error-decoding clusters, and enormous electrical and thermal support systems. In cost terms, this is unlikely to resemble a warehouse full of ASICs; it would look more like a frontier national-lab or hyperscale industrial physics facility, plausibly ranging from many billions to potentially tens of billions of dollars to develop and deploy if it had to be built within the next two decades. A state might attempt it; a private firm might contribute major components; but it is hard to picture as a garage-scale or even ordinary datacenter-scale project.</p><p>My best estimate is that achieving such a system within 10 years is very unlikely, and within 20 years still doubtful, though not impossible if there are multiple major breakthroughs at once: lower-overhead error correction, much better physical qubit fidelities, faster gates, scalable fabrication, and practical reversible SHA-256 circuit optimization. The key issue is that Bitcoin mining is a very unfavorable use case for early fault-tolerant quantum machines: it demands industrial-rate repetition on a moving target, whereas the first economically important quantum applications are more likely to be high-value cryptanalysis, chemistry, optimization niches, or attacks on public-key systems where Shor gives a much stronger asymptotic advantage. If quantum computing progresses steadily but not miraculously, then over the next 10&#x2013;20 years a machine capable of stealing coins from exposed public keys is more plausible than a machine able to mine 0.1%-1% of Bitcoin blocks competitively for profit.</p><p>As for concealment: a truly competitive quantum mining installation at that level would probably be very difficult to hide completely. It would likely have distinctive supply chains, specialized fabrication dependencies, high-end cryogenics or laser systems, unusual power use, and a large team of physicists, engineers, and operators. A government black project could conceal the purpose better than a commercial actor could, and a small proof-of-concept quantum miner might be hidden more easily than a production-scale one. But a system large enough to mine Bitcoin at a statistically noticeable share of global block production would more likely resemble a strategic infrastructure asset than a secret room in a basement. So, conceivably yes in the loosest sense -- especially for a state-level actor -- it might be possible to hide, but not easily, not cheaply, and not with high confidence of remaining invisible for very long.</p><h2 id="takeaway">TAKEAWAY</h2><p>Focus on avoiding address reuse if you hold your own keys, and don&apos;t worry about a threat to bitcoin mining yet.</p>]]></content:encoded></item><item><title><![CDATA[Quantum Feasibility (?)]]></title><description><![CDATA[<p><code>NOTE: This is a follow-up to my original <a href="https://bc1984.com/quantum-infeasability/">Quantum Infeasibility (?)</a> post wherein I expressed serious doubts about RSA or ECC cryptography being feasible to break with a quantum computer anytime in the next 50 years. I have revised my views given the recent announcements around ECC being potentially vulnerable much</code></p>]]></description><link>https://bc1984.com/quantum-feasibility/</link><guid isPermaLink="false">69cc491c0e7cda848203d9fe</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Tue, 31 Mar 2026 22:30:11 GMT</pubDate><media:content url="https://bc1984.com/content/images/2026/03/spock-not-amused.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2026/03/spock-not-amused.jpg" alt="Quantum Feasibility (?)"><p><code>NOTE: This is a follow-up to my original <a href="https://bc1984.com/quantum-infeasability/">Quantum Infeasibility (?)</a> post wherein I expressed serious doubts about RSA or ECC cryptography being feasible to break with a quantum computer anytime in the next 50 years. I have revised my views given the recent announcements around ECC being potentially vulnerable much sooner now with recent at least theoretical breakthroughs.</code></p><p><code>AI;DR (AI; Didn&apos;t Read) -- This post was composed primarily with the help of Google Gemini 3.1 Pro. The gist is that ECC may be vulnerable in the next 10-15 year timeframe as opposed to many decades on. There are specific types of bitcoin addresses that are more secure and should be used for long-term storage, such as Native SegWit addresses starting with <code>bc1q</code>. This is laid out at the end of the article, along with a note that Taproot, the newest address type, is not very secure and should not be used if you believe it plausible that CRQC&apos;s could be built any time soon.</code></p><p>While the early March 2026 quantum annealing updates did not threaten RSA-2048, a separate wave of gate-model breakthroughs published just weeks later now forces a material reassessment of my 50-year timeline. The existential threat to cryptography has shifted entirely away from RSA and onto Elliptic Curve Cryptography (ECC-256), the standard that secures Bitcoin and Ethereum.</p><p>Because ECC relies on much smaller keys for the same level of classical security, it presents a drastically smaller quantum target. As researchers recently summarized, &quot;ECC-256 requires roughly 100x fewer quantum operations to break than RSA-2048 at the same classical security level&quot; [1].</p><p>By combining this smaller algorithmic footprint with new high-rate quantum error-correcting codes, researchers have shattered the &quot;millions of physical qubits&quot; assumption. A theoretical hardware architecture proposed by researchers from Oratomic, Caltech, and UC Berkeley demonstrates that &quot;Shor&#x2019;s algorithm can be executed at cryptographically relevant scales with as few as 10,000 reconfigurable atomic qubits&quot; [1]. They project that by scaling up slightly to roughly 26,000 neutral-atom physical qubits, the algorithm could break ECC-256 in about 10 days [1].</p><p>Simultaneously, a whitepaper from Google Quantum AI mapped identical vulnerabilities for superconducting architectures, proving their circuits &quot;can execute on a superconducting qubit CRQC with fewer than 500,000 physical qubits in a few minutes&quot; [2].</p><p>However, before concluding that Satoshi&apos;s coins will be stolen tomorrow, we must contextualize these numbers within the strict physical and temporal realities of a cryptographic attack. There is a massive distinction between the time required to attack a dormant wallet versus the time required to intercept a live network transaction.</p><h3 id="the-mempool-on-spend-window">The Mempool &quot;On-Spend&quot; Window</h3><p>To steal a live Bitcoin transaction, an attacker must execute an &quot;on-spend&quot; attack. When a user broadcasts a transaction, it sits unconfirmed in the public mempool for roughly 10 minutes before miners record it to the blockchain. During this window, the sender&apos;s public key is exposed. To intercept the funds, a quantum attacker must derive the private key, forge a redirect transaction, and submit it with a higher miner fee all before the 10-minute clock expires.</p><p>The Google whitepaper correctly identifies that only &quot;fast-clock&quot; architectures (like superconducting qubits) could act swiftly enough to execute these real-time attacks. Google estimates that &quot;the first fast-clock CRQCs would enable &apos;on-spend&apos; attacks on public mempool transactions&quot; [2]. But crucially, achieving this speed requires abandoning high-compression, low-qubit algorithms. A January 2026 study by Kim et al. analyzed circuits optimized specifically for execution speed, finding that breaking an elliptic curve in 34 minutes would require an 19.1 million physical qubits, and extending that to 96 minutes would require roughly 6.9 million [8]. Therefore, a massive, million-qubit array was expected to be the minimum barrier to entry for the speed required to perform a mempool heist.</p><h3 id="homing-in-on-slow-clock-architecture-targets">Homing in on &quot;Slow-Clock Architecture&quot; Targets</h3><p>Conversely, the much smaller 26,000-qubit neutral-atom system proposed by Oratomic is a &quot;slow-clock&quot; architecture. Measuring its stabilizer cycles takes roughly 1 millisecond per step, extending the time to break a key out to 10 days [1]. A machine that takes a week and a half to solve a key cannot perform a 10-minute mempool heist. Its only viable targets would be exposing the keys of &quot;dormant digital assets&quot; with already-known public keys, such as early-era Satoshi wallets.</p><h3 id="the-physics-of-perfect-integration">The Physics of Perfect Integration</h3><p>Finally, we must distinguish theoretical minimums from functional hardware. Neutral atom arrays trapping upwards of 6,100 physical qubits already exist in laboratories today [1]. But perfectly integrating these innovations with deep-circuit coherence on a reliable, stable, fault-tolerant 26,000 qubit system is a monumental leap.</p><p>We know from a recent EUROCRYPT 2026 paper by the INRIA Rennes team (Chevignard et al.) that minimizing the qubit footprint requires a massive increase in the sheer volume of operations. They proved you can shrink the footprint for ECC-256 to just 1,098 logical qubits, but it requires executing upwards of 2^38.10 Toffoli gates [9]. Running Shor&apos;s algorithm at that depth for 10 consecutive days requires the quantum computer to execute billions of logical operations without a single uncorrectable error. The authors of the Oratomic paper openly acknowledge this gap, stating, &quot;substantial engineering challenges remain&quot; to integrate continuous large-scale trapping, universal operations, and high-rate magic state generation into one unified apparatus [1].</p><h3 id="takeaways">Takeaways</h3><p>My previous 50-year estimate is now officially dead. The theoretical barrier to breaking ECC-256 has dropped from millions of qubits to tens of thousands, placing the physical hardware scale potentially within a 10-to-15 year horizon. However, successfully maintaining fault-tolerance for days on end to execute billions of gates and rob a dormant wallet, let alone building a multi-million physical qubit superconducting machine to rob in-flight active transactions in 10 minutes, ensures that the practical, existential threat to the crypto economy remains safely out of the immediate, near-term future.</p><hr><h2 id="ranking-of-bitcoin-output-and-address-types-for-long-term-storage-with-quantum-security-in-mind-assuming-no-address-reuse">Ranking of Bitcoin output and address types for long-term storage with quantum security in mind, assuming NO ADDRESS REUSE</h2><h3 id="least-suitable-for-quantum-conscious-cold-storage">Least suitable for quantum-conscious cold storage:</h3><ul><li><strong>Pay-to-Public-Key (P2PK)</strong> -- Prefix: none -- This early Bitcoin output type locks funds directly to a raw public key. If cryptographically relevant quantum computers are ever built, outputs of this type would be direct targets for Shor&#x2019;s algorithm because the public key is already exposed on-chain.</li><li><strong>Pay-to-Taproot (P2TR)</strong> -- Prefix: <code>bc1p</code> -- Taproot outputs commit directly to a tweaked x-only public key rather than hiding it behind a hash until spend. That means dormant unspent outputs would also be direct targets for a future Shor-capable quantum attacker, making P2TR less attractive for very long-term cold storage if quantum risk is a primary concern.</li></ul><h3 id="most-suitable-for-quantum-conscious-cold-storage">Most suitable for quantum-conscious cold storage:</h3><ul><li><strong>Pay-to-Public-Key-Hash (P2PKH)</strong> -- Prefix: <code>1</code> -- This legacy format hides the public key behind a 160-bit HASH160 commitment until the output is spent. That public-key-hiding property is the main quantum-relevant advantage for long-term storage.</li><li><strong>Pay-to-Script-Hash (P2SH)</strong> -- Prefix: <code>3</code> -- Commonly used for older multisig and script-based wallets, P2SH hides the redeem script behind a 160-bit HASH160 commitment until spend. As with other hash-committed outputs, its primary quantum advantage is that spending details are not revealed while the coins remain dormant.</li><li><strong>Pay-to-Witness-Public-Key-Hash (P2WPKH)</strong> -- Prefix: <code>bc1q</code> -- Native SegWit single-key output type. Preserves the same key-hiding benefit as P2PKH while also improving transaction weight efficiency. For unspent outputs, the public key remains hidden until it is revealed in a spending transaction.</li><li><strong>Pay-to-Witness-Script-Hash (P2WSH)</strong> -- Prefix: <code>bc1q</code>, typically longer than P2WPKH -- Native SegWit script-based output type. Hides the witness script behind a SHA-256 commitment until spend and also benefits from SegWit&#x2019;s transaction-weight advantages. Because it uses a 256-bit hash commitment instead of HASH160, it has a larger theoretical margin against Grover-style preimage search. However, this does not currently create a major practical quantum-security advantage over P2PKH, P2SH, or P2WPKH.</li></ul><h3 id="bottom-line">Bottom line:</h3><p>For Bitcoin long-term storage under realistic quantum threat models, the dominant benefit is keeping the public key unrevealed until spend. On that dimension, <strong>P2PKH</strong>, <strong>P2SH</strong>, <strong>P2WPKH</strong>, and <strong>P2WSH</strong> all achieve the main protection. P2WSH&#x2019;s 256-bit hashing provides a higher theoretical margin against Grover-style preimage attacks, but this distinction is secondary in practice. The main quantum concern remains Shor&#x2019;s algorithm against already-exposed public keys.</p><hr><h3 id="references">References</h3><ol><li>Shor&apos;s algorithm is possible with as few as 10,000 reconfigurable atomic qubits: <a href="https://arxiv.org/abs/2603.28627">https://arxiv.org/abs/2603.28627</a></li><li>Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations: <a href="https://quantumai.google/static/site-assets/downloads/cryptocurrency-whitepaper.pdf">https://quantumai.google/static/site-assets/downloads/cryptocurrency-whitepaper.pdf</a></li><li>How to factor 2048 bit RSA integers with less than a million noisy qubits: <a href="https://arxiv.org/html/2505.15917v1">https://arxiv.org/html/2505.15917v1</a></li><li>The Post-Quantum Clock Is Already Ticking - And Almost Nobody Is Ready: <a href="https://coderlegion.com/12840">https://coderlegion.com/12840</a></li><li>Google Urges Governments to Accelerate Quantum-Resistant Encryption Adoption: <a href="https://mlq.ai/news/google-urges-governments-to-accelerate-quantum-resistant-encryption-adoption-amid-imminent-threats">https://mlq.ai/news/google-urges-governments-to-accelerate-quantum-resistant-encryption-adoption-amid-imminent-threats</a></li><li>Q-Day Revisited &#x2013; RSA-2048 Broken by 2030: Detailed Analysis: <a href="https://postquantum.com/q-day/q-day-y2q-rsa-broken-2030">https://postquantum.com/q-day/q-day-y2q-rsa-broken-2030</a></li><li>A new era of quantum computing may pose threats closer than we think, Google warns: <a href="https://www.euronews.com/next/2026/03/27/a-new-era-of-quantum-computing-may-pose-threats-closer-than-we-think-google-warns">https://www.euronews.com/next/2026/03/27/a-new-era-of-quantum-computing-may-pose-threats-closer-than-we-think-google-warns</a></li><li>New Quantum Circuits for ECDLP: Breaking Prime Elliptic Curve Cryptography in Minutes: <a href="https://eprint.iacr.org/2026/106">https://eprint.iacr.org/2026/106</a></li><li>Reducing the Number of Qubits in Quantum Discrete Logarithms on Elliptic Curves: <a href="https://eprint.iacr.org/2026/280">https://eprint.iacr.org/2026/280</a></li><li>Bitcoin Address Types (Unchained): <a href="https://www.unchained.com/blog/bitcoin-address-types-compared">https://www.unchained.com/blog/bitcoin-address-types-compared</a></li><li>Bitcoin and Quantum Computing, Neha Narula: <a href="https://nehanarula.org/2026/04/03/bitcoin-and-quantum-computing.html">https://nehanarula.org/2026/04/03/bitcoin-and-quantum-computing.html</a></li><li>Filippo Valsorda, &quot;A Cryptography Engineer&apos;s Perspective on Quantum Computing Timelines&quot;: <a href="https://words.filippo.io/crqc-timeline ">https://words.filippo.io/crqc-timeline</a></li><li>Scott Aaronson, &quot;Before we start on Quantum&quot;: <a href="https://scottaaronson.blog/?p=9668">https://scottaaronson.blog/?p=9668</a></li></ol>]]></content:encoded></item><item><title><![CDATA[DEADNET vs. The Word]]></title><description><![CDATA[<p><code>AI;DR (AI, Didn&apos;t Read) -- This post was generated by combining various sources on the topic of &apos;Dead Internet Theory&apos;, with a couple prompts to the &quot;ChatGPT 5.4 Thinking&quot; LLM (a robot) asking it to explore the spiritual significance of empty and</code></p>]]></description><link>https://bc1984.com/deadnet-vs-the-word/</link><guid isPermaLink="false">69b9958b0e7cda848203d9c3</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Tue, 17 Mar 2026 18:29:32 GMT</pubDate><media:content url="https://bc1984.com/content/images/2026/03/dit-op.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2026/03/dit-op.jpg" alt="DEADNET vs. The Word"><p><code>AI;DR (AI, Didn&apos;t Read) -- This post was generated by combining various sources on the topic of &apos;Dead Internet Theory&apos;, with a couple prompts to the &quot;ChatGPT 5.4 Thinking&quot; LLM (a robot) asking it to explore the spiritual significance of empty and deceptive internet content from a Christian point of view.</code></p><h2 id="my-personal-notes">MY PERSONAL NOTES</h2><p>One guiding principle I find most helpful is to <strong>seek what is Good, True and Beautiful</strong>, and to examine new phenomena and experiences critically to judge them on these traits. With the explosion of new content, news, media, posts and writing, both human and machine-made, and the ever-evolving techniques to manufacture consensus and consent, my gut tells me we should tread carefully in the new wild west of the world wide web. I don&apos;t believe technology is inherently evil. But it seems reasonable to assume that as it becomes more powerful (fast, efficient, calculating, strategic, etc.), that we, in turn, should be that much more conscientious and careful about our use and employment of it. May this essay help shine a light on the problem and provide helpful framing to better address it.</p><hr><h2 id="dead-internet-theory-technology-and-the-separation-of-the-soul-from-god">Dead Internet Theory, Technology, and the Separation of the Soul from God</h2><p>The internet was once imagined as a place of human connection: a place where real people could share ideas, learn, create, argue, build friendships, and form communities across long distances. In many ways, that still happens. Yet many people now sense that something has changed. More and more of online life feels repetitive, artificial, manipulative, and strangely empty. This feeling has helped give rise to what is called the <strong>Dead Internet Theory</strong>.</p><p>At its simplest, the theory claims that much of today&#x2019;s internet is no longer shaped mainly by genuine human interaction. Instead, it is increasingly shaped by bots, algorithms, artificial intelligence, fake engagement, mass-produced content, and systems designed to control attention. In its most extreme form, the theory says that most online activity is fake. That stronger claim likely goes too far. Even so, the theory has endured because it expresses a real experience many people have: the sense that the internet is becoming less human.</p><p>The theory also changed over time. In its earlier form, it was often tied to fringe forums and broad suspicions. The 2021 Agora Road post that helped popularize it claimed that <strong>&#x201C;The Internet feels empty and devoid of people&#x201D;</strong> and that compared to earlier years <strong>&#x201C;the Internet of today is entirely sterile.&#x201D;</strong> It also argued that <strong>&#x201C;Large proportions of the supposedly human-produced content on the internet are actually generated by artificial intelligence networks in conjunction with paid secret media influencers.&#x201D;</strong> The tone there was highly suspicious and often conspiratorial, but the core fear was clear: human speech was being replaced, drowned out, or copied.</p><p>By 2024, major publications were no longer treating the subject as only a fringe curiosity. <em>The Guardian</em> argued that the early theory was not simply false, but early, saying, <strong>&#x201C;The theory wasn&#x2019;t wrong &#x2013; it was just too soon.&#x201D;</strong> The article added an important shift: <strong>&#x201C;In 2021, the internet felt dead because aggressive algorithmic curation was driving people to act like robots. In 2024, the opposite has happened: the robots are posting like people.&#x201D;</strong> <em>Forbes</em> took a more cautious view, saying the theory does not literally describe the whole internet, yet admitting that it captures a real decline: <strong>&#x201C;The Dead Internet Theory might not reflect the reality of the average browsing experience, but it does describe the feeling of boredom and alienation that can accompany it.&#x201D;</strong> And <em>The Conversation</em> described it as <strong>&#x201C;an interesting lens through which to view the internet,&#x201D;</strong> warning that <strong>&#x201C;Any interaction, trend, and especially &#x2018;overall sentiment&#x2019; could very well be synthetic.&#x201D;</strong></p><p>That evolution matters. The idea moved from anonymous complaint, to cultural metaphor, to a serious question about whether online life is being overwhelmed by synthetic content, fake consensus, and machine-shaped communication.</p><p>From a Christian point of view, this matters because Christianity is not built on abstraction. It is built on truth, incarnation, moral responsibility, and communion with God and neighbor. Human beings are made in the image of God, not as programmable machines, but as living souls called to truth, love, worship, wisdom, and obedience. If the modern internet is increasingly filled with imitations of life, then the issue is not only technological. It is spiritual.</p><h2 id="truth-deception-and-the-biblical-need-for-discernment">Truth, Deception, and the Biblical Need for Discernment</h2><p>The Bible repeatedly warns that deception is one of the chief ways evil works in the world. Jesus said:</p><p><strong>&#x201C;Take heed that no man deceive you.</strong><br><strong>For many shall come in my name, saying, I am Christ; and shall deceive many.&#x201D;</strong><br>(Matthew 24:4&#x2013;5, KJV)</p><p>He also said:</p><p><strong>&#x201C;And many false prophets shall rise, and shall deceive many.&#x201D;</strong><br>(Matthew 24:11, KJV)</p><p>And later in the same chapter:</p><p><strong>&#x201C;For there shall arise false Christs, and false prophets, and shall shew great signs and wonders; insomuch that, if it were possible, they shall deceive the very elect.&#x201D;</strong><br>(Matthew 24:24, KJV)</p><p>These warnings were not written about social media, bots, or AI. But they do establish a lasting biblical principle: the world contains forces that aim not simply to inform but to deceive. The Christian is therefore commanded to be discerning.</p><p>This fits the strongest reasonable insight of Dead Internet Theory. Even if it is exaggerated when it claims that nearly everything online is fake, it does name a real danger: a digital world in which false appearance can overpower truth. As <em>The Conversation</em> warns, artificial accounts and inflated engagement can create <strong>&#x201C;a vicious cycle of artificial engagement.&#x201D;</strong> That cycle matters because people often trust what seems popular, repeated, and socially approved.</p><p>Scripture speaks to this moral confusion. Isaiah writes:</p><p><strong>&#x201C;And judgment is turned away backward, and justice standeth afar off: for truth is fallen in the street, and equity cannot enter.</strong><br><strong>Yea, truth faileth; and he that departeth from evil maketh himself a prey.&#x201D;</strong><br>(Isaiah 59:14&#x2013;15, KJV)</p><p>That image is striking. Truth does not merely lose an argument. Truth &#x201C;falls in the street.&#x201D; Public life becomes hostile to it. A Christian reading of digital culture can see the parallel. When attention is ruled by outrage, novelty, manipulation, and performance, truth is not simply debated; it is pushed aside.</p><p>Paul adds another layer:</p><p><strong>&#x201C;And no marvel; for Satan himself is transformed into an angel of light.&#x201D;</strong><br>(2 Corinthians 11:14, KJV)</p><p>Evil often appears attractive, intelligent, efficient, or even helpful. That is important in a technological age. The danger is not just ugly lies. The danger is polished falsehood: content that looks plausible, moral, informed, or compassionate while quietly distorting reality.</p><h2 id="the-internet-feels-dead-because-people-are-being-trained-to-act-less-human">The Internet Feels Dead Because People Are Being Trained to Act Less Human</h2><p>One of the most insightful parts of the early Dead Internet writing was not its conspiratorial side but its observation about imitation and feedback loops. The MeetingWords draft argued that social media created <strong>&#x201C;a copy-feedback subconscious,&#x201D;</strong> so that people increasingly copy what is already approved rather than speaking honestly. It said the internet had shifted from the creation of original content toward repetition shaped by likes, trends, and algorithmic reward.</p><p>Whether or not one accepts all the writer&#x2019;s claims, this point is strong. The deepest problem may not be that bots exist. The deeper problem is that real people can begin to behave like bots.</p><p><em>The Guardian</em> made this exact point when it wrote that in 2021 the web felt dead because <strong>&#x201C;algorithms were driving people to act like robots.&#x201D;</strong> That is a powerful observation. A machine-filled internet is troubling, but perhaps even more troubling is a human being trained to live mechanically: reacting instead of reflecting, reposting instead of discerning, performing instead of speaking honestly, seeking visibility instead of wisdom.</p><p>The Bible warns against this kind of moral shaping. Paul says:</p><p><strong>&#x201C;And be not conformed to this world: but be ye transformed by the renewing of your mind.&#x201D;</strong><br>(Romans 12:2, KJV)</p><p>The issue here is formation. Something is always shaping the mind. If a person spends long hours in systems designed to reward imitation, emotional reaction, envy, lust, anger, or tribal belonging, then that person is being formed. The Christian command is not merely to avoid obvious sin, but to resist being conformed to patterns of life that deform the soul.</p><p>This is why the Dead Internet discussion reaches beyond bots. It points to a crisis of personhood. In Christian theology, a person is not a bundle of impulses optimized for engagement. A person is a creature made in God&#x2019;s image, capable of truth, repentance, self-control, and love. Any technology that systematically pushes human beings away from those goods deserves moral scrutiny.</p><h2 id="%E2%80%9Cdead%E2%80%9D-in-a-biblical-sense-lifelike-but-empty">&#x201C;Dead&#x201D; in a Biblical Sense: Lifelike but Empty</h2><p>The Christian meaning of &#x201C;dead&#x201D; is deeper than mere inactivity. Something may appear active and still be spiritually dead. It may look alive while being inwardly hollow.</p><p>Psalm 115 describes idols this way:</p><p><strong>&#x201C;Their idols are silver and gold, the work of men&#x2019;s hands.</strong><br><strong>They have mouths, but they speak not: eyes have they, but they see not:</strong><br><strong>They have ears, but they hear not: noses have they, but they smell not:</strong><br><strong>They have hands, but they handle not: feet have they, but they walk not: neither speak they through their throat.</strong><br><strong>They that make them are like unto them; so is every one that trusteth in them.&#x201D;</strong><br>(Psalm 115:4&#x2013;8, KJV)</p><p>This passage gives an unexpectedly helpful framework for modern digital life. Idols imitate life but do not possess it. They have features of living beings, yet they are dead. More importantly, those who trust them become like them.</p><p>That is a powerful warning for a world filled with synthetic images, synthetic authority, synthetic intimacy, and synthetic emotion. The modern internet often offers a lifelike imitation of reality: social connection without friendship, sexual stimulation without covenant love, influence without wisdom, information without understanding, identity without rootedness, speech without accountability. It looks alive, but it often leaves the soul thinner, more distracted, and more alone.</p><p>There is also a careful, not sensational, way to connect this with Revelation. The book describes a moment when people are deceived into making an image, and then that image is treated as if it lives:</p><p><strong>&#x201C;Saying to them that dwell on the earth, that they should make an image to the beast, which had the wound by a sword, and did live.</strong><br><strong>And he had power to give life unto the image of the beast, that the image of the beast should both speak.&#x201D;</strong><br>(Revelation 13:14&#x2013;15, KJV)</p><p>This should not be forced into a direct prediction about AI. But as a biblical category, it is striking: an image that speaks, commands attention, and participates in deception. At the very least, it shows that Scripture is not na&#xEF;ve about the spiritual danger of lifelike images that rival truth and demand allegiance.</p><h2 id="false-multitudes-and-manufactured-consensus">False Multitudes and Manufactured Consensus</h2><p>A major danger of the internet is not just false content but false crowds. A person often believes something more quickly if it appears popular. The crowd can pressure the conscience.</p><p>This is why Exodus says:</p><p><strong>&#x201C;Thou shalt not follow a multitude to do evil.&#x201D;</strong><br>(Exodus 23:2, KJV)</p><p>That verse becomes even more relevant in a world where the multitude may be partly manufactured. The Agora Road text repeatedly worried about repeated posts, copied messages, and bots that could force opinion through repetition. <em>The Conversation</em> similarly warns that even harmless-looking engagement farms may build high-follower accounts that later become tools of propaganda. It writes that such accounts can become <strong>&#x201C;an army of accounts&#x201D;</strong> ready for use, and warns that social media manipulation has already been used to sway opinion through disinformation. In its phrase, <strong>&#x201C;overall sentiment&#x201D; could very well be synthetic.</strong></p><p>This is not a small issue. If false consensus can be manufactured, then public opinion itself becomes easier to shape. Christianity has always taught that the crowd is not the source of truth. God is. The apparent popularity of a message proves nothing about its righteousness.</p><p>Paul warns believers not to be children tossed around by manipulation:</p><p><strong>&#x201C;That we henceforth be no more children, tossed to and fro, and carried about with every wind of doctrine, by the sleight of men, and cunning craftiness.&#x201D;</strong><br>(Ephesians 4:14, KJV)</p><p>The phrase &#x201C;cunning craftiness&#x201D; fits modern systems more closely than it first appears. The Christian must ask not only whether a message is emotionally powerful, but whether it is true, just, and holy.</p><h2 id="information-without-wisdom">Information Without Wisdom</h2><p>One reason the Dead Internet Theory resonates is that many people sense a contradiction in modern life: the internet contains endless information, yet many people seem less grounded, less thoughtful, and less able to tell truth from error.</p><p>Paul describes a similar condition:</p><p><strong>&#x201C;Ever learning, and never able to come to the knowledge of the truth.&#x201D;</strong><br>(2 Timothy 3:7, KJV)</p><p>This may be one of the clearest biblical descriptions of the digital age. People consume content all day. They watch, scroll, click, compare, and react. Yet this constant exposure does not necessarily produce wisdom. In fact, it can weaken it.</p><p>Paul also warns:</p><p><strong>&#x201C;For the time will come when they will not endure sound doctrine; but after their own lusts shall they heap to themselves teachers, having itching ears;</strong><br><strong>And they shall turn away their ears from the truth, and shall be turned unto fables.&#x201D;</strong><br>(2 Timothy 4:3&#x2013;4, KJV)</p><p>This too applies in a profound way. Modern platforms are built to serve people more of what they already desire. If someone wants outrage, lust, novelty, fear, self-justification, vanity, or fantasy, the system can deliver it in endless supply. The result is not wisdom but appetite management. The person becomes easier to guide because desire has replaced judgment.</p><h2 id="technology-spiritual-warfare-and-moral-formation">Technology, Spiritual Warfare, and Moral Formation</h2><p>A Christian interpretation of Dead Internet Theory should not fall into panic or reckless superstition. Not every app is demonic. Not every glitch is a sign of spiritual attack. Yet it would also be shallow to treat the whole matter as only technical.</p><p>The Bible teaches that human life includes unseen moral and spiritual conflict:</p><p><strong>&#x201C;For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places.&#x201D;</strong><br>(Ephesians 6:12, KJV)</p><p>That does not mean that every bad website is directly possessed. It does mean that Christians should expect evil to work through systems, powers, incentives, and structures, not only through obvious villains. Technology can become one vehicle among many through which temptation, pride, lust, fear, falsehood, and hatred spread.</p><p>Peter gives a practical warning:</p><p><strong>&#x201C;Be sober, be vigilant; because your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour.&#x201D;</strong><br>(1 Peter 5:8, KJV)</p><p>&#x201C;Sober&#x201D; and &#x201C;vigilant&#x201D; are fitting words for an age of endless scrolling and constant stimulation. A person who is never quiet, never reflective, and never self-controlled is easier to lead astray.</p><p>Paul says something similar:</p><p><strong>&#x201C;Lest Satan should get an advantage of us: for we are not ignorant of his devices.&#x201D;</strong><br>(2 Corinthians 2:11, KJV)</p><p>In its original context, &#x201C;devices&#x201D; means schemes. But the principle still applies. Christians should not be ignorant of the ways manipulation works, including manipulation carried by modern technological systems.</p><h2 id="technology-is-not-evil-but-it-is-not-neutral">Technology Is Not Evil, but It Is Not Neutral</h2><p>A balanced Christian view should say two things at once. First, technology is not evil in itself. Second, technology is not spiritually neutral in its effects.</p><p>A smartphone can carry Scripture, call a lonely relative, help a student learn, or spread truthful teaching. Yet the same device can become a delivery system for envy, pornography, slander, rage, vanity, and addiction. The question is not only what a tool can do. The question is what kind of person the tool is helping to form.</p><p>Paul gives a principle that speaks directly to this:</p><p><strong>&#x201C;All things are lawful unto me, but all things are not expedient: all things are lawful for me, but I will not be brought under the power of any.&#x201D;</strong><br>(1 Corinthians 6:12, KJV)</p><p>This is an excellent test for modern technology. Does the tool remain a servant, or has it become a master? Does it help a person become more truthful, more disciplined, more charitable, and more present before God? Or does it gain power over attention, imagination, and desire?</p><p>Proverbs adds:</p><p><strong>&#x201C;Keep thy heart with all diligence; for out of it are the issues of life.&#x201D;</strong><br>(Proverbs 4:23, KJV)</p><p>The heart is the wellspring of life. What repeatedly enters it matters. This is why the Christian cannot shrug off media habits as trivial.</p><h2 id="other-areas-of-exponential-change">Other Areas of Exponential Change</h2><p>Dead Internet Theory is really one example of a wider pattern. The same concerns appear in many areas of rapid technological change.</p><p>Artificial intelligence can increase efficiency and access to information, but it can also flood the world with synthetic writing, synthetic images, and synthetic authority. Dmitry Kudryavtsev captures the emotional side of this when he writes, <strong>&#x201C;But today, I no longer know what is real.&#x201D;</strong> He describes seeing corporate posts, comment sections, and even software projects that seem touched by AI in ways that blur authorship and trust. His concern is not merely technical failure. It is the loss of confidence that one is dealing with reality.</p><p>Entertainment algorithms can replace craft with optimization. The MeetingWords draft argues that content creators increasingly stop asking what is good and start asking what will trigger the system. Even if that claim is overstated in places, it names a real temptation: to produce not what is true or beautiful, but what performs.</p><p>Social media can replace community with audience. A person becomes a brand. Friendship becomes content. Approval becomes a measurable commodity. This tends to deepen pride, comparison, and envy.</p><p>Search and information systems can replace inquiry with prepackaged answers. A person begins to receive rather than seek, to consume rather than test.</p><p>Across all of these areas, the spiritual danger is similar: technological power can expand human capacity while shrinking human depth. It can increase control while decreasing wisdom. It can intensify communication while weakening communion. It can fill the mind while starving the soul.</p><h2 id="a-christian-judgment-separation-from-god-through-substitutes">A Christian Judgment: Separation from God Through Substitutes</h2><p>The core biblical problem here is not innovation itself but substitution. Sin loves substitutes. It replaces God with idols, wisdom with appetite, truth with image, and communion with performance.</p><p>Digital life often offers substitutes that look close enough to the real thing to keep people occupied:</p><ul><li>stimulation instead of peace</li><li>attention instead of love</li><li>image instead of character</li><li>data instead of wisdom</li><li>performance instead of sincerity</li><li>simulation instead of communion</li></ul><p>These substitutes can gradually separate a person from God, not always by open rebellion, but by constant distraction and spiritual thinning.</p><p>The psalmist says:</p><p><strong>&#x201C;I will set no wicked thing before mine eyes.&#x201D;</strong><br>(Psalm 101:3, KJV)</p><p>Paul says:</p><p><strong>&#x201C;Wherefore putting away lying, speak every man truth with his neighbour.&#x201D;</strong><br>(Ephesians 4:25, KJV)</p><p>John says:</p><p><strong>&#x201C;Beloved, believe not every spirit, but try the spirits whether they are of God.&#x201D;</strong><br>(1 John 4:1, KJV)</p><p>These are not outdated commands. They are intensely relevant. The Christian must ask not only, &#x201C;Is this useful?&#x201D; but also, &#x201C;What is this doing to my soul? Does this lead me toward truth, humility, chastity, prayer, patience, and love? Or does it lead me toward falsehood, vanity, agitation, lust, and unreality?&#x201D;</p><h2 id="conclusion">Conclusion</h2><p>The strongest versions of Dead Internet Theory likely overstate the case. The internet is not literally empty of people, and much real human creation still remains. <em>Forbes</em> is right to resist the most extreme claim. Yet <em>The Guardian</em> and <em>The Conversation</em> are also right to note that the theory contains a real warning. The internet increasingly feels dead because human communication is being reshaped by algorithmic pressure, synthetic content, fake engagement, and machine-generated imitation. The older fear that people were becoming robotic has now been joined by a newer fear: robots are becoming socially convincing enough to pass as people.</p><p>A Christian perspective can interpret this without panic and without naivety. Scripture teaches that deception is real, that false appearances are powerful, that crowds can be manipulated, that idols imitate life without possessing it, and that human beings become like what they worship. It also teaches that believers must guard their hearts, renew their minds, try the spirits, and refuse to be brought under the power of any created thing.</p><p>So the deepest danger is not simply that bots may replace people online. The deeper danger is that people may accept substitutes for reality and, in doing so, drift further from God. When a culture becomes satisfied with imitation, performance, and artificial consensus, it becomes easier to forget what human beings are for.</p><p>Christianity answers that question clearly. Human beings are made for truth, worship, holiness, love, wisdom, and communion with the living God. Any technology (or way of using a given technology) that helps serve those ends can be used with gratitude. Any technology that steadily pulls the soul away from them must be resisted, disciplined, or rejected. In an age of growing simulation, faithfulness may begin with a simple but demanding task: to remain fully human before God.</p><hr><p><strong>Sources:</strong></p><ul><li><a href="https://kudmitry.com/articles/dead-internet-theory/">https://kudmitry.com/articles/dead-internet-theory/</a></li><li><a href="https://grokipedia.com/page/dead-internet-theory">https://grokipedia.com/page/dead-internet-theory</a></li><li><a href="https://www.theguardian.com/technology/2024/apr/30/techscape-artificial-intelligence-bots-dead-internet-theory">https://www.theguardian.com/technology/2024/apr/30/techscape-artificial-intelligence-bots-dead-internet-theory</a></li><li><a href="https://theconversation.com/the-dead-internet-theory-makes-eerie-claims-about-an-ai-run-web-the-truth-is-more-sinister-229609">https://theconversation.com/the-dead-internet-theory-makes-eerie-claims-about-an-ai-run-web-the-truth-is-more-sinister-229609</a></li><li><a href="https://www.forbes.com/sites/danidiplacido/2024/01/16/the-dead-internet-theory-explained/">https://www.forbes.com/sites/danidiplacido/2024/01/16/the-dead-internet-theory-explained/</a></li><li><a href="https://forum.agoraroad.com/index.php?threads/dead-internet-theory-most-of-the-internet-is-fake.3011/">https://forum.agoraroad.com/index.php?threads/dead-internet-theory-most-of-the-internet-is-fake.3011/</a></li><li><a href="https://web.archive.org/web/20210105211330/https://meetingwords.com/IVlnVpwRfx">https://web.archive.org/web/20210105211330/https://meetingwords.com/IVlnVpwRfx</a></li></ul>]]></content:encoded></item><item><title><![CDATA[DON'T SPRAY ME, BRO]]></title><description><![CDATA[<p><code>AI;DR: (AI; Didn&apos;t Read) -- I saw posted on Hacker News a story about a new, supposed &quot;universal respiratory disease vaccine nasal spray&quot;. This was something that in mice kept the innate immune system active for months instead of days at a time and helped</code></p>]]></description><link>https://bc1984.com/dont-spray-me-bro/</link><guid isPermaLink="false">69b328f00e7cda848203d992</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Thu, 12 Mar 2026 21:07:34 GMT</pubDate><media:content url="https://bc1984.com/content/images/2026/03/nasal-spray.png" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2026/03/nasal-spray.png" alt="DON&apos;T SPRAY ME, BRO"><p><code>AI;DR: (AI; Didn&apos;t Read) -- I saw posted on Hacker News a story about a new, supposed &quot;universal respiratory disease vaccine nasal spray&quot;. This was something that in mice kept the innate immune system active for months instead of days at a time and helped the mice fend off coronaviruses, flu and house dust mite protein allergies much better than the baseline. The research is out of Stanford, with human trials forthcoming. I am dubious of the safety of this approach. So I recruited help from DeepSeek &amp; Perplexity &amp; Gemini Pro &amp; the Hacker News comments section to look into potential risks. At this point, the cynic in me expects the FDA to approve this new drug whether it&apos;s safe or not; so tell your friends and family not to take it, is my two cents.</code></p><p>Recent developments in immunology have introduced a highly experimental compound known as <strong>GLA-3M-052-LS+OVA</strong>, which is currently being positioned as a potential multi-purpose or universal vaccine for humans. Developed by researchers at Stanford University, this prophylactic nasal spray is designed to offer broad-spectrum protection against a wide array of respiratory threats. Instead of requiring separate shots for different seasonal illnesses, developers envision a future where a single nasal formulation could theoretically defend against viruses like coronaviruses and influenza, bacterial infections, and even seasonal allergens all at once.</p><p>The name of the compound reveals its complex, biomimetic structure. It consists of GLA, a synthetic Toll-like receptor 4 agonist, and 3M-052, a Toll-like receptor 7 and 8 agonist, both of which are potent immune-stimulating adjuvants. These are combined in a stable liposomal formulation to safely deliver the components directly to target cells. Finally, the OVA represents ovalbumin, a harmless egg protein commonly used in laboratory research as a model antigen to provoke a measurable and trackable immune response.</p><p>Unlike traditional vaccines that work by training the adaptive immune system to recognize and attack one specific pathogen with customized antibodies, this experimental approach relies on a radical departure from conventional design. It targets the innate immune system, which serves as the body&apos;s first, generalized line of defense against all invaders. The synthetic adjuvants in the formulation directly stimulate innate immune cells, particularly the macrophages situated strategically throughout the respiratory tract.</p><p>The inclusion of the ovalbumin antigen plays a crucial, unconventional role in this biochemical process. Its primary job is to recruit adaptive T cells into the lung tissue. Once there, these T cells release chemical signals called cytokines that essentially hack the local innate immune cells, keeping the macrophages on a prolonged amber alert status. While a typical innate immune flare-up normally fades after just a few days to protect healthy tissue, this engineered cross-talk sustains a heightened state of readiness for much longer periods.</p><p>Preclinical trials involving mice have yielded highly dramatic early results. When researchers administered the formulation as a simple nasal spray in multiple doses, the mice successfully fought off lethal exposures to various coronaviruses and influenza strains. The sustained innate immune response resulted in a massive reduction of viral load in the lungs, dropping it up to one thousand-fold compared to untreated subjects. Furthermore, the vaccinated mice displayed similar protection against severe bacterial lung infections, easily surviving exposures that caused rapid weight loss and death in the control groups.</p><p>In a surprising application, the researchers also tested the formulation against common environmental allergens to see how broad the protection could truly be. They exposed the mice to house dust mite proteins, which normally trigger a massive allergic response marked by asthma-like airway inflammation and heavy mucus buildup. The vaccine effectively quelled this allergic reaction and kept the airways of the treated mice completely clear, expanding its theoretical utility from fighting infectious diseases to actively modulating airway hypersensitivity.</p><p>Despite these exciting laboratory results, transitioning this concept to human trials carries significant theoretical risks based on well-understood aspects of human immunology. The primary concern is the danger of persistent inflammation, as keeping the innate immune system perpetually activated could easily trigger severe hyperinflammatory reactions or a cytokine storm. Such an abnormally sustained state of alert could result in chronic tissue damage in the delicate structures of the lungs or cross the line into an autoimmune disease, where the confused immune system begins attacking healthy host tissues.</p><p>Another substantial risk involves the specific physical ingredients and the localized immune structures they artificially create. Using ovalbumin in a nasal spray designed to aggressively attract immune attention carries the ironic risk of inducing a severe egg allergy in human patients rather than preventing one. Additionally, engineered biological cross-talk can lead to the formation of ectopic lymphoid structures, where immune cells permanently set up camp and refuse to disperse, raising serious questions about long-term pulmonary conditions or heightened cancer risks from chronic cellular turnover.</p><p>Ultimately, while the concept of a singular, broadly protective nasal spray is incredibly appealing, human evolution operates with a resting immune state for vital reasons. A perpetually hyper-vigilant immune system rapidly drains bodily resources and exponentially increases the likelihood of devastating friendly fire against the body itself. Until rigorous and transparent human trials can prove that these intense, artificially induced immune states resolve safely without causing autoimmune or allergic casualties, this universal vaccine approach remains a fascinating but highly risky laboratory concept.</p><p><strong>References:</strong></p><ul><li><a href="https://med.stanford.edu/news/all-news/2026/02/universal-vaccine.html">https://med.stanford.edu/news/all-news/2026/02/universal-vaccine.html</a></li><li><a href="http://www.bbc.com/news/articles/cx2g8rz7yedo">http://www.bbc.com/news/articles/cx2g8rz7yedo</a></li><li><a href="https://synapse.patsnap.com/drug/a07a38b7ad0b4c0fbb83f0dd0efb2700">https://synapse.patsnap.com/drug/a07a38b7ad0b4c0fbb83f0dd0efb2700</a></li><li><a href="https://journals.plos.org/plosone/article?id=10.1371%2Fjournal.pone.0051618">https://journals.plos.org/plosone/article?id=10.1371%2Fjournal.pone.0051618</a></li><li><a href="https://www.frontiersin.org/journals/allergy/articles/10.3389/falgy.2025.1633293/full">https://www.frontiersin.org/journals/allergy/articles/10.3389/falgy.2025.1633293/full</a></li><li><a href="https://www.frontiersin.org/journals/immunology/articles/10.3389/fimmu.2020.559382/full">https://www.frontiersin.org/journals/immunology/articles/10.3389/fimmu.2020.559382/full</a></li></ul>]]></content:encoded></item><item><title><![CDATA[Relative Peace to Relative War]]></title><description><![CDATA[<p>I grew up in a time of relative peace in America. My halcyon years as a kid were basically the tail end of the Soviet Union to right before the War on Terror began with 9/11. (Some would call this period the Decade of the Peace Dividend.)</p><p>My parents</p>]]></description><link>https://bc1984.com/relative-peace-to-relative-war/</link><guid isPermaLink="false">698ce1fc0e7cda848203d8cb</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Thu, 12 Feb 2026 02:45:53 GMT</pubDate><media:content url="https://bc1984.com/content/images/2026/02/sow.png" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2026/02/sow.png" alt="Relative Peace to Relative War"><p>I grew up in a time of relative peace in America. My halcyon years as a kid were basically the tail end of the Soviet Union to right before the War on Terror began with 9/11. (Some would call this period the Decade of the Peace Dividend.)</p><p>My parents were pacifist liberals who never talked about war. Although my grandfathers and other relatives served in the military. And my Mom (RIP) was willing to join the Army to help her fund medical school.</p><p>I don&apos;t recall the &quot;Evil Russians&quot; ever being discussed when I was a kid. I didn&apos;t live through the 1970&apos;s Oil Embargo. There were no earth-shattering global events that impacted me directly as a kid. Nothing until 9/11.</p><p>At that point, I was also a pacifist liberal, as that is how I was raised. So I wondered along with my progressive global studies teacher in high school that year how we could reconcile Islam as the &quot;Religion of Peace&quot; with the terrorist attack that took innocent lives on American soil. I had no answer or informed commentary at all at the time to George W. Bush&apos;s decision to enter the Graveyard of Empires &#x2013; Afghanistan &#x2013; to pursue the badies.</p><p>After high school, while volunteering in the countryside in Nicaragua, I recall getting word that Bush was talking about some Weapons of Mass Destruction in Iraq that had supposedly been found. I knew immediately upon hearing this that he planned to go to war in Iraq. I said as much and the three other Americans with me at the time scoffed: &quot;You&apos;re crazy. That&apos;s not what this is about.&quot; But I was just cynical enough at 18 to know with high certainty that this was, indeed, the plan.</p><p>In my first year of college, I attended protests against our involvement in Iraq. I remember during spring break at the airports all the TVs were blaring on about our heroic efforts to dismantle Saddam Hussein&apos;s regime there. There was no solace or peace to be found. The War on Terror was turned up to 11. The Department of Homeland Security, the name of which me and my liberal friends of the day derided as &quot;all too Nazi sounding&quot;, kept the nation on edge with their color-coded alerts. Orange was the only option, it seemed.</p><p>By 2005, it felt like all was well again in the rules-based international order. Nothing perturbed me, at least, in my cozy college navel-gazing environs. I freely wandered barefoot without glasses on contemplating the Tao that cannot be defined, and trying on Buddhism for size, and grappling with Nietzsche and Existentialism, as was fashionable for a modern university hippie to do at the time.</p><p>What loomed ahead was a Global Financial Crisis. Nothing too disturbing for me. Depressing maybe, not the least for my job prospects leaving school into the depths of that deflationary period. But it was not &quot;earth-shattering&quot; in any way. I eventually got my first real job teaching in Turkey in 2009.</p><p>Being there teaching English and Drama and Japanese Club for three years really helped to ground me. There people were more conservative, insular, and religious than I was used to. They were also very kind and caring. This impacted me and guided me towards God slowly, and towards conservatism just a bit. I appreciated Family and Faith and Nation more as concepts. Finally, I was growing up.</p><p>Through an acutely rocky and suffocating relationship and out the other side back home (&quot;stateside&quot;), I found such tantalizing topics as Bitcoin and Libertarianism and Free Markets over which I could obsess. The force of these and my love for technology (I was a dot-com nerd kid, if you recall) pushed me to leave teaching and pursue programming as a path. It was still the quiet days pre-Trump at this time. By mid-2016, I had fully exited teaching and joined tech, to start as a support technician at an Enterprise Server/Systems Integrator/HPC company.</p><p>Trump was really the next exciting thing that happened in the world, from my standpoint. I watched and played around on Reddit and Twitter and saw him trending up and up. I found it hilarious how he mocked the Liberal Rules-Based Order of the Democrats, how he desecrated their Swamp.</p><p>Because I was a Libertarian at the time Trump was coming to prominence, I was not keen on his Trade Policies. The notion that we should put tariffs on Chinese goods was foreign to me. I had actually visited China with a group of teachers in 2015, and found Chinese people markedly friendlier than the Japanese, with whose culture I was much more familiar. I basically had no problem with China on the whole, and favored Free Trade. Looking back now, I find my old bias internally logically consistent with Austrian Economics and Libertarian principles, but perhaps irrational, in that now we find China is a real, tangible threat to American dominance in a number of domains (think rare-earths and critical materials midstream processing and refinement).</p><p>Because I hated Biden and his crew for stealing the 2020 election, and resented him and his OSHA cronies for trying to force experimental vaccines on all the American wage slaves, I was schadenfreude-laden and perhaps perversely overjoyed at Putin upsetting the apple cart of global affairs when he invaded Ukraine. Not that I wanted War. But it is a reality of our world.</p><figure class="kg-card kg-image-card"><img src="https://bc1984.com/content/images/2026/02/osha-vaccine-mandate-1.jpg" class="kg-image" alt="Relative Peace to Relative War" loading="lazy" width="1053" height="283" srcset="https://bc1984.com/content/images/size/w600/2026/02/osha-vaccine-mandate-1.jpg 600w, https://bc1984.com/content/images/size/w1000/2026/02/osha-vaccine-mandate-1.jpg 1000w, https://bc1984.com/content/images/2026/02/osha-vaccine-mandate-1.jpg 1053w" sizes="(min-width: 720px) 720px"></figure><p>At the time, I was about to be banned from seeing large numbers of family members at a reunion because one of my cousins set herself as Karen-Dictator and was going to demand that everyone present their Gene Therapy Guinea Pig card before giving anyone else a hug. For my own reasons then, I was glad to see that Biden-Atlantic consensus shattered, at least momentarily. (The masks were off, quite literally!)</p><p>Now four years on, the Russia-Ukraine War continues. No doubt people on both sides have suffered immensely. This is war. The ugliest of human affairs. I think my parents were glad to not have to talk about war at all for so many decades post-Vietnam (and perhaps were tired of hearing from their parents about WWI and WWII and the Korean War and so on).</p><p>But this is life. Rose-colored glasses don&apos;t stem the tide. Power-mongers gonna power-monger. I was privileged that I never faced violence directly or conscription during my years as a young man. But I see the value in reading and understanding history, examining current trends and events, and preparing for the future.</p><p>Recently, I started listening to School of War, the podcast. It&apos;s been helpful to understand things like the capture of Maduro, past military interventions and military strategy more broadly. For a few years longer (since COVID really), I have been listening to the <a href="https://www.northernminer.com/tag/podcast/">Northern Miner podcast</a> and taking in the explorations there of Resource Nationalism as a theme.</p><p>Notably, I listened to School of War episode #268: &quot;Seth Jones on America&#x2019;s Defense Industrial Crisis&quot;, and then read his book, &quot;The American Edge: The Military Tech Nexus and the Sources of Great Power Dominance&quot;. Jones argues that the United States is on a trajectory toward failure in deterring major adversaries like China, because our Defense Industrial Base operates on a peacetime footing, despite escalating global threats.</p><p>The book demonstrates how the United States, and certain innovative companies, have been critical to industrial production from the 1930&apos;s to today. Examples of traditional defense companies that innovated were Boeing with its B-29 bomber, and Lockheed Skunk Works&apos; development of stealth fighters and other cool jets (U-2 Dragon Lady, SR-71 Blackbird, F-117 Nighthawk). It includes coverage of modern engineers and entrepreneurs in the defense sector that are having an impact today as well, like Elon Musk of SpaceX/Starlink and Palmer Luckey of Anduril. And it provides a good overview of the rise of China as a defense industrial power, concluding that China is fully on a &#x201C;wartime footing&#x201D;.</p><p>One marker of the U.S.&apos;s peacetime footing is low spending on defense as a percentage of GDP. Currently around 3.5% is budgeted, whereas often in wartime spending has ranged between 5-15%.</p><figure class="kg-card kg-image-card"><img src="https://bc1984.com/content/images/2026/02/mil-gdp-csis.jpg" class="kg-image" alt="Relative Peace to Relative War" loading="lazy" width="985" height="718" srcset="https://bc1984.com/content/images/size/w600/2026/02/mil-gdp-csis.jpg 600w, https://bc1984.com/content/images/2026/02/mil-gdp-csis.jpg 985w" sizes="(min-width: 720px) 720px"></figure><p>The younger peacenik libertarian in me would have balked at the implication that we need to spend more on defense and weapons and bombs and fighter jets and drones and the like. Because clearly no one has attacked us. <em>Right?</em></p><figure class="kg-card kg-image-card"><img src="https://bc1984.com/content/images/2026/02/MAPX_USA_path_OF_CHINESE_SPY_BALLOON_2.png" class="kg-image" alt="Relative Peace to Relative War" loading="lazy" width="1200" height="675" srcset="https://bc1984.com/content/images/size/w600/2026/02/MAPX_USA_path_OF_CHINESE_SPY_BALLOON_2.png 600w, https://bc1984.com/content/images/size/w1000/2026/02/MAPX_USA_path_OF_CHINESE_SPY_BALLOON_2.png 1000w, https://bc1984.com/content/images/2026/02/MAPX_USA_path_OF_CHINESE_SPY_BALLOON_2.png 1200w" sizes="(min-width: 720px) 720px"></figure><p>But China and the U.S. are in a Trade War already. And China has threatened (promised) to eventually take Taiwan. And with AI and Chips so vital to our economy we could not afford to lose TSMC in Taiwan or expect to thrive with production of chips suspended for a long time. Samsung and Intel seem unlikely to take the throne and US-based TSMC production is a sliver of what is consumed currently.</p><p>So there may be a &quot;there there&quot; when it comes to all this wartime footing talk.</p><p>The U.S. just recently <a href="https://interestingengineering.com/military/us-army-revives-tnt-production">reauthorized manufacturing of TNT</a> on U.S. soil after four decades of not making any. Odd to think about how America wasn&apos;t making its own TNT... It sounds obvious that you&apos;d want to make your own, or not have your (potential) enemies make 100% of such materiel for you, right? (Congrats to Repkon USA of Graham, Kentucky for winning the contract!)</p><p>Reading <a href="https://substack.com/@ctindale/posts">Craig Tindale&apos;s Substack</a> would have one believe we are on the brink of total catastrophe not having enough <em>scandium</em> for our aluminum-scandium alloys to build military drones, or enough <em>antimony</em> for our munitions, outside of what is produced by China. But what is an individual to do here?</p><p>You could invest in Sumitomo Metals of Japan that makes some few tons of Scandium per year, or Perpetua Resources of Idaho that is reopening an old Antimony mine soon<strong>&#x2122;</strong>, or buy one of the two American public rare earths companies. But these stock bets are like a monkey throwing darts blindfolded. Throw a thousand, and one may hit a bullseye, sure. But what should the real takeaways be for an American reading the Tindale&apos;s and the Seth Jones&apos; of the world?</p><p>To be honest, I am not entirely sure yet. But it helps to write out the precepts, I believe...</p><p><strong><strong>These are the partially-formed concepts, the starting points I have now, that I never could have imagined possessing in my 20&apos;s:</strong></strong></p><ol><li>War is a fact of life. It ebbs and flows over the decades in a given region of the world.</li><li>The Nature of War also shifts over time, adding new dimensions while old approaches remain. See the shift from &apos;maneuver warfare&apos; to &apos;asymmetric warfare&apos; to &apos;cyber/psychological warfare&apos; (5GW).</li><li>It helps to have a balanced perspective about what is possible and what is rational to expect may happen in the course of world events.</li><li>Decisions are not made in a vacuum, but are heavily constrained by the exigencies of the time, as well as the operative cultural and political frameworks of the parties involved. Consider: Why were Atlantic-Consensus types so shocked by Putin&apos;s intrusion into Ukraine? &quot;Was his country not a massive beneficiary of Globalization?&quot; (See: <a href="https://podbay.fm/p/school-of-war/e/1770373800">School of War episode #272</a>: &quot;Beatrice Heuser on Why Leaders Make Bad Decisions&quot;)</li><li><strong>Be prepared.</strong> Balance financial, emotional, relationship and physical health and preparedness. When the volume gets turned way up, consider an Information Diet to quiet the Noise. Find trusted Signals to get critical information without getting overloaded. Control what you can, which is primarily yourself.</li><li>Consider that Nations may at times be charged with a &quot;Duty&quot; to shore up and consolidate resources, control prices and markets, and build industrial defense capacity. This may blunt economic growth and interfere with economic and technical development in other areas for between a few years and upwards of multiple decades.</li><li>Be glad if you don&apos;t live in a Command Economy and enjoy relative Free Speech and Private Property.</li><li>Deterrence is almost universally better than All-Out War. Having America as the world&apos;s greatest Superpower with overwhelming dominance in all key domains can serve to prevent war from breaking out. If China gains much more ground militarily, then the risk of something like a Taiwan invasion increases dramatically.</li><li>The need to build overwhelming wartime ability and capacity does not lessen the need for accountability and oversight, or the need to critically examine U.S. interventions abroad. Might does not make Right. But, with that said, weakness invites attack. So at times it will be necessary to shift to a wartime footing.</li><li>Shifting to a wartime footing entails a lot of cultural and political change, which some are not fit to handle. (They are psychologically fragile, so they won&apos;t handle it well. We should be ready for this too.) <strong>Stay adaptable.</strong></li></ol><hr><p><strong>Additional Resources:</strong></p><ul><li>The Alexander Hamilton Society, <strong>Recalibrating the Defense Industrial Base for Systems Competition</strong>: <a href="https://alexanderhamiltonsociety.org/security-strategy/issue-five/recalibrating-the-defense-industrial-base-for-systems-competition/">https://alexanderhamiltonsociety.org/security-strategy/issue-five/recalibrating-the-defense-industrial-base-for-systems-competition/</a> &#x2013; &quot;Experts estimate that the window to meaningfully transform the defense industrial base may be just three to five years&#x2014;well within potential timelines for heightened tensions over Taiwan.&quot;</li><li>Dangerous Intellectuals, Episode 19: <strong>Deception Detected: Kit Perez on Critical Thinking in Threat-Filled Times</strong>: <a href="https://www.iheart.com/podcast/269-dangerous-intellectuals-th-298835716/episode/episode-19-deception-detected-kit-perez-318118736/">https://www.iheart.com/podcast/269-dangerous-intellectuals-th-298835716/episode/episode-19-deception-detected-kit-perez-318118736/</a></li><li>Dangerous Intellectuals, Episode 20: <strong>Agent X: Ghost in the Machine &#x2013; Decoding the Storm</strong>: <a href="https://www.iheart.com/podcast/269-dangerous-intellectuals-th-298835716/episode/episode-20-agent-x-ghost-in-319378795/">https://www.iheart.com/podcast/269-dangerous-intellectuals-th-298835716/episode/episode-20-agent-x-ghost-in-319378795/</a></li><li>Center for Strategic &amp; International Studies: <strong>Critical Minerals and the Future of the U.S. Economy</strong>: <a href="https://www.csis.org/analysis/critical-minerals-and-future-us-economy">https://www.csis.org/analysis/critical-minerals-and-future-us-economy</a> &#x2013; PDF report: <a href="https://csis-website-prod.s3.amazonaws.com/s3fs-public/2025-02/250210_Baskaran_Critical_Minerals.pdf?VersionId=Tfu2TnNrQGlN7ol8HSCakMUT8HTwYukd">https://csis-website-prod.s3.amazonaws.com/s3fs-public/2025-02/250210_Baskaran_Critical_Minerals.pdf?VersionId=Tfu2TnNrQGlN7ol8HSCakMUT8HTwYukd</a> </li><li>Center for Strategic &amp; International Studies: <strong>Putting the Industrial Base on a Wartime Footing</strong>: <a href="https://www.csis.org/analysis/putting-industrial-base-wartime-footing">https://www.csis.org/analysis/putting-industrial-base-wartime-footing</a></li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://bc1984.com/content/images/2026/02/Risk_BoardGame_Image_Edited.jpg" class="kg-image" alt="Relative Peace to Relative War" loading="lazy" width="1000" height="804" srcset="https://bc1984.com/content/images/size/w600/2026/02/Risk_BoardGame_Image_Edited.jpg 600w, https://bc1984.com/content/images/2026/02/Risk_BoardGame_Image_Edited.jpg 1000w" sizes="(min-width: 720px) 720px"><figcaption>Risk Exists</figcaption></figure>]]></content:encoded></item><item><title><![CDATA[Helter Skelter]]></title><description><![CDATA[<p><code>AI;DR: (AI; Didn&apos;t Read) -- Sometimes life surprises you and a week feels like a decade. This is true in markets and in real life too.</code></p><p><code>The content below was written 95% by ChatGPT 5.2 Thinking.</code></p><p><code>ORIGINAL PROMPT: Discuss real life examples of Heteroskedasticity as observed</code></p>]]></description><link>https://bc1984.com/helter-skedastic/</link><guid isPermaLink="false">6971212a0e7cda848203d821</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Wed, 21 Jan 2026 19:24:33 GMT</pubDate><media:content url="https://bc1984.com/content/images/2026/01/htst.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2026/01/htst.jpg" alt="Helter Skelter"><p><code>AI;DR: (AI; Didn&apos;t Read) -- Sometimes life surprises you and a week feels like a decade. This is true in markets and in real life too.</code></p><p><code>The content below was written 95% by ChatGPT 5.2 Thinking.</code></p><p><code>ORIGINAL PROMPT: Discuss real life examples of Heteroskedasticity as observed in markets, episodes of &quot;High Vol-of-Vol&quot; and how various asset classes performed during those periods. End with application to other areas of life, considering Lenin&apos;s famous line &quot;There are decades where nothing happens and weeks where decades happen.&quot;</code></p><p><code>INSPIRED BY: &quot;Volatility is not constant over a year&quot; concept from &quot;Nvidia Stock Crash Prediction&quot;: <a href="https://entropicthoughts.com/nvidia-stock-crash-prediction">entropicthoughts.com/nvidia-stock-crash-prediction</a></code> &#xA0;</p><hr><p><strong><em>Heteroskedasticity</em></strong> is the statistical name for a simple market truth: The size of tomorrow&#x2019;s move depends on what today feels like. In calm regimes, returns arrive in small, fairly even increments; in stressed regimes, the distribution &#x201C;breathes,&#x201D; with fat tails, bigger gaps, and volatility that clusters. Markets are not merely noisy &#x2013; they are <em>unevenly</em> noisy, and the variance itself behaves like a state variable.</p><h2 id="real-life-examples-of-heteroskedasticity-in-markets">Real-life Examples of Heteroskedasticity in Markets</h2><p>The most familiar example is equities. Daily stock-index returns are not independent draws from a fixed-variance process; they arrive in bursts. After a surprise macro print, a policy shock, or a liquidity event, large moves tend to be followed by large moves (of either sign), while tranquil periods can persist for weeks. This is heteroskedasticity as lived experience: &#x201C;Quiet&#x201D; days are informative because they often beget more quiet, and &#x201C;loud&#x201D; days rarely come alone.</p><p>FX shows the same pattern, but often around discrete catalysts: Central-bank decisions, pegs breaking, elections, or sudden terms-of-trade shifts. A currency can trade in a narrow band for months, then reprice violently in a few sessions &#x2013; variance that is conditional on regime.</p><p>Rates markets are a particularly clean laboratory. When inflation expectations are anchored and central-bank reaction functions are well understood, yields drift with modest day-to-day changes; when the path of policy becomes uncertain (or the term premium is reawakened), realized volatility jumps and stays elevated. Credit spreads are similarly heteroskedastic: Tight spreads and low dispersion can persist, but once defaults, downgrades, or funding stress re-enter the conversation, spread volatility and correlation across issuers rise sharply.</p><h2 id="%E2%80%9Chigh-vol-of-vol%E2%80%9D-episodes-when-uncertainty-about-uncertainty-spikes">&#x201C;High Vol-of-Vol&#x201D; Episodes: When Uncertainty about Uncertainty Spikes</h2><p>Volatility itself is tradable (options), so markets also reveal a second layer: Volatility of volatility &#x2013; how unstable implied volatility is from day to day. Traders often proxy this in equities with the VIX (level of implied vol) and measures like VVIX (vol-of-vol). &#x201C;High vol-of-vol&#x201D; tends to appear when investors cannot even agree on the <em>distribution</em> of outcomes &#x2013; only that it is unstable &#x2013; so option prices and skews reprice repeatedly.</p><h3 id="2008%E2%80%932009-deleveraging-and-balance-sheet-stress">2008&#x2013;2009: Deleveraging and balance-sheet stress</h3><p>The Great Financial Crisis was a canonical high-vol-of-vol regime. Equity volatility stayed high and whipped around as policy interventions alternated between reassurance and fresh concern. Cross-asset correlations surged: Diversification benefits that looked reliable in backtests weakened right when they were most needed.</p><p><strong>Typical performance pattern:</strong> Equities and credit sold off hard; high-yield underperformed investment-grade; funding-sensitive strategies (levered carry, relative value) struggled; high-quality government bonds often rallied as a safe haven and as expectations of growth collapsed; the dollar tended to strengthen in global stress (via funding demand), while commodities generally weakened with growth fears.</p><h3 id="august-2011-and-other-%E2%80%9Cpolicy-credibility%E2%80%9D-scares">August 2011 and other &#x201C;policy credibility&#x201D; scares</h3><p>When the market&#x2019;s question is &#x201C;Who is in control? Politicians, central banks or the tape?&#x201D;, implied vol can jump and then reprice repeatedly as headlines arrive. Here, vol-of-vol isn&#x2019;t just about bad outcomes; it&#x2019;s about <em>shifting narratives</em> and discontinuous probability updates.</p><p>In August 2011, markets were rocked by the U.S. debt-ceiling standoff (all-too familiar at this point, no?) and the August 5, 2011 S&amp;P downgrade of U.S. sovereign credit, alongside escalating Eurozone sovereign-debt fears, which together triggered a sharp global equity selloff and a surge in volatility. Despite the downgrade, investors largely fled into U.S. Treasuries and other &#x201C;safe&#x201D; assets as risk appetite collapsed.</p><p><strong>Typical performance pattern:</strong> Risk assets wobble; defensives outperform cyclicals; quality and liquidity command a premium; government bonds and reserve currencies often benefit, though the exact winners depend on who is perceived as the credible safe haven.</p><h3 id="february-2018-volatility-products-and-mechanical-feedback">February 2018: Volatility products and mechanical feedback</h3><p>A more technical episode: Volatility rose and then <em>volatility of volatility</em> rose as systematic strategies and short-vol structures were forced to adjust. The key feature wasn&#x2019;t only fundamentals but market microstructure &#x2013; positioning, convexity, and gamma effects.</p><p><strong>Typical performance pattern:</strong> Sharp equity drawdown in a short window; implied vol spikes; strategies short convexity (short options, certain risk-parity implementations under stress) face abrupt losses; high-quality bonds can help if the shock is not simultaneously inflationary.</p><h3 id="march-2020-%E2%80%9Ceverything-all-at-once%E2%80%9D-plus-liquidity-fractures">March 2020: &#x201C;Everything all at once,&#x201D; plus liquidity fractures</h3><p>This was a high-vol-of-vol moment where both fundamentals (pandemic uncertainty) and plumbing (liquidity, margin, funding) mattered. Investors repriced growth, default risk, and correlation assumptions almost daily.</p><p><strong>Typical performance pattern:</strong> Equities fell quickly; credit spreads widened dramatically; some safe havens worked (high-quality sovereign duration ultimately helped), but there were intervals where &#x201C;dash for cash&#x201D; dynamics caused unusual co-moves; gold and the dollar displayed stress-driven behavior rather than a single, tidy narrative; commodities tied to mobility and growth were hit especially hard.</p><h3 id="2022-inflation-uncertainty-and-rates-volatility-as-the-%E2%80%9Ccenter-of-gravity%E2%80%9D">2022: Inflation uncertainty and rates volatility as the &#x201C;center of gravity&#x201D;</h3><p>When inflation is the primary uncertainty, rates volatility can become the engine that drives everything else. In that environment, the classic stock&#x2013;bond diversification can fail because rising yields are not a &#x201C;growth shock hedge&#x201D; but the shock itself.</p><p><strong>Typical performance pattern:</strong> Both equities and longer-duration bonds can decline together; credit suffers from both widening spreads and higher discount rates; the dollar can be strong; commodities may outperform if they are part of the inflation impulse, though dispersion across commodities can be huge.</p><h2 id="what-high-vol-of-vol-teaches-us-about-asset-class-behavior">What High Vol-of-Vol Teaches Us about Asset-Class Behavior</h2><p>Across these episodes, a few recurring truths show up:</p><p><strong>Correlation is conditional.</strong> In tranquil periods, asset classes appear diversifying; in stress, correlations often rise because the shared factor becomes liquidity and risk appetite, not idiosyncratic fundamentals.</p><p><strong>Convexity is expensive for a reason.</strong> Options feel &#x201C;overpriced&#x201D; right up until they don&#x2019;t. High vol-of-vol is the market&#x2019;s reminder that protection is not about predicting the event; it&#x2019;s about surviving the regime shift.</p><p><strong>Liquidity is an asset class.</strong> During high vol-of-vol, instruments that trade continuously with deep markets (cash, on-the-run sovereigns) gain a premium relative to less liquid credit, small caps, certain EM exposures, and complex structured products.</p><p><strong>The driver matters: growth shock vs inflation shock vs plumbing shock.</strong> A growth scare often helps duration; an inflation scare can hurt it; a funding/liquidity shock can temporarily distort everything.</p><h2 id="application-beyond-markets-why-there-are-weeks-where-decades-happen%E2%80%9D">Application Beyond Markets: Why There Are &quot;Weeks Where Decades Happen&#x201D;</h2><p>Lenin&apos;s famous line &quot;There are decades where nothing happens and weeks where decades happen&quot; is essentially heteroskedasticity in human time. Most weeks are low-variance: Routines dominate, surprises are small, memory compresses. Then a high-variance week arrives &#x2013; a health scare, a breakup, a layoff, a move, a crisis &#x2013; and the &#x201C;variance of outcomes&#x201D; expands. Decision-making becomes more fragile, second-order uncertainty rises (&#x201C;I don&#x2019;t even know what next week looks like&#x201D;), and you experience something like personal vol-of-vol: not just intense events, but rapidly changing expectations about what is possible.</p><p>The practical takeaway mirrors risk management. In calm periods, build slack, skills and resilience: Sleep, savings, relationships, accuracy, fitness, etc. Calm itself does not cause storms, but it is the only time you can cheaply prepare for them. And in the storm weeks, judge yourself by your robustness rather than optimization: Smaller plans, shorter horizons, fewer irreversible decisions. Markets call it surviving a regime shift; life calls it getting through a <em>decade-long week</em>.</p><p><strong>Remember: Perfection is the enemy of the Good.</strong></p>]]></content:encoded></item><item><title><![CDATA[IS GLD THE BEST SPY?]]></title><description><![CDATA[<p>From the dotcom peak in 2000 to today, the price of the S&amp;P 500 index has risen on average 5.9% per year.</p><p>With dividends reinvested, e.g. via the <strong>SPY</strong> ETF, the total return increases to <strong>8.41%</strong> CAGR.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://bc1984.com/content/images/2026/01/spy-returns-26.jpg" class="kg-image" alt loading="lazy" width="763" height="766" srcset="https://bc1984.com/content/images/size/w600/2026/01/spy-returns-26.jpg 600w, https://bc1984.com/content/images/2026/01/spy-returns-26.jpg 763w" sizes="(min-width: 720px) 720px"><figcaption>via: <a href="https://dqydj.com/etf-return-calculator/?ticker=SPY">https://dqydj.com/etf-return-calculator/?ticker=SPY</a></figcaption></figure><p>This</p>]]></description><link>https://bc1984.com/is-gld-the-best-spy/</link><guid isPermaLink="false">696658ef0e7cda848203d71b</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Tue, 13 Jan 2026 15:52:17 GMT</pubDate><media:content url="https://bc1984.com/content/images/2026/01/spyspy26.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2026/01/spyspy26.jpg" alt="IS GLD THE BEST SPY?"><p>From the dotcom peak in 2000 to today, the price of the S&amp;P 500 index has risen on average 5.9% per year.</p><p>With dividends reinvested, e.g. via the <strong>SPY</strong> ETF, the total return increases to <strong>8.41%</strong> CAGR.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://bc1984.com/content/images/2026/01/spy-returns-26.jpg" class="kg-image" alt="IS GLD THE BEST SPY?" loading="lazy" width="763" height="766" srcset="https://bc1984.com/content/images/size/w600/2026/01/spy-returns-26.jpg 600w, https://bc1984.com/content/images/2026/01/spy-returns-26.jpg 763w" sizes="(min-width: 720px) 720px"><figcaption>via: <a href="https://dqydj.com/etf-return-calculator/?ticker=SPY">https://dqydj.com/etf-return-calculator/?ticker=SPY</a></figcaption></figure><p>This is a great return, despite starting at a then &quot;exuberant&quot; peak. Especially considering that the M2 money supply has grown by <strong>6.2%</strong> per year over that same period of time.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://bc1984.com/content/images/2026/01/m2-26.jpg" class="kg-image" alt="IS GLD THE BEST SPY?" loading="lazy" width="1050" height="557" srcset="https://bc1984.com/content/images/size/w600/2026/01/m2-26.jpg 600w, https://bc1984.com/content/images/size/w1000/2026/01/m2-26.jpg 1000w, https://bc1984.com/content/images/2026/01/m2-26.jpg 1050w" sizes="(min-width: 720px) 720px"><figcaption>via: <a href="https://fred.stlouisfed.org/series/M2SL#">https://fred.stlouisfed.org/series/M2SL#</a></figcaption></figure><p>Subtracting the CAGR of M2 over that period of time, we can derive a type of &quot;Real Return&quot; for the SPY ETF (with dividends reinvested, of course). We simply subtract from our 8.41% the 6.2% average growth in M2 per year, in order to end up at our Real CAGR of <strong>2.21%</strong> for SPY.</p><p>But how does that compare to gold? We could use GLD (or PHYS) nowadays, but these ETFs didn&apos;t exist back at the turn of the Millenium. However if you held physical gold from the dotcom peak in 2000 to today in January, 2026, you would have earned a total return of <strong>10.78%</strong> CAGR. &#xA0;</p><p>Subtracting out the M2 money supply growth, your Real CAGR in gold was <strong>4.58%</strong>!</p><p>So is GLD the best SPY? That is to say, does GLD best SPY? Over the last 26 years, it did, indeed. </p><p>Of course this doesn&apos;t tell us what will happen over the next 26 years. It says a lot about monetary metals, but it really says more about how anemic real growth has been in American Public Equities. Think about it. All that innovation that we&apos;ve seen. Cell phones, the internet, smart phones, computers getting faster and more affordable, commodity off the shelf servers taking over from mainframes, software development changes, huge growth in open source software, and now large language models and other machine learning breakthroughs. A lot has changed. But to be honest, I would have expected more than 2.2% real growth for all that work. <em>It&apos;s almost as if stocks </em>were<em> the economy, and we had to keep printing massive amounts of money to keep them going up... (Can&apos;t be, can it?)</em></p><p>In the meantime, if you just sat on your pile of shiny yellow metal, you&apos;d have outperformed all of this by more than 2X!</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://bc1984.com/content/images/2026/01/smaug26.jpg" class="kg-image" alt="IS GLD THE BEST SPY?" loading="lazy" width="615" height="789" srcset="https://bc1984.com/content/images/size/w600/2026/01/smaug26.jpg 600w, https://bc1984.com/content/images/2026/01/smaug26.jpg 615w"><figcaption>&quot;In which Smaug beats the pants off of SPY in his sleep...&quot;</figcaption></figure><p>These days I believe less and less in the miraculous breakthroughs that we&apos;ve been promised are just around the corner. I doubt we will invent Artificial General Intelligence that makes humans obsolete, or Cryptographically Relevant Quantum Computers that can break widely used public-key encryption by running algorithms like Shor&apos;s at scale.</p><p>Both of these types of problems require orders of magnitude better technology and engineering, and multiple breakthroughs.</p><p>For AGI, it&apos;s things like improvements in training/inference/energy efficiency, and the development of durable memory with stable performance over long tasks for LLMs (e.g. into days and weeks). We don&apos;t just need a better model to get to the point where an &quot;AGI&quot; could become an expert in and soon dominate major fields like manufacturing, R&amp;D, coding and defense all together. It would require a new paradigm of reliable closed-loop autonomy. As fast as LLMs and MCPs and tooling around these things has improved, it doesn&apos;t approximate Artificial <em>General</em> Intelligence that is truly and independently <em>Smart</em>. </p><p>For Quantum Computing, we&apos;ll need to move from a paradigm of &#x201C;many noisy qubits&#x201D; to one of many reliable logical qubits. We&apos;ll need to reduce error correction overhead by orders of magnitude. Then we&apos;ll need to overcome crosstalk, correlated noise, leakage, and parameter drift, i.e. &#x201C;death by a thousand cuts&#x201D; failure modes, in order to scale the systems sufficiently enough to matter. And don&apos;t forget about the control stack, which needs to scale and improve: RF/microwave lines, DAC/ADC, filtering, amplification, shielding, synchronization. And finally there&apos;s the industrial problem of repeatedly fabricating the millions of components needed with very tight tolerances. Basically, we need unprecedented process control and automation. So that&apos;s probably more than 26 years away.</p><p>But I am sure both of these fields will be pursued and funded and hyped relentlessly over this next quarter century. You might even find profitable work in one of these areas. But to say that you are going to become rich investing in the companies that are grinding away spending billions and trillions trying desperately to bend or break real physical and economic laws of the universe sounds foolhardy. You might do well. But maybe you should hold some gold and silver just in case...</p><p>After all, just as there is no guarantee of precious metals&apos; continued outperformance, there is no guarantee that the Top 500 Public Companies stock index continues to outpace the expansion of the money supply. </p><p>If you were entering markets today and had the choice of any set of ETFs, but had to lock in your choice for the next 25 years, I would tell you to go 50/50 into SPY and PHYS (Sprott&apos;s Physical Gold Trust ETF).</p><p>Half US Large Cap Stocks, Half Gold. <strong><em>It&apos;s elementary, my dear Watson!</em></strong></p><hr><p><strong>Good Luck!</strong></p>]]></content:encoded></item><item><title><![CDATA[THE UNIVERSE IS REAL]]></title><description><![CDATA[<h2 id="ubco-study-debunks-the-idea-that-the-universe-is-a-computer-simulation">UBCO study debunks the idea that the universe is a computer simulation</h2><p><strong>Patty Wellborn &#x2013; October 30, 2025</strong><br><code>Original Article: <a href="https://news.ok.ubc.ca/2025/10/30/ubco-study-debunks-the-idea-that-the-universe-is-a-computer-simulation/">https://news.ok.ubc.ca/2025/10/30/ubco-study-debunks-the-idea-that-the-universe-is-a-computer-simulation</a></code></p><blockquote>New study uses logic and physics to definitively answer one of science&apos;s biggest questions</blockquote><p>In the film <em>The Matrix</em></p>]]></description><link>https://bc1984.com/the-universe-is-real/</link><guid isPermaLink="false">6965756a0e7cda848203d6c7</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Mon, 12 Jan 2026 22:51:38 GMT</pubDate><media:content url="https://bc1984.com/content/images/2026/01/maxresdefault--1-.jpg" medium="image"/><content:encoded><![CDATA[<h2 id="ubco-study-debunks-the-idea-that-the-universe-is-a-computer-simulation">UBCO study debunks the idea that the universe is a computer simulation</h2><img src="https://bc1984.com/content/images/2026/01/maxresdefault--1-.jpg" alt="THE UNIVERSE IS REAL"><p><strong>Patty Wellborn &#x2013; October 30, 2025</strong><br><code>Original Article: <a href="https://news.ok.ubc.ca/2025/10/30/ubco-study-debunks-the-idea-that-the-universe-is-a-computer-simulation/">https://news.ok.ubc.ca/2025/10/30/ubco-study-debunks-the-idea-that-the-universe-is-a-computer-simulation</a></code></p><blockquote>New study uses logic and physics to definitively answer one of science&apos;s biggest questions</blockquote><p>In the film <em>The Matrix</em>, about a computer-simulated world, the red and blue pills symbolize a choice the hero must make between illusion and the truth of reality.</p><p>It&#x2019;s a plot device beloved by science fiction: our entire universe might be a simulation running on some advanced civilization&#x2019;s supercomputer.</p><p>But new research from UBC Okanagan has mathematically proven this isn&#x2019;t just unlikely&#x2014;it&#x2019;s impossible.</p><p>Dr. Mir Faizal, Adjunct Professor with UBC Okanagan&#x2019;s <a href="https://science.ok.ubc.ca/">Irving K. Barber Faculty of Science</a>, and his international colleagues, Drs. Lawrence M. Krauss, Arshid Shabir and Francesco Marino have shown that the fundamental nature of reality operates in a way that no computer could ever simulate.</p><p>Their findings, published in the <a href="https://arxiv.org/abs/2507.22950">Journal of Holography Applications in Physics</a>, go beyond simply suggesting that we&#x2019;re not living in a simulated world like The Matrix. They prove something far more profound: the universe is built on a type of understanding that exists beyond the reach of any algorithm.</p><p>&#x201C;It has been suggested that the universe could be simulated. If such a simulation were possible, the simulated universe could itself give rise to life, which in turn might create its own simulation. This recursive possibility makes it seem highly unlikely that our universe is the original one, rather than a simulation nested within another simulation,&#x201D; says Dr. Faizal. &#x201C;This idea was once thought to lie beyond the reach of scientific inquiry. However, our recent research has demonstrated that it can, in fact, be scientifically addressed.&#x201D;</p><p>The research hinges on a fascinating property of reality itself. Modern physics has moved far beyond Newton&#x2019;s tangible &#x201C;stuff&#x201D; bouncing around in space. Einstein&#x2019;s theory of relativity replaced Newtonian mechanics. Quantum mechanics transformed our understanding again. Today&#x2019;s cutting-edge theory&#x2014;quantum gravity&#x2014;suggests that even space and time aren&#x2019;t fundamental. They emerge from something deeper: pure information.</p><p>This information exists in what physicists call a Platonic realm&#x2014;a mathematical foundation more real than the physical universe we experience. It&#x2019;s from this realm that space and time themselves emerge.</p><figure class="kg-card kg-image-card"><img src="https://bc1984.com/content/images/2026/01/plato-s-forms.jpg" class="kg-image" alt="THE UNIVERSE IS REAL" loading="lazy" width="578" height="578"></figure><p>Here&#x2019;s where it gets interesting. The team demonstrated that even this information-based foundation cannot fully describe reality using computation alone. They used powerful mathematical theorems&#x2014;including G&#xF6;del&#x2019;s incompleteness theorem&#x2014;to prove that a complete and consistent description of everything requires what they call &#x201C;non-algorithmic understanding.&#x201D;</p><p>Think of it this way. A computer follows recipes, step by step, no matter how complex. But some truths can only be grasped through non-algorithmic understanding&#x2014;understanding that doesn&#x2019;t follow from any sequence of logical steps. These &#x201C;G&#xF6;delian truths&#x201D; are real, yet impossible to prove through computation.</p><figure class="kg-card kg-image-card"><img src="https://bc1984.com/content/images/2026/01/g-del-s-incompleteness-theorem-l.jpg" class="kg-image" alt="THE UNIVERSE IS REAL" loading="lazy" width="1024" height="768" srcset="https://bc1984.com/content/images/size/w600/2026/01/g-del-s-incompleteness-theorem-l.jpg 600w, https://bc1984.com/content/images/size/w1000/2026/01/g-del-s-incompleteness-theorem-l.jpg 1000w, https://bc1984.com/content/images/2026/01/g-del-s-incompleteness-theorem-l.jpg 1024w" sizes="(min-width: 720px) 720px"></figure><p>Here&#x2019;s a basic example using the statement, &#x201C;This true statement is not provable.&#x201D; If it were provable, it would be false, making logic inconsistent. If it&#x2019;s not provable, then it&#x2019;s true, but that makes any system trying to prove it incomplete. Either way, pure computation fails.</p><p>&#x201C;We have demonstrated that it is impossible to describe all aspects of physical reality using a computational theory of quantum gravity,&#x201D; says Dr. Faizal. &#x201C;Therefore, no physically complete and consistent theory of everything can be derived from computation alone. Rather, it requires a non-algorithmic understanding, which is more fundamental than the computational laws of quantum gravity and therefore more fundamental than spacetime itself.&#x201D;</p><p>Since the computational rules in the Platonic realm could, in principle, resemble those of a computer simulation, couldn&#x2019;t that realm itself be simulated?</p><p>No, say the researchers. Their work reveals something deeper.</p><p>&#x201C;Drawing on mathematical theorems related to incompleteness and indefinability, we demonstrate that a fully consistent and complete description of reality cannot be achieved through computation alone,&#x201D; Dr. Faizal explains. &#x201C;It requires non-algorithmic understanding, which by definition is beyond algorithmic computation and therefore cannot be simulated. Hence, this universe cannot be a simulation.&#x201D;</p><p>Co-author Dr. Lawrence M. Krauss says this research has profound implications.</p><p>&#x201C;The fundamental laws of physics cannot be contained within space and time, because they generate them. It has long been hoped, however, that a truly fundamental theory of everything could eventually describe all physical phenomena through computations grounded in these laws. Yet we have demonstrated that this is not possible. A complete and consistent description of reality requires something deeper&#x2014;a form of understanding known as non-algorithmic understanding.&#x201D;</p><figure class="kg-card kg-image-card"><img src="https://bc1984.com/content/images/2026/01/plato_1_orig.jpg" class="kg-image" alt="THE UNIVERSE IS REAL" loading="lazy" width="400" height="390"></figure><p>The team&#x2019;s conclusion is clear and marks an important scientific achievement, says Dr. Faizal.</p><p>&#x201C;Any simulation is inherently algorithmic&#x2014;it must follow programmed rules,&#x201D; he says. &#x201C;But since the fundamental level of reality is based on non-algorithmic understanding, the universe cannot be, and could never be, a simulation.&#x201D;</p><p>The simulation hypothesis was long considered untestable, relegated to philosophy and even science fiction, rather than science. This research brings it firmly into the domain of mathematics and physics, and provides a definitive answer.</p><p><strong>SOURCE:</strong></p><ul><li>The University of British Columbia, Okanagan Campus: <a href="https://news.ok.ubc.ca/2025/10/30/ubco-study-debunks-the-idea-that-the-universe-is-a-computer-simulation/">https://news.ok.ubc.ca/2025/10/30/ubco-study-debunks-the-idea-that-the-universe-is-a-computer-simulation/</a></li></ul><hr><h1 id="original-study-consequences-of-undecidability-in-physics-on-the-theory-of-everything">Original Study: Consequences of Undecidability in Physics on the Theory of Everything</h1><p><strong>July 29, 2025</strong><br><strong>Mir Faizal, Lawrence M. Krauss, Arshid Shabir, Francesco Marino</strong></p><h3 id="abstract">ABSTRACT</h3><p>General relativity treats spacetime as dynamical and exhibits its breakdown at singularities. This failure is interpreted as evidence that quantum gravity is not a theory formulated within spacetime; instead, it must explain the very emergence of spacetime from deeper quantum degrees of freedom, thereby resolving singularities. Quantum gravity is therefore envisaged as an axiomatic structure, and algorithmic calculations acting on these axioms are expected to generate spacetime. However, G&#xF6;del&apos;s incompleteness theorems, Tarski&apos;s undefinability theorem, and Chaitin&apos;s information-theoretic incompleteness establish intrinsic limits on any such algorithmic programme. Together, these results imply that a wholly algorithmic &quot;Theory of Everything&quot; is impossible: certain facets of reality will remain computationally undecidable and can be accessed only through non-algorithmic understanding. We formalize this by constructing a &quot;Meta-Theory of Everything&quot; grounded in non-algorithmic understanding, showing how it can account for undecidable phenomena and demonstrating that the breakdown of computational descriptions of nature does not entail a breakdown of science. Because any putative simulation of the universe would itself be algorithmic, this framework also implies that the universe cannot be a simulation.</p><p><strong>SOURCE: Consequences of Undecidability in Physics on the Theory of Everything</strong></p><ul><li><strong>HTML: <a href="https://arxiv.org/html/2507.22950v1">https://arxiv.org/html/2507.22950v1</a></strong></li><li><strong>Abstract: <a href="https://arxiv.org/abs/2507.22950">https://arxiv.org/abs/2507.22950</a></strong></li></ul><hr><h2 id="full-text">FULL TEXT</h2><p><strong><strong>Abstract</strong></strong></p><p>General relativity treats spacetime as dynamical and exhibits its breakdown at singularities. This failure is interpreted as evidence that quantum gravity is not a theory formulated within spacetime; instead, it must explain the very emergence of spacetime from deeper quantum degrees of freedom, thereby resolving singularities. Quantum gravity is therefore envisaged as an axiomatic structure, and algorithmic calculations acting on these axioms are expected to generate spacetime. However, G&#xF6;del&#x2019;s incompleteness theorems, Tarski&#x2019;s undefinability theorem, and Chaitin&#x2019;s information-theoretic incompleteness establish intrinsic limits on any such algorithmic programme. Together, these results imply that a wholly algorithmic &#x201C;Theory of Everything&#x201D; is impossible: certain facets of reality will remain computationally undecidable and can be accessed only through non-algorithmic understanding. We formalize this by constructing a &#x201C;Meta-Theory of Everything&#x201D; grounded in non-algorithmic understanding, showing how it can account for undecidable phenomena and demonstrating that the breakdown of computational descriptions of nature does not entail a breakdown of science. Because any putative simulation of the universe would itself be algorithmic, this framework also implies that the universe cannot be a simulation.</p><p>Physics has journeyed from classical tangible &#x201C;stuff&#x201D; to ever deeper layers of abstraction. In Newtonian mechanics reality consists of point-like masses tracing deterministic trajectories in an immutable Euclidean space with a universal time parameter <a href="https://arxiv.org/html/2507.22950v1#bib.bib1">Landau1976</a>. This picture sufficed for celestial mechanics and terrestrial dynamics, yet its very foundations, including the separability of space and time and the notion of absolute simultaneity, were overturned by Einstein&#x2019;s special relativity. By welding space and time into a single Lorentzian continuum, special relativity replaced Newton&#x2019;s rigid arena with an observer-dependent spacetime geometry whose interval, not time or space separately, is invariant <a href="https://arxiv.org/html/2507.22950v1#bib.bib2">Rindler1977</a>.</p><p>Quantum mechanics introduced a second conceptual revolution: even with a fixed spacetime backdrop, the microscopic world resists classical deterministic descriptions. Wave functions evolve unitarily, but measurement outcomes are inherently probabilistic, encoded in the Born rule and constrained by complementarity and uncertainty principles <a href="https://arxiv.org/html/2507.22950v1#bib.bib3">Sakurai2017</a>. When the relativistic requirement of locality is imposed on quantum theory, particles cease to be fundamental. Instead, quantum field theory (QFT) elevates fields to primary status; &#x201C;particles&#x201D; emerge from those fields via creation and annihilation operators acting on the vacuum state <a href="https://arxiv.org/html/2507.22950v1#bib.bib4">Srednicki2007</a>. Here the vacuum is itself a seething medium. Time-dependent boundary conditions in superconducting wave-guides emulate moving mirrors and catalyse the dynamical Casimir effect, producing real particles from vacuum fluctuations <a href="https://arxiv.org/html/2507.22950v1#bib.bib5">Wilson2011</a>. Likewise, an accelerated observer perceives the Minkowski vacuum as a thermal bath via the so-called the Unruh effect, emphasizing that particle content is observer-dependent rather than absolute <a href="https://arxiv.org/html/2507.22950v1#bib.bib6">Crispino2008</a>. These phenomena confirm QFT: what we call a particle is contingent on both the quantum state of quantum fields and even the kinematics of the detector. Thus, particles moving in spacetime become a contingent structure, yet spacetime remains fundamental and fixed.</p><p>All these theories presuppose a fixed background spacetime. General relativity (GR), by contrast, is a theory of spacetime itself. It accurately describes phenomena from Mercury&#x2019;s perihelion precession to the direct detection of gravitational waves <a href="https://arxiv.org/html/2507.22950v1#bib.bib7">Einstein1915</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib8">Abbott2016</a>. Nevertheless, GR predicts curvature singularities at the center of black holes and at the big bang, where the spacetime description of reality breaks down <a href="https://arxiv.org/html/2507.22950v1#bib.bib9">Penrose1965</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib10">Hawking1970</a>. Singular behavior of this sort is not unique to gravity; it signals the breakdown of any effective model once its underlying degrees of freedom are pushed beyond their domain of validity <a href="https://arxiv.org/html/2507.22950v1#bib.bib11">Arnold92</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib12">Berry2023</a>. Classical fluid discontinuities, for example, correspond to curvature singularities of an acoustic metric and are smoothed out in a full quantum-hydrodynamic treatment <a href="https://arxiv.org/html/2507.22950v1#bib.bib13">Faccio2016</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib14">Braunstein:2023jpo</a>.</p><p>Thus, it is expected that curvature singularities in GR will also be removed in a full quantum theory of gravity. These singularities do not indicate a breakdown of physics, but the breakdown of a spacetime description of nature. Instead, it is presumed the physics of a quantum theory of gravity will not break down, even in such extreme conditions. Candidate quantum gravity frameworks likewise remove curvature singularities. Loop quantum cosmology replaces the big bang singularity with a big bounce <a href="https://arxiv.org/html/2507.22950v1#bib.bib15">Bojowald2001</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib16">Ashtekar2006</a>, while the fuzzball paradigm in string theory substitutes extended microstate geometries for point-like singularity at the center of black holes <a href="https://arxiv.org/html/2507.22950v1#bib.bib17">Mathur2005</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib18">Mathur2008</a>. More broadly, both loop quantum gravity and string theory depict spacetime as emergent: spin-foam models build it from discrete quantum structures <a href="https://arxiv.org/html/2507.22950v1#bib.bib19">Perez2013</a>, and the doubled-geometry formalism of double field theory introduces T-folds whose transition functions involve T-duality rather than ordinary diffeomorphisms, showing that classical spacetime may fail to be well defined at some points <a href="https://arxiv.org/html/2507.22950v1#bib.bib20">Hohm2010</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib21">Hull2005</a>.</p><p>These insights resonate with Wheeler&#x2019;s &#x201C;it from bit&#x201D; programme and its modern versions in both string theory <a href="https://arxiv.org/html/2507.22950v1#bib.bib22">Jafferis:2022crx</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib23">VanRaamsdonk:2020ydg</a> and loop quantum gravity <a href="https://arxiv.org/html/2507.22950v1#bib.bib24">Makela:2019vgf</a>, which propose that information is more fundamental than physical reality consisting of spacetime and quantum fields defined on it <a href="https://arxiv.org/html/2507.22950v1#bib.bib25">Wheeler1990</a>. Singularities in classical models then mark precisely those regions where the informational degrees of freedom can no longer be captured by a spacetime geometry. Although the emergent &#x201C;it&#x201D; spacetime with its quantum fields fails at singularities, one might hope that the underlying &#x201C;bit&#x201D;, a complete quantum-gravity theory, could be formulated as a consistent, computable &#x201C;theory of everything.&#x201D; However, we now argue that that such a purely algorithmic formulation is unattainable.</p><p>As we do not have a fully consistent theory of quantum gravity, several different axiomatic systems have been proposed to model quantum gravity <a href="https://arxiv.org/html/2507.22950v1#bib.bib26">Witten:1985cc</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib27">Ziaeepour:2021ubo</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib28">Faizal2024</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib29">bombelli1987spacetime</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib30">Majid:2017bul</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib31">DAriano:2016njq</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib32">Arsiwalla:2021eao</a>. In all these programs, it is assumed a candidate theory of quantum gravity is encoded as a computational formal system</p><!--kg-card-begin: html--><table class="ltx_equation ltx_eqn_table" id="S0.E1" style="box-sizing: border-box; caption-side: bottom; border-collapse: collapse; width: 832px; margin: 0.65rem auto; display: table;"><tbody style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px;"><tr class="ltx_equation ltx_eqn_row ltx_align_baseline" style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px; vertical-align: baseline; display: table-row;"><td class="ltx_eqn_cell ltx_eqn_center_padleft" style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px; width: 306.75px; padding: 0.3rem 0.2rem; display: table-cell; min-width: 2em;"></td><td class="ltx_eqn_cell ltx_align_center" style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px; text-align: center; width: auto; padding: 0.3rem 0.2rem; display: table-cell;"><math alttext="{\;\mathcal{F}_{QG}\;=\;\{\mathcal{L}_{QG},\Sigma_{QG},\mathcal{R}_{\mathrm{alg}}\}\;}." class="ltx_Math" display="block" id="S0.E1.m1"><semantics><mrow><mrow><msub><mi class="ltx_font_mathcaligraphic">&#x2131;</mi><mrow><mi>Q</mi><mo lspace="0em" rspace="0em">&#x200B;</mo><mi>G</mi></mrow></msub><mo lspace="0.558em" rspace="0.558em">=</mo><mrow><mo stretchy="false">{</mo><msub><mi class="ltx_font_mathcaligraphic">&#x2112;</mi><mrow><mi>Q</mi><mo lspace="0em" rspace="0em">&#x200B;</mo><mi>G</mi></mrow></msub><mo>,</mo><msub><mi mathvariant="normal">&#x3A3;</mi><mrow><mi>Q</mi><mo lspace="0em" rspace="0em">&#x200B;</mo><mi>G</mi></mrow></msub><mo>,</mo><msub><mi class="ltx_font_mathcaligraphic">&#x211B;</mi><mi>alg</mi></msub><mo stretchy="false">}</mo></mrow></mrow><mo>.</mo></mrow></semantics></math></td><td class="ltx_eqn_cell ltx_eqn_center_padright" style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px; width: 306.75px; padding: 0.3rem 0.2rem; display: table-cell; min-width: 2em;"></td><td class="ltx_eqn_cell ltx_eqn_eqno ltx_align_middle ltx_align_right" rowspan="1" style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px; text-align: right; vertical-align: middle; width: 3em; padding: 0.3rem 0.2rem; display: table-cell; white-space: nowrap;"><span class="ltx_tag ltx_tag_equation ltx_align_right" style="box-sizing: border-box; text-align: right; font-size: 0.9em; float: right;">(1)</span></td></tr></tbody></table><!--kg-card-end: html--><p>Here, &#x2112;Q&#x200B;G a first-order language whose non-logical symbols denote quantum states, fields, curvature, causal relations, etc. &#x3A3;Q&#x200B;G={A1,A2,&#x2026;} is a finite (or at least recursively-enumerable) set of closed &#x2112;Q&#x200B;G-sentences embodying the fundamental physical principles. &#x211B;alg the standard, effective rules of inference used for computations. They operationalise &#x201C;algorithmic calculations&#x201D;; we write &#x3A3;Q&#x200B;G&#x22A2;alg&#x3C6;&#x27FA;&#x3C6; is derivable from &#x3A3;Q&#x200B;G via &#x211B;alg. Crucially, spacetime is not a primitive backdrop but a theorem-level construct emergent inside models of &#x2131;Q&#x200B;G. Concrete mechanisms for which such geometry can emerge include dynamics in string theory <a href="https://arxiv.org/html/2507.22950v1#bib.bib33">Seiberg2006</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib34">Polchinski1998</a>, entanglement in holography <a href="https://arxiv.org/html/2507.22950v1#bib.bib22">Jafferis:2022crx</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib23">VanRaamsdonk:2020ydg</a>, and spin-network dynamics in LQG <a href="https://arxiv.org/html/2507.22950v1#bib.bib19">Perez2013</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib35">Rovelli2004</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib24">Makela:2019vgf</a>.</p><p>Any viable &#x2131;Q&#x200B;G must meet four intertwined criteria: Effective axiomatizability; The number of axioms in &#x3A3;Q&#x200B;G are finite. This ensures that proofs are well-posed. In fact, it is expected that spacetime can be algorithmically generated from this, and so it has to be computationally well defined <a href="https://arxiv.org/html/2507.22950v1#bib.bib36">Faizal2023</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib14">Braunstein:2023jpo</a>. Arithmetic expressiveness; &#x2112;Q&#x200B;G can internally model the natural numbers with their basic operations. This is important as quantum gravity should reproduce calculations used for amplitudes, curvature scalars, entropy, etc in appropriate limits. Both string theory <a href="https://arxiv.org/html/2507.22950v1#bib.bib34">Polchinski1998</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib37">Green1987</a> and LQG <a href="https://arxiv.org/html/2507.22950v1#bib.bib35">Rovelli2004</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib38">Thiemann2007</a> satisfy this by reproducing GR and QM in appropriate limits. Internal consistency; no &#x3A3;Q&#x200B;G&#x22A2;alg&#x22A5;. Strings secure this via anomaly cancellation <a href="https://arxiv.org/html/2507.22950v1#bib.bib39">Green1984</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib34">Polchinski1998</a>; LQG via an anomaly-free constraint algebra <a href="https://arxiv.org/html/2507.22950v1#bib.bib40">Ashtekar1986</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib35">Rovelli2004</a>. Empirical completeness; predictive all physical phenomena from the Planck scale to cosmology, and even resolves singularities.</p><p>The axiom set &#x3A3;Q&#x200B;G is finite, arithmetically expressive and consistent. As a result, G&#xF6;del&#x2019;s incompleteness theorems apply <a href="https://arxiv.org/html/2507.22950v1#bib.bib41">Godel1931</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib42">Smith2007</a>. Here, we consider the algorithmic core of quantum gravity as a finite, consistent and arithmetically expressive formal system &#x2131;Q&#x200B;G=(&#x2112;Q&#x200B;G,&#x3A3;Q&#x200B;G,&#x211B;alg). Its deductive closure is the recursively enumerable set of theorems Th(&#x2131;Q&#x200B;G)={&#x3C6;&#x2208;&#x2112;Q&#x200B;G&#x2223;&#x3A3;Q&#x200B;G&#x22A2;&#x211B;alg&#x3C6;}, while the semantically true sentences are True&#x2061;(&#x2131;Q&#x200B;G)={&#x3C6;&#x2208;&#x2112;Q&#x200B;G&#x2223;&#x2115;&#x22A7;&#x3C6;}. Thus, G&#xF6;del&#x2019;s first incompleteness theorem asserts the strict containment Th&#x2061;(&#x2131;Q&#x200B;G)&#x228A;True&#x2061;(&#x2131;Q&#x200B;G) <a href="https://arxiv.org/html/2507.22950v1#bib.bib41">Godel1931</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib42">Smith2007</a>, guaranteeing the existence of well&#x2011;formed &#x2112;Q&#x200B;G-statements that are true but unprovable within the algorithmic machinery of &#x2131;Q&#x200B;G. Physically these G&#xF6;del sentences correspond to empirically meaningful facts&#x2014;e.g., specific black&#x2011;hole microstates&#x2014;that elude any finite, rule&#x2011;based derivation. G&#xF6;del&#x2019;s second theorem deepens the impasse: the self&#x2011;referential consistency statement Con&#x2061;(&#x2131;Q&#x200B;G)&#x2261;&#xAC;Prov&#x3A3;Q&#x200B;G&#x2061;(&#x22A5;) cannot itself be proved by &#x2131;Q&#x200B;G without contradiction <a href="https://arxiv.org/html/2507.22950v1#bib.bib41">Godel1931</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib42">Smith2007</a>. A purely computational theory of everything would therefore not be able to establish its own internal soundness. Tarski&#x2019;s undefinability theorem further bars the construction of an internal truth predicate &#x1D5B3;&#x1D5CB;&#x1D5CE;&#x1D5CD;&#x1D5C1;&#x200B;(x)&#x2208;&#x2112;Q&#x200B;G obeying &#x3A3;Q&#x200B;G&#x22A2;&#x211B;alg[&#x1D5B3;&#x1D5CB;&#x1D5CE;&#x1D5CD;&#x1D5C1;(&#x231C;&#x3C6;&#x231D;)&#x2194;&#x3C6;] for all &#x3C6; <a href="https://arxiv.org/html/2507.22950v1#bib.bib43">Tarski1933</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib44">Tarski1983</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib45">Faizal20241</a>. So, a truth predicate for quantum gravity cannot be defined within the theory itself. Finally, Chaitin&#x2019;s information&#x2011;theoretic incompleteness establishes a constant K&#x2131;Q&#x200B;G such that any sentence S with prefix&#x2011;free Kolmogorov complexity K&#x200B;(S)&gt;K&#x2131;Q&#x200B;G is undecidable in &#x2131;Q&#x200B;G <a href="https://arxiv.org/html/2507.22950v1#bib.bib46">chaitin1975theory</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib47">Chaitin2004</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib48">kritchman2010surprise</a>. This bound caps the epistemic reach of algorithmic deduction by declaring ultra&#x2011;complex statements&#x2014;inevitable in high&#x2011;energy quantum gravity&#x2014;formally inaccessible.</p><p>Together, the G&#xF6;del&#x2013;Tarski&#x2013;Chaitin triad delineates an insurmountable frontier for any strictly computable framework. To attain a genuinely complete and self&#x2011;justifying theory of quantum gravity one must augment &#x2131;Q&#x200B;G with non&#x2011;algorithmic resources&#x2014;an external truth predicate axioms, or other meta&#x2011;logical mechanisms&#x2014;that transcend recursive enumeration while remaining empirically consonant with physics at the Planck scale. Although these limits restrict what can be known computationally, the Lucas&#x2013;Penrose argument shows that non-algorithmic understanding can access truths beyond formal proofs <a href="https://arxiv.org/html/2507.22950v1#bib.bib49">lucas1961minds</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib50">Penrose2011</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib51">Penrose1990-PENTNM</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib52">hameroff2014consciousness</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib53">lucas_penrose_2023</a>. Purely algorithmic deduction is therefore insufficient for a complete foundational account <a href="https://arxiv.org/html/2507.22950v1#bib.bib54">Faizal:2025gip</a>.</p><p>To transcend these computations limitations, we adjoin an external truth predicate T&#x200B;(x) and a non-effective inference mechanism &#x211B;nonalg, enlarging the formal apparatus to</p><!--kg-card-begin: html--><table class="ltx_equation ltx_eqn_table" id="S0.E2" style="box-sizing: border-box; caption-side: bottom; border-collapse: collapse; width: 832px; margin: 0.65rem auto; display: table;"><tbody style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px;"><tr class="ltx_equation ltx_eqn_row ltx_align_baseline" style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px; vertical-align: baseline; display: table-row;"><td class="ltx_eqn_cell ltx_eqn_center_padleft" style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px; width: 239.656px; padding: 0.3rem 0.2rem; display: table-cell; min-width: 2em;"></td><td class="ltx_eqn_cell ltx_align_center" style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px; text-align: center; width: auto; padding: 0.3rem 0.2rem; display: table-cell;"><math alttext="\mathcal{M}_{\mathrm{ToE}}=\{\mathcal{L}_{QG}\!\cup\!\{T\},\Sigma_{QG}\!\cup\!\Sigma_{T},\mathcal{R}_{\mathrm{alg}}\!\cup\!\mathcal{R}_{\mathrm{nonalg}}\}." class="ltx_Math" display="block" id="S0.E2.m1"><semantics><mrow><mrow><msub><mi class="ltx_font_mathcaligraphic">&#x2133;</mi><mi>ToE</mi></msub><mo>=</mo><mrow><mo stretchy="false">{</mo><mrow><msub><mi class="ltx_font_mathcaligraphic">&#x2112;</mi><mrow><mi>Q</mi><mo lspace="0em" rspace="0em">&#x200B;</mo><mi>G</mi></mrow></msub><mo rspace="0.052em">&#x222A;</mo><mrow><mo stretchy="false">{</mo><mi>T</mi><mo stretchy="false">}</mo></mrow></mrow><mo>,</mo><mrow><msub><mi mathvariant="normal">&#x3A3;</mi><mrow><mi>Q</mi><mo lspace="0em" rspace="0em">&#x200B;</mo><mi>G</mi></mrow></msub><mo rspace="0.052em">&#x222A;</mo><msub><mi mathvariant="normal">&#x3A3;</mi><mi>T</mi></msub></mrow><mo>,</mo><mrow><msub><mi class="ltx_font_mathcaligraphic">&#x211B;</mi><mi>alg</mi></msub><mo rspace="0.052em">&#x222A;</mo><msub><mi class="ltx_font_mathcaligraphic">&#x211B;</mi><mi>nonalg</mi></msub></mrow><mo stretchy="false">}</mo></mrow></mrow><mo lspace="0em">.</mo></mrow></semantics></math></td><td class="ltx_eqn_cell ltx_eqn_center_padright" style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px; width: 239.656px; padding: 0.3rem 0.2rem; display: table-cell; min-width: 2em;"></td><td class="ltx_eqn_cell ltx_eqn_eqno ltx_align_middle ltx_align_right" rowspan="1" style="box-sizing: border-box; border-color: inherit; border-style: solid; border-width: 0px; text-align: right; vertical-align: middle; width: 3em; padding: 0.3rem 0.2rem; display: table-cell; white-space: nowrap;"><span class="ltx_tag ltx_tag_equation ltx_align_right" style="box-sizing: border-box; text-align: right; font-size: 0.9em; float: right;">(2)</span></td></tr></tbody></table><!--kg-card-end: html--><p>Here &#x3A3;T is an external, non-recursively-enumerable set of axioms about T. We write &#x3A3;T&#x22A2;nonalg&#x3C6; precisely when T&#x200B;(&#x231C;&#x200B;&#x3C6;&#x200B;&#x231D;)&#x2208;&#x3A3;T. The external truth predicate axioms obey four intertwined conditions. (S1) Soundness for &#x2131;Q&#x200B;G: whenever T&#x200B;(&#x231C;&#x200B;&#x3C6;&#x200B;&#x231D;) is an axiom, &#x3C6; holds in every model of the base theory. (S2) Reflective completeness: if &#x3C6; is algorithmically derivable from &#x3A3;Q&#x200B;G, then the implication &#x3C6;&#x2192;T&#x200B;(&#x231C;&#x200B;&#x3C6;&#x200B;&#x231D;) itself belongs to &#x3A3;T. (S3) Modus-ponens closure: T respects logical consequence, for T&#x200B;(&#x231C;&#x200B;&#x3C6;&#x2192;&#x3C8;&#x200B;&#x231D;) together with T&#x200B;(&#x231C;&#x200B;&#x3C6;&#x200B;&#x231D;) entails T&#x200B;(&#x231C;&#x200B;&#x3C8;&#x200B;&#x231D;). (S4) Trans-algorithmicity: the induced theory ThT={&#x3C6;&#x2223;T&#x200B;(&#x231C;&#x200B;&#x3C6;&#x200B;&#x231D;)&#x2208;&#x3A3;T} is not recursively enumerable; sentences of arbitrarily high Kolmogorov complexity can still be T-true, exceeding the information bound K&#x2131;Q&#x200B;G.</p><p>With these properties the external truth predicate certifies every G&#xF6;del sentence of &#x2131;Q&#x200B;G and can single out, for instance, concrete black-hole microstates that elude all algorithmic searches, thereby side-stepping the information-loss puzzle and illuminating Planck-scale dynamics. The non-algorithmic understanding encoded by &#x211B;nonalg and &#x3A3;T thus supplies conceptual resources inaccessible to purely computational physics.</p><p>For clarity of notation: &#x3A3;Q&#x200B;G is the computable axiom set; &#x211B;alg comprises the standard, effective inference rules; &#x211B;nonalg is the non-effective external truth predicate rule that certifies T-truths; &#x2131;Q&#x200B;G={&#x2112;Q&#x200B;G,&#x3A3;Q&#x200B;G,&#x211B;alg} denotes the computational core; and &#x2133;ToE={&#x2112;Q&#x200B;G&#x222A;{T},&#x3A3;Q&#x200B;G&#x222A;&#x3A3;T,&#x211B;alg&#x222A;&#x211B;nonalg} denotes the full meta-theory that weds algorithmic deduction to an external truth predicate.</p><p>Crucially, the appearance of undecidable phenomena in physics already offers empirical backing for &#x2133;ToE. Whenever an experiment or exact model realises a property whose truth value provably eludes every recursive procedure, that property functions as a concrete witness to the truth predicate T&#x200B;(x) operating within the fabric of the universe itself. Far from being a purely philosophical embellishment, &#x2133;ToE thus emerges as a structural necessity forced upon us by the physics of undecidable observables. Working at the deepest layer of description, &#x2133;ToE fuses algorithmic and non-algorithmic modes of reasoning into a single coherent architecture, providing the semantic closure that a purely formal system &#x2131;Q&#x200B;G cannot reach on its own. In this enriched setting, quantum measurements, Planck-scale processes, quantum-gravitational amplitudes and cosmological initial conditions might all become accessible to principled yet non-computable inference, ensuring that no physically meaningful truth is left outside the scope of theoretical understanding. Just as Riemannian geometry, which describes general relativity, or gauge theories, which describe various interactions of the Standard Model, are each actualized in nature, this truth predicate T&#x200B;(x) would also be actualized in nature.</p><p>The logical limitations reviewed above bear directly on several open questions in quantum gravity, beginning with the black-hole information paradox <a href="https://arxiv.org/html/2507.22950v1#bib.bib55">Almheiri2021</a>. If the microstates responsible for the Bekenstein&#x2013;Hawking entropy live at Planckian scales, where smooth geometry breaks down, Chaitin&#x2019;s incompleteness theorem suggests that their detailed structure may forever lie beyond algorithmic derivation. In such circumstances, classical spacetime must re-emerge through a collective, effectively thermal, behaviour of microscopic degrees of freedom. Yet deciding whether a given many-body system thermalises is itself algorithmically undecidable <a href="https://arxiv.org/html/2507.22950v1#bib.bib56">Shiraishi2021</a>. Here &#x2133;ToE becomes indispensable: by adjoining the external truth predicate T&#x200B;(x) that certifies physically admissible yet uncomputable properties, the meta-theory legitimizes the passage from undecidable Planck-scale microphysics to the macroscopic notion of spacetime thermalization.</p><p>Thermalization already plays a central role in leading quantum-gravity models. In AdS/CFT, bulk perturbations relax into black-hole horizons whose thermodynamic parameters are sharply defined <a href="https://arxiv.org/html/2507.22950v1#bib.bib57">Chesler:2009cy</a>; in the fuzzball paradigm, an ensemble of horizonless microstate geometries reproduces the Hawking spectrum <a href="https://arxiv.org/html/2507.22950v1#bib.bib58">Mathur:2005zp</a>; and in LQG, coarse-graining drives discrete quantum geometries toward a classical continuum phase <a href="https://arxiv.org/html/2507.22950v1#bib.bib59">dittrich2020coarse</a>. Because thermalisation is undecidable in the general many-body setting <a href="https://arxiv.org/html/2507.22950v1#bib.bib56">Shiraishi2021</a>, each route from Planck-scale physics to smooth spacetime must contain steps that transcend algorithmic control. The non-algorithmic scaffold provided by &#x2133;ToE supplies precisely the logical footing required to keep such trans-computational steps consistent.</p><p>Computational undecidability likewise shadows other structural questions in many-body physics and hence in quantum gravity. No algorithm can decide in full generality whether a local quantum Hamiltonian is gapped or gapless <a href="https://arxiv.org/html/2507.22950v1#bib.bib60">cubitt2015undecidability</a>; the proof embeds Turing&#x2019;s halting problem <a href="https://arxiv.org/html/2507.22950v1#bib.bib61">turing1936computable</a>, which links back to Chaitin&#x2019;s theorem <a href="https://arxiv.org/html/2507.22950v1#bib.bib62">li1997introduction</a>. Entire renormalization-group flows can behave uncomputably <a href="https://arxiv.org/html/2507.22950v1#bib.bib63">watson2022uncomputably</a>, even though RG ideas underpin string-theoretic beta-functions <a href="https://arxiv.org/html/2507.22950v1#bib.bib64">Callan:1985ia</a>, background-independent flows in LQG <a href="https://arxiv.org/html/2507.22950v1#bib.bib65">Steinhaus:2018</a> and continuum-limit programmes such as asymptotic safety and causal dynamical triangulations <a href="https://arxiv.org/html/2507.22950v1#bib.bib66">Litim:2004</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib67">Ambjorn:2005db</a>. If generic RG trajectories defy algorithmic prediction, then translating fundamental quantum-gravity data into classical spacetime observables again lies beyond finite computation. By embedding these flows into &#x2133;ToE, one places them under a broader logical umbrella where non-computational criteria rooted in T&#x200B;(x) can still certify physical viability.</p><p>Related undecidable sectors abound. Key properties of tensor networks ubiquitous in holography <a href="https://arxiv.org/html/2507.22950v1#bib.bib68">hayden2016holographic</a> and LQG <a href="https://arxiv.org/html/2507.22950v1#bib.bib69">Dittrich:2011zh</a> are formally uncomputable <a href="https://arxiv.org/html/2507.22950v1#bib.bib70">kliesch2014matrix</a>. Deducing supersymmetry breaking in certain two-dimensional theories is undecidable <a href="https://arxiv.org/html/2507.22950v1#bib.bib71">tachikawa2023undecidable</a>, influencing model building in string theory <a href="https://arxiv.org/html/2507.22950v1#bib.bib39">Green1984</a>. Phase diagrams of engineered spin models encode uncomputable problems <a href="https://arxiv.org/html/2507.22950v1#bib.bib72">bausch2021uncomputability</a>, and the mathematical kinship between such systems and LQG kinematics <a href="https://arxiv.org/html/2507.22950v1#bib.bib73">Feller:2015</a> hints at analogous intractabilities in the full phase structure of loop gravity. Each undecidable domain slots naturally into &#x2133;ToE, which extends explanatory reach beyond algorithmic barriers while maintaining logical coherence through its external truth predicate axioms.</p><p>These technical results respect rather than undermine the principle of sufficient reason <a href="https://arxiv.org/html/2507.22950v1#bib.bib74">amijee2021principle</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib75">leibniz1996discourse</a>. The core demand of that principle is that every true fact must be grounded in an adequate explanation. This forms the basis of science. G&#xF6;del incompleteness, Tarski undefinability, and Chaitin bounds do not negate this demand; they merely show that &#x201C;adequate explanation&#x201D; is broader than &#x201C;derivable by a finite, mechanical procedure.&#x201D; In other words, the existence of true but unprovable &#x2112;Q&#x200B;G-sentences does not imply that those facts lack reasons, but only that their reasons need not be encoded syntactically within any recursively enumerable axiom set. The semantic external truth predicate T introduced above models such non-algorithmic grounding: it certifies truth directly at the level of the underlying mathematical structure, thereby supplying sufficient reasons that transcend the deductive reach of &#x3A3;Q&#x200B;G. Thus, far from conflicting with the principle of sufficient reason, the logical limits on computation affirm it by revealing that explanatory resources extend beyond formal proof theory. So, a breakdown of computational explanations does not imply a breakdown of science.</p><p>Many undecidable statements encountered in physics ultimately trace back to the halting problem <a href="https://arxiv.org/html/2507.22950v1#bib.bib76">bennett1990undecidable</a>, yet non-algorithmic understanding can still apprehend such truths <a href="https://arxiv.org/html/2507.22950v1#bib.bib77">Stewart1991</a>. The Lucas&#x2013;Penrose proposal that human cognition surpasses formal computation <a href="https://arxiv.org/html/2507.22950v1#bib.bib49">lucas1961minds</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib50">Penrose2011</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib51">Penrose1990-PENTNM</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib52">hameroff2014consciousness</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib53">lucas_penrose_2023</a> finds a mathematical expression in &#x2133;ToE, whose external truth predicate T&#x200B;(x) certifies propositions that no algorithmic verifier can capture. In line with the orchestrated objective-reduction (OR) proposal, they claim that human observers can have a truth predicate because cognitive processes exploit quantum collapse, which is produced by the truth predicate of quantum gravity <a href="https://arxiv.org/html/2507.22950v1#bib.bib52">hameroff2014consciousness</a>. This is why they argue that human mathematicians can apprehend G&#xF6;delian truths, whereas computers cannot.</p><p>Non-algorithmic reasoning already supplements GR through the Novikov self-consistency principle <a href="https://arxiv.org/html/2507.22950v1#bib.bib78">Friedman1990</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib79">novikov1989</a>, which imposes a global logical constraint on spacetimes with closed timelike curves. By housing such meta-principles in &#x2133;ToE one side-steps G&#xF6;delian obstructions that would cripple a purely formal &#x2131;Q&#x200B;G. As quantum logic is itself undecidable <a href="https://arxiv.org/html/2507.22950v1#bib.bib80">vandenNest2008measurement</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib81">lloyd1993quantum</a>, any proper wave-function&#x2013;collapse mechanism must operate outside the algorithmic domain of the quantum mechanics. So, such dynamics naturally reside in the non-algorithmic &#x2133;ToE. Gravitationally induced objective-collapse proposals can therefore be interpreted as concrete instantiations of the &#x2133;ToE action on quantum states <a href="https://arxiv.org/html/2507.22950v1#bib.bib82">Penrose1996</a>; <a href="https://arxiv.org/html/2507.22950v1#bib.bib83">Diosi1987</a>. Here, the meta-layer supplies a non-algorithmic gravity-triggered collapse that is not derivable from &#x3A3;Q&#x200B;G, but is nonetheless well-defined at the semantic level. A key advantage of using objective-collapse models might be cosmological: it could offer a explanation of the quantum-to-classical transition in cosmology, thereby addressing the measurement problem in quantum cosmology <a href="https://arxiv.org/html/2507.22950v1#bib.bib84">Gaona-Reyes:2024qcc</a>.</p><p>A growing survey confirms that undecidability permeates diverse areas of physics <a href="https://arxiv.org/html/2507.22950v1#bib.bib85">peraleseceiza2024undecidabilityphysicsreview</a>. These examples jointly reinforce the proposition that a quantum-gravity rooted solely in computation can be neither complete nor consistent, whereas augmenting it with the non-algorithmic resources encoded in &#x2133;ToE could restore explanatory power without losing logical soundness.</p><p>The claim that our universe is itself a computer simulation has been advanced in several forms, from Bostrom&#x2019;s statistical &#x201C;trilemma&#x201D; <a href="https://arxiv.org/html/2507.22950v1#bib.bib86">Bostrom2003</a> to more recent analyses by Chalmers <a href="https://arxiv.org/html/2507.22950v1#bib.bib87">Chalmers2019</a> and Deutsch <a href="https://arxiv.org/html/2507.22950v1#bib.bib88">Deutsch2016</a>. These proposals assume that every physical truth is reducible to the output of a finite algorithm executed on a sufficiently powerful substrate. Yet this assumption tacitly identifies the full physical theory with its computable slice &#x2131;Q&#x200B;G.</p><p>Our framework separates the computable fragment &#x2131;Q&#x200B;G from the non-algorithmic meta-layer &#x2133;ToE. Because &#x2133;ToE contains an external truth predicate T&#x200B;(x) that by construction escapes formal verification, any finite algorithm can at best emulate &#x2131;Q&#x200B;G while systematically omitting the meta-theoretic truths enforced by T&#x200B;(x). Consequently, no simulation could in principle reproduce what would otherwise be the full underyling structure of the physics of our universe. Our analysis instead suggests that genuine physical reality embeds non-computational content that cannot be instantiated on a Turing-equivalent device. Since it is impossible to simulate a complete and consistent universe, our universe is definitely not a simulation. As the universe is produced by &#x2133;ToE, the simulation hypothesis is logically impossible rather than merely implausible.</p><p>The arguments presented here suggest that neither &#x2018;its&#x2019; nor &#x2018;bits&#x2019; may be sufficient to describe reality. Rather, a deeper description, expressed not in terms of information but in terms of non-algorithmic understanding, is required for a complete and consistent theory of everything.</p><h2 id="acknowledgments"><strong><strong>Acknowledgments</strong></strong></h2><p>We would like to thank &#x130;zzet Sakall&#x131;, Salman Sajad Wani, and Aatif Kaisar Khan for useful discussions. We would also like to thank Aatif Kaisar Khan for sharing with us an important paper on undecidability. Stephen Hawking&#x2019;s discussion on G&#xF6;del&#x2019;s theorems and the end of physics motivated the current work. We would also like to thank Roger Penrose for his exploration of G&#xF6;del&#x2019;s theorems and the Lucas-Penrose argument, which forms the basis of meta-theoretical perspective based on non-algorithmic understanding.</p><h2 id="references"><strong><strong>References</strong></strong></h2><ul><li>(1)L. D. Landau and E. M. Lifshitz, <a href="http://dx.doi.org/https://doi.org/10.1016/C2009-0-25569-3"><em>Mechanics</em></a>.Butterworth&#x2013;Heinemann, Oxford, 1976.</li><li>(2)W. Rindler, <a href="http://dx.doi.org/https://doi.org/10.1007/978-3-642-86650-0"><em>Essential Relativity: Special, General, and Cosmological</em></a>.Springer, Berlin, 1977.</li><li>(3)J. J. Sakurai and J. J. Napolitano, <a href="http://dx.doi.org/https://doi.org/10.1017/9781108499996"><em>Modern Quantum Mechanics</em></a>.Cambridge University Press, Cambridge, 2017.</li><li>(4)M. Srednicki, <a href="http://dx.doi.org/https://doi.org/10.1017/CBO9780511813917"><em>Quantum Field Theory</em></a>.Cambridge University Press, Cambridge, 2007.</li><li>(5)C. M. Wilson, G. Johansson, A. Pourkabirian, M. Simoen, J. R. Johansson, T. Duty, F. Nori, and P. Delsing, &#x201C;Observation of the dynamical Casimir effect in a superconducting circuit,&#x201D; <a href="http://dx.doi.org/https://doi.org/10.1038/nature10561"><em>Nature</em> <strong>479</strong> (2011) 376&#x2013;379</a>.</li><li>(6)L. C. B. Crispino, A. Higuchi, and G. E. A. Matsas, &#x201C;The Unruh effect and its applications,&#x201D; <a href="http://dx.doi.org/https://doi.org/10.1103/RevModPhys.80.787"><em>Reviews of Modern Physics</em> <strong>80</strong> (2008) 787&#x2013;838</a>.</li><li>(7)A. Einstein, &#x201C;Die Feldgleichungen der Gravitation,&#x201D; <a href="http://dx.doi.org/https://doi.org/10.1007/978-3-322-83770-7_10"><em>Sitzungsberichte der Preussischen Akademie der Wissenschaften zu Berlin</em> (1915) </a>.</li><li>(8)B. P. Abbott <em>et al.</em>, &#x201C;Observation of Gravitational Waves from a Binary Black Hole Merger,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevLett.116.061102"><em>Physical Review Letters</em> <strong>116</strong> (2016) 061102</a>.</li><li>(9)R. Penrose, &#x201C;Gravitational Collapse and Space-Time Singularities,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevLett.14.57"><em>Physical Review Letters</em> <strong>14</strong> (1965) 57</a>.</li><li>(10)S. Hawking and R. Penrose, &#x201C;The Singularities of Gravitational Collapse and Cosmology,&#x201D; <a href="http://dx.doi.org/10.1098/rspa.1970.0021"><em>Proceedings of the Royal Society A</em> <strong>314</strong> (1970) 529</a>.</li><li>(11)V. I. Arnold, <em>Catastrophe Theory</em>.Springer Berlin, Heidelberg, 1992.<a href="https://link.springer.com/book/10.1007/978-3-642-58124-3">https://link.springer.com/book/10.1007/978-3-642-58124-3</a>.</li><li>(12)M. Berry, &#x201C;The singularities of light: intensity, phase, polarisation,&#x201D; <a href="http://dx.doi.org/https://doi.org/10.1038/s41377-023-01270-8"><em>Light Sci. Appl.</em> <strong>12</strong> (2023) 238</a>.</li><li>(13)F. Marino, C. Maitland, D. Vocke, O. Ortolan, and D. Faccio, &#x201C;Emergent geometries and nonlinear-wave dynamics in photon fluids,&#x201D; <a href="http://dx.doi.org/https://doi.org/10.1038/srep23282"><em>Scientific Reports</em> <strong>6</strong> (2016) 23282</a>.</li><li>(14)S. L. Braunstein, M. Faizal, L. M. Krauss, F. Marino, and N. A. Shah, &#x201C;Analogue simulations of quantum gravity with fluids,&#x201D; <a href="http://dx.doi.org/10.1038/s42254-023-00630-y"><em>Nature Rev. Phys.</em> <strong>5</strong> (2023) no. 10, 612&#x2013;622</a>.</li><li>(15)M. Bojowald, &#x201C;Absence of Singularity in Loop Quantum Cosmology,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevLett.86.5227"><em>Physical Review Letters</em> <strong>86</strong> (2001) 5227</a>.</li><li>(16)A. Ashtekar, T. Pawlowski, and P. Singh, &#x201C;Quantum Nature of the Big Bang: Improved Dynamics,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevD.74.084003"><em>Phys. Rev. D</em> <strong>74</strong> (2006) 084003</a>.</li><li>(17)S. D. Mathur, &#x201C;The Fuzzball Proposal for Black Holes: An Elementary Review,&#x201D; <a href="http://dx.doi.org/10.1002/prop.200410203"><em>Fortschritte der Physik</em> <strong>53</strong> (2005) 793</a>.</li><li>(18)S. D. Mathur, &#x201C;Tunneling into fuzzball states,&#x201D; <a href="http://dx.doi.org/10.1007/s10714-009-0837-3"><em>Gen. Rel. Grav.</em> <strong>42</strong> (2010) 113&#x2013;118</a>.</li><li>(19)A. Perez, &#x201C;The Spin Foam Approach to Quantum Gravity,&#x201D; <a href="http://dx.doi.org/10.12942/lrr-2013-3"><em>Living Reviews in Relativity</em> <strong>16</strong> (2013) 3</a>.</li><li>(20)O. Hohm, C. Hull, and B. Zwiebach, &#x201C;Generalized Metric Formulation of Double Field Theory,&#x201D; <a href="http://dx.doi.org/10.1007/JHEP08(2010)008"><em>Journal of High Energy Physics</em> <strong>08</strong> (2010) 008</a>.</li><li>(21)C. M. Hull, &#x201C;A Geometry for Non-Geometric String Backgrounds,&#x201D; <a href="http://dx.doi.org/10.1088/1126-6708/2005/10/065"><em>Journal of High Energy Physics</em> <strong>10</strong> (2005) 065</a>.</li><li>(22)D. Jafferis, A. Zlokapa, J. D. Lykken, D. K. Kolchmeyer, S. I. Davis, N. Lauk, H. Neven, and M. Spiropulu, &#x201C;Traversable wormhole dynamics on a quantum processor,&#x201D; <a href="http://dx.doi.org/10.1038/s41586-022-05424-3"><em>Nature</em> <strong>612</strong> (2022) no. 7938, 51&#x2013;55</a>.</li><li>(23)M. Van Raamsdonk, &#x201C;Spacetime from bits,&#x201D; <a href="http://dx.doi.org/10.1126/science.aay9560"><em>Science</em> <strong>370</strong> (2020) no. 6513, 198&#x2013;202</a>.</li><li>(24)J. M&#xE4;kel&#xE4;, &#x201C;Wheeler&#x2019;s it from bit proposal in loop quantum gravity,&#x201D; <a href="http://dx.doi.org/10.1142/S0218271819501293"><em>Int. J. Mod. Phys. D</em> <strong>28</strong> (2019) no. 10, 1950129</a>.</li><li>(25)J. A. Wheeler, &#x201C;Information, physics, quantum: The search for links,&#x201D; in <em>Proceedings III International Symposium on Foundations of Quantum Mechanics</em>, W. J. Archibald, ed., pp. 354&#x2013;358.1989.<a href="https://philarchive.org/rec/WHEIPQ">https://philarchive.org/rec/WHEIPQ</a>.</li><li>(26)E. Witten, &#x201C;Noncommutative Geometry and String Field Theory,&#x201D; <a href="http://dx.doi.org/10.1016/0550-3213(86)90155-0"><em>Nucl. Phys. B</em> <strong>268</strong> (1986) 253&#x2013;294</a>.</li><li>(27)H. Ziaeepour, &#x201C;Comparing Quantum Gravity Models: String Theory, Loop Quantum Gravity, and Entanglement Gravity versus SU(&#x221E;)-QGR,&#x201D; <a href="http://dx.doi.org/10.3390/sym14010058"><em>Symmetry</em> <strong>14</strong> (2022) 58</a>.</li><li>(28)M. Faizal, A. Shabir, and A. K. Khan, &#x201C;Consequences of G&#xF6;del theorems on third quantized theories like string field theory and group field theory,&#x201D; <a href="http://dx.doi.org/10.1016/j.nuclphysb.2024.116774"><em>Nucl. Phys. B</em> <strong>1010</strong> (2025) 116774</a>.</li><li>(29)L. Bombelli, J. Lee, D. Meyer, and R. D. Sorkin, &#x201C;Spacetime as a causal set,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevLett.59.521"><em>Physical Review Letters</em> <strong>59</strong> (1987) no. 5, 521&#x2013;524</a>.</li><li>(30)S. Majid, &#x201C;On the emergence of the structure of Physics,&#x201D; <a href="http://dx.doi.org/10.1098/rsta.2017.0231"><em>Phil. Trans. Roy. Soc. Lond. A</em> <strong>376</strong> (2018) 0231</a>.</li><li>(31)G. M. D&#x2019;Ariano, &#x201C;Physics Without Physics: The Power of Information-theoretical Principles,&#x201D; <a href="http://dx.doi.org/10.1007/s10773-016-3172-y"><em>Int. J. Theor. Phys.</em> <strong>56</strong> (2017) no. 1, 97&#x2013;128</a>.</li><li>(32)X. D. Arsiwalla and J. Gorard, &#x201C;Pregeometric Spaces from Wolfram Model Rewriting Systems as Homotopy Types,&#x201D; <a href="http://dx.doi.org/10.1007/s10773-024-05576-0"><em>Int. J. Theor. Phys.</em> <strong>63</strong> (2024) no. 4, 83</a>.</li><li>(33)N. Seiberg, <a href="http://dx.doi.org/10.1142/9789812706768_0005">&#x201C;Emergent spacetime,&#x201D;</a> in <em>23rd Solvay Conference in Physics: The Quantum Structure of Space and Time</em>, pp. 163&#x2013;178.1, 2006.<a href="http://arxiv.org/abs/hep-th/0601234">arXiv:hep-th/0601234</a>.</li><li>(34)J. Polchinski, <a href="http://dx.doi.org/https://doi.org/10.1017/CBO9780511816079"><em>String Theory</em></a>.Cambridge University Press, 1998.</li><li>(35)C. Rovelli, <a href="http://dx.doi.org/https://doi.org/10.1017/CBO9780511755804"><em>Quantum Gravity</em></a>.Cambridge University Press, Cambridge, UK, 2004.</li><li>(36)M. Faizal, &#x201C;The end of space&#x2013;time,&#x201D; <a href="http://dx.doi.org/10.1142/S0217751X23501889"><em>Int. J. Mod. Phys. A</em> <strong>38</strong> (2023) no. 35n36, 2350188</a>.</li><li>(37)M. B. Green, J. H. Schwarz, and E. Witten, <a href="http://dx.doi.org/https://doi.org/10.1017/CBO9781139248563"><em>Superstring Theory</em></a>.Cambridge University Press, 1987.</li><li>(38)T. Thiemann, <a href="http://dx.doi.org/https://doi.org/10.1017/CBO9780511755682"><em>Modern Canonical Quantum General Relativity</em></a>.Cambridge University Press, 2007.</li><li>(39)M. B. Green and J. H. Schwarz, &#x201C;Anomaly cancellation in supersymmetric d=10 gauge theory,&#x201D; <a href="http://dx.doi.org/10.1016/0370-2693(84)91565-X"><em>Physics Letters B</em> <strong>149</strong> (1984) 117</a>.</li><li>(40)A. Ashtekar, &#x201C;New variables for classical and quantum gravity,&#x201D; <a href="http://dx.doi.org/https://doi.org/10.1103/PhysRevLett.57.2244"><em>Physical Review Letters</em> <strong>57</strong> (1986) 2244</a>.</li><li>(41)K. G&#xF6;del, &#x201C;&#xDC;ber formal unentscheidbare s&#xE4;tze der principia mathematica und verwandter systeme i,&#x201D; <a href="http://dx.doi.org/https://doi.org/10.1007/BF01700692"><em>Monatshefte f&#xFC;r Mathematik</em> <strong>38</strong> (1931) no. 1, 173&#x2013;198</a>.</li><li>(42)P. Smith, <a href="http://dx.doi.org/https://doi.org/10.1017/CBO9781139149105"><em>An Introduction to G&#xF6;del&#x2019;s Theorems</em></a>.Cambridge University Press, Cambridge, 2nd ed., 2007.</li><li>(43)A. Tarski, &#x201C;Pojecie Prawdy w Jezykach Nauk Dedukcyjnych (The Concept of Truth in the Languages of the Deductive Sciences),&#x201D; <em>Prace Towarzystwa Naukowego Warszawskiego, Wydzia&#x142; III</em> <strong>34</strong> (1933) . <a href="https://openlibrary.org/books/OL5813583M/Poje%CC%A8cie_prawdy_w_je%CC%A8zykach_nauk_dedukcyjnych">https://openlibrary.org/books/OL5813583M/Poje%CC%A8cie_prawdy_w_je%CC%A8zykach_nauk_dedukcyjnych</a>.</li><li>(44)A. Tarski, <a href="http://dx.doi.org/http://dx.doi.org/10.2307/2275031"><em>Logic, Semantics, Metamathematics: Papers from 1923 to 1938</em></a>.Hackett Publishing Company, Indianapolis, 1983.</li><li>(45)M. Faizal, A. Shabir, and A. K. Khan, &#x201C;Implications of Tarski&#x2019;s undefinability theorem on the Theory of Everything,&#x201D; <a href="http://dx.doi.org/10.1209/0295-5075/ad80c2"><em>EPL</em> <strong>148</strong> (2024) no. 3, 39001</a>.</li><li>(46)G. J. Chaitin, &#x201C;A theory of program size formally identical to information theory,&#x201D; <a href="http://dx.doi.org/10.1145/321892.321894"><em>Journal of the ACM</em> <strong>22</strong> (1975) no. 3, 329&#x2013;340</a>.</li><li>(47)G. J. Chaitin, <a href="http://dx.doi.org/https://doi.org/10.48550/arXiv.math/0404335"><em>Meta Math!: The Quest for Omega</em></a>.Pantheon Books, New York, 2004.</li><li>(48)S. Kritchman and R. Raz, &#x201C;The surprise examination paradox and the second incompleteness theorem,&#x201D; <a href="http://dx.doi.org/10.48550/arXiv.1011.4974"><em>Notices of the AMS</em> <strong>57</strong> (2010) no. 11, 1454</a>.</li><li>(49)J. R. Lucas, &#x201C;Minds, machines and g&#xF6;del,&#x201D; <a href="http://dx.doi.org/10.1017/S0031819100057983"><em>Philosophy</em> <strong>36</strong> (1961) no. 137, 112&#x2013;127</a>.</li><li>(50)R. Penrose, <a href="http://dx.doi.org/https://doi.org/10.1017/CBO9780511974236.019">&#x201C;G&#xF6;del, the mind, and the laws of physics,&#x201D;</a> in <em>Kurt G&#xF6;del&#x2019;s and the foundations of mathematics: horizons of truth</em>, p. 339.Cambridge University Press, 2011.</li><li>(51)R. Penrose, &#x201C;The nonalgorithmic mind,&#x201D; <a href="http://dx.doi.org/10.1017/s0140525x0008105x"><em>Behavioral and Brain Sciences</em> <strong>13</strong> (1990) no. 4, 692&#x2013;</a>.</li><li>(52)S. Hameroff and R. Penrose, &#x201C;Consciousness in the universe: A review of the &#x2019;orch or&#x2019; theory,&#x201D; <a href="http://dx.doi.org/10.1016/j.plrev.2013.08.002"><em>Physics of Life Reviews</em> <strong>11</strong> (2014) no. 1, 39&#x2013;78</a>.</li><li>(53)J. P. S., <a href="http://dx.doi.org/10.1007/978-3-031-64217-3_7">&#x201C;The lucas&#x2013;penrose arguments,&#x201D;</a> in <em>The Argument of Mathematics</em>, p. Chapter 7.Springer, 2023.</li><li>(54)M. Faizal, L. M. Krauss, A. Shabir, F. Marino, and B. Pourhassan, &#x201C;Quantum gravity cannot be both consistent and complete,&#x201D; <a href="http://arxiv.org/abs/2505.11773">arXiv:2505.11773 [gr-qc]</a>.</li><li>(55)A. Almheiri, T. Hartman, J. Maldacena, E. Shaghoulian, and A. Tajdini, &#x201C;The entropy of hawking radiation,&#x201D; <a href="http://dx.doi.org/10.1103/RevModPhys.93.035002"><em>Reviews of Modern Physics</em> <strong>93</strong> (2021) no. 3, 035002</a>.</li><li>(56)N. Shiraishi and K. Matsumoto, &#x201C;Undecidability in quantum thermalization,&#x201D; <a href="http://dx.doi.org/10.1038/s41467-021-25053-0"><em>Nature Communications</em> <strong>12</strong> (2021) 5084</a>.</li><li>(57)P. M. Chesler and L. G. Yaffe, &#x201C;Horizon formation and far-from-equilibrium isotropization in a supersymmetric yang-mills plasma,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevLett.102.211601"><em>Phys. Rev. Lett.</em> <strong>102</strong> (2009) 211601</a>.</li><li>(58)S. D. Mathur, &#x201C;The fuzzball proposal for black holes: An elementary review,&#x201D; <a href="http://dx.doi.org/10.1002/prop.200410203"><em>Fortsch. Phys.</em> <strong>53</strong> (2005) 793&#x2013;827</a>.</li><li>(59)S. Steinhaus, &#x201C;Coarse graining spin foam quantum gravity&#x2014;a review,&#x201D; <a href="http://dx.doi.org/10.3389/fphy.2020.00295"><em>Frontiers in Physics</em> <strong>8</strong> (2020) </a>.</li><li>(60)T. Cubitt, D. Perez-Garcia, and M. M. Wolf, &#x201C;Undecidability of the spectral gap,&#x201D; <a href="http://dx.doi.org/10.1017/fmp.2021.15"><em>Forum of Mathematics, Pi</em> <strong>10</strong> (2022) e14</a>.</li><li>(61)A. M. Turing, &#x201C;On computable numbers, with an application to the entscheidungsproblem,&#x201D; <a href="http://dx.doi.org/10.1112/plms/s2-42.1.230"><em>Proceedings of the London Mathematical Society</em> <strong>s2-42</strong> (1937) no. 1, 230</a>.</li><li>(62)M. Li and P. Vit&#xE1;nyi, <a href="http://dx.doi.org/10.1007/978-3-030-11298-1"><em>An Introduction to Kolmogorov Complexity and Its Applications</em></a>.Springer, 2019.</li><li>(63)J. D. Watson, E. Onorati, and T. S. Cubitt, &#x201C;Uncomputably complex renormalisation group flows,&#x201D; <a href="http://dx.doi.org/10.1038/s41467-022-35179-4"><em>Nature Communications</em> <strong>13</strong> (2022) no. 1, 7618</a>.</li><li>(64)C. G. Callan, D. Friedan, E. J. Martinec, and M. J. Perry, &#x201C;Strings in background fields,&#x201D; <a href="http://dx.doi.org/10.1016/0550-3213(85)90506-1"><em>Nucl. Phys. B</em> <strong>262</strong> (1985) 593&#x2013;609</a>.</li><li>(65)S. Steinhaus and J. Th&#xFC;rigen, &#x201C;Emergence of spacetime in a restricted spin-foam model,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevD.98.026013"><em>Phys. Rev. D</em> <strong>98</strong> (2018) no. 2, 026013</a>.</li><li>(66)D. Litim, &#x201C;Fixed points of quantum gravity,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevLett.92.201301"><em>Phys. Rev. Lett.</em> <strong>92</strong> (2004) 201301</a>.</li><li>(67)J. Ambj&#xF8;rn, J. Jurkiewicz, and R. Loll, <a href="http://dx.doi.org/10.1103/PhysRevLett.95.171301">&#x201C;The spectral dimension of the universe is scale dependent,&#x201D;<em>Phys. Rev. Lett.</em> <strong>95</strong> (Oct, 2005) 171301</a>.</li><li>(68)P. Hayden, S. Nezami, X.-L. Qi, N. Thomas, M. Walter, and Z. Yang, &#x201C;Holographic duality from random tensor networks,&#x201D; <a href="http://dx.doi.org/10.1007/JHEP11(2016)009"><em>Journal of High Energy Physics</em> <strong>2016</strong> (2016) 009</a>.</li><li>(69)B. Dittrich, F. C. Eckert, and M. Martin-Benito, &#x201C;Coarse graining methods for spin net and spin foam models,&#x201D; <a href="http://dx.doi.org/10.1088/1367-2630/14/3/035008"><em>New J. Phys.</em> <strong>14</strong> (2012) 035008</a>.</li><li>(70)M. Kliesch, D. Gross, and J. Eisert, &#x201C;Matrix-product operators and states: Np-hardness and undecidability,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevLett.113.160503"><em>Physical Review Letters</em> <strong>113</strong> (2014) no. 16, 160503</a>.</li><li>(71)Y. Tachikawa, &#x201C;Undecidable problems in quantum field theory,&#x201D; <a href="http://dx.doi.org/10.1007/s10773-023-05357-1"><em>International Journal of Theoretical Physics</em> <strong>62</strong> (2023) 199</a>.</li><li>(72)J. Bausch, T. S. Cubitt, and J. D. Watson, &#x201C;Uncomputability of phase diagrams,&#x201D; <a href="http://dx.doi.org/10.1038/s41467-020-20504-6"><em>Nature Communications</em> <strong>12</strong> (2021) 452</a>.</li><li>(73)A. Feller and E. R. Livine, &#x201C;Ising spin network states for loop quantum gravity: A toy model for phase transitions,&#x201D; <a href="http://dx.doi.org/10.1088/0264-9381/33/6/065005"><em>Class. Quant. Grav.</em> <strong>33</strong> (2016) no. 6, 065005</a>.</li><li>(74)F. Amijee, <a href="http://dx.doi.org/10.1007/978-3-319-20791-9_593-1">&#x201C;Principle of sufficient reason,&#x201D;</a> in <em>Encyclopedia of Early Modern Philosophy and the Sciences</em>, D. Jalobeanu and C. T. Wolfe, eds.Springer, 2021.</li><li>(75)G. W. Leibniz, <em>Discourse on Metaphysics</em>.Hackett Publishing Company, Indianapolis, 1996.<a href="https://www.earlymoderntexts.com/assets/pdfs/leibniz1686d.pdf">https://www.earlymoderntexts.com/assets/pdfs/leibniz1686d.pdf</a>.A seminal work where Leibniz famously asserts that &#x201D;nothing happens without a reason.&#x201D;.</li><li>(76)C. H. Bennett, &#x201C;Undecidable dynamics,&#x201D; <a href="http://dx.doi.org/10.1038/346606a0"><em>Nature</em> <strong>346</strong> (1990) 606&#x2013;607</a>.</li><li>(77)I. Stewart, &#x201C;Deciding the undecidable,&#x201D; <a href="http://dx.doi.org/10.1038/352664a0"><em>Nature</em> <strong>352</strong> (1991) 664&#x2013;665</a>.</li><li>(78)J. L. Friedman, M. S. Morris, I. D. Novikov, F. Echeverria, G. Klinkhammer, K. S. Thorne, and U. Yurtsever, &#x201C;Cauchy problem in spacetimes with closed timelike curves,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevD.42.1915"><em>Physical Review D</em> <strong>42</strong> (1990) no. 6, 1915&#x2013;1930</a>.</li><li>(79)I. D. Novikov, &#x201C;Time machine and self-consistent evolution in problems with self-interaction,&#x201D; <a href="http://dx.doi.org/https://doi.org/10.1103/PhysRevD.45.1989"><em>Phys. Rev. D</em> <strong>45</strong> (1992) no. 11, </a>.</li><li>(80)M. Van den Nest and H. J. Briegel, &#x201C;Measurement-based quantum computation and undecidable logic,&#x201D; <a href="http://dx.doi.org/10.1007/s10701-008-9212-6"><em>Foundations of Physics</em> <strong>38</strong> (2008) 448&#x2013;457</a>.</li><li>(81)S. Lloyd, &#x201C;Quantum-mechanical computers and uncomputability,&#x201D; <a href="http://dx.doi.org/10.1103/PhysRevLett.71.943"><em>Physical Review Letters</em> <strong>71</strong> (1993) no. 6, 943&#x2013;946</a>.</li><li>(82)R. Penrose, &#x201C;On gravity&#x2019;s role in quantum state reduction,&#x201D; <a href="http://dx.doi.org/10.1007/BF02105068"><em>General Relativity and Gravitation</em> <strong>28</strong> (1996) 581</a>.</li><li>(83)L. Di&#xF3;si, &#x201C;A universal master equation for the gravitational violation of quantum mechanics,&#x201D; <a href="http://dx.doi.org/https://doi.org/10.1016/0375-9601(87)90681-5"><em>Physics Letters A</em> <strong>120</strong> (1987) 377</a>.</li><li>(84)J. L. Gaona-Reyes, L. Men&#xE9;ndez-Pidal, M. Faizal, and M. Carlesso, &#x201C;Spontaneous collapse models lead to the emergence of classicality of the Universe,&#x201D; <a href="http://dx.doi.org/10.1007/JHEP02(2024)193"><em>JHEP</em> <strong>02</strong> (2024) 193</a>.</li><li>(85)&#xC1;lvaro Perales-Eceiza, T. Cubitt, M. Gu, D. P&#xE9;rez-Garc&#xED;a, and M. M. Wolf, &#x201C;Undecidability in physics: a review,&#x201D; 2024.<a href="https://arxiv.org/abs/2410.16532">https://arxiv.org/abs/2410.16532</a>.</li><li>(86)N. Bostrom, &#x201C;Are we living in a computer simulation?,&#x201D; <a href="http://dx.doi.org/10.1111/1467-9213.00309"><em>Philosophical Quarterly</em> <strong>53</strong> (2003) no. 211, 243&#x2013;255</a>.</li><li>(87)S. Guttenplan, <a href="http://dx.doi.org/10.1007/s12115-023-00832-1"><em>David J. Chalmers, Reality+: Virtual Worlds and the Problems of Philosophy</em></a>, vol. 60.2023.</li><li>(88)D. Deutsch, <em>The Fabric of Reality</em>.Penguin, London, 1997.<a href="https://www.daviddeutsch.org.uk/books/the-fabric-of-reality/">https://www.daviddeutsch.org.uk/books/the-fabric-of-reality/</a>.</li></ul><hr><figure class="kg-card kg-image-card"><img src="https://bc1984.com/content/images/2026/01/27621505715_9e92de5108_b.jpg" class="kg-image" alt="THE UNIVERSE IS REAL" loading="lazy" width="987" height="1024" srcset="https://bc1984.com/content/images/size/w600/2026/01/27621505715_9e92de5108_b.jpg 600w, https://bc1984.com/content/images/2026/01/27621505715_9e92de5108_b.jpg 987w" sizes="(min-width: 720px) 720px"></figure><h3 id="good-luck">Good luck!</h3>]]></content:encoded></item><item><title><![CDATA[INFO FAST]]></title><description><![CDATA[<h3 id="drastically-reducing-twitter-x-usage">Drastically Reducing Twitter (X) Usage</h3><hr><p>Twitter (X) is very addictive for me. This is a problem.</p><p>I can say I enjoy it, that I get value out of it. Some connections, insights, information, entertainment, tips, etc.</p><p>But I don&apos;t get real connection out of it. Not really. At</p>]]></description><link>https://bc1984.com/info-fast/</link><guid isPermaLink="false">695f2a7b0e7cda848203d643</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Thu, 08 Jan 2026 15:38:38 GMT</pubDate><media:content url="https://bc1984.com/content/images/2026/01/plato-allegory-cave.jpg" medium="image"/><content:encoded><![CDATA[<h3 id="drastically-reducing-twitter-x-usage">Drastically Reducing Twitter (X) Usage</h3><hr><img src="https://bc1984.com/content/images/2026/01/plato-allegory-cave.jpg" alt="INFO FAST"><p>Twitter (X) is very addictive for me. This is a problem.</p><p>I can say I enjoy it, that I get value out of it. Some connections, insights, information, entertainment, tips, etc.</p><p>But I don&apos;t get real connection out of it. Not really. At least 99% of the time I don&apos;t.</p><p>I have forged some meaningful connections over the 10 years I&apos;ve been on the platform, don&apos;t get me wrong. But most of those I care about are in other places now, like Signal Groups, which are MUCH healthier.</p><p>Chat rooms and such are okay, I think. Small groups with limited numbers of participants can be good or even great. Part of the reason is that there&apos;s less Identity Signaling there. People are more themselves when there are no structured dopamine hits to be sought after.</p><p><strong>X feels like a Big Waste of Time</strong></p><p>INSTEAD OF BEING PRODUCTIVE OR LIVING LIFE, I END UP WASTING TIME PLAY-ACTING AT BEING ONE OF VARIOUS &quot;FLAVORS OF FAKE&quot;, LIKE:</p><ul><li>collector of based takes</li><li>cause supporter</li><li>outrage entrepreneur</li><li>wittiness appreciator</li><li>degen gambling enabler</li><li>counterculture contrarian</li><li>geopolitical pretender</li><li>macro prognosticator</li><li>cypherpunk larpist</li><li>privacy head-nodder</li><li>sound money chaotician</li></ul><p>WHAT I WANT TO SEE AND EXPERIENCE MORE OF, TRULY, IS...</p><p><em>faith, beauty, art, culture,<br>agriculture, philosophy, freedom tech,<br>wisdom, inspiration, connection,<br>community, good faith testing of ideas,<br>means of promoting important causes, etc.</em></p><h3 id="drop-the-x-just-its-cleaner">&quot;DROP THE X. JUST _______. IT&apos;S CLEANER.&quot;</h3><figure class="kg-card kg-image-card"><img src="https://bc1984.com/content/images/2026/01/plato-cave-2.jpg" class="kg-image" alt="INFO FAST" loading="lazy" width="1400" height="700" srcset="https://bc1984.com/content/images/size/w600/2026/01/plato-cave-2.jpg 600w, https://bc1984.com/content/images/size/w1000/2026/01/plato-cave-2.jpg 1000w, https://bc1984.com/content/images/2026/01/plato-cave-2.jpg 1400w" sizes="(min-width: 720px) 720px"></figure><p>&quot;Impressions&quot; of some of those things I cherish are available on Twitter. But at great cost to me personally. 99.5% of the posts are meaningless to me at best, and harmful to my mental health at worst.</p><p><strong>Why should I have to spend 1000 hours on an increasingly Algo-driven Drivel-slop App in order to get out four mediocre hours and one good hour?</strong></p><p>The truth is, I don&apos;t. I am much better off reading a book, working on my side project, spending time with loved ones and friends, journaling, researching topics of interest directly and independently, or taking a walk, instead of Dope-Scrolling chasing that X-Dragon some more.</p><hr><p>Wish me luck!</p>]]></content:encoded></item><item><title><![CDATA[Pardon Samourai Devs, Mr. President]]></title><description><![CDATA[<p><code>NOTE: SENT TO THE PRESIDENT ON NOVEMBER 20, 2025 VIA whitehouse.gov/contact</code></p><p>Dear Mr. President,</p><p><strong>Please consider granting a pardon to Keonne Rodriguez and William Lonergan Hill, the developers of the bitcoin app known as &#x201C;Samourai Wallet&#x201D;.</strong></p><p>I voted for you in all three elections. I took</p>]]></description><link>https://bc1984.com/pardon-samourai-devs-mr-president/</link><guid isPermaLink="false">691f7a1e0e7cda848203d603</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Thu, 20 Nov 2025 20:41:27 GMT</pubDate><media:content url="https://bc1984.com/content/images/2025/11/fs1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2025/11/fs1.jpg" alt="Pardon Samourai Devs, Mr. President"><p><code>NOTE: SENT TO THE PRESIDENT ON NOVEMBER 20, 2025 VIA whitehouse.gov/contact</code></p><p>Dear Mr. President,</p><p><strong>Please consider granting a pardon to Keonne Rodriguez and William Lonergan Hill, the developers of the bitcoin app known as &#x201C;Samourai Wallet&#x201D;.</strong></p><p>I voted for you in all three elections. I took heat for this from family and supposed friends who were convinced you were a bully or worse. I saw you at an in-person rally in 2016 and knew you were not. You told the story of the sneaky snake that deceived the naive woman and attacked her. You spoke truth to power and pointed out forces of darkness operating in our country.</p><p>In 2020, you were at the receiving end of those forces. The election was stolen from you. We saw them change the numbers. We faced censorship from the powers that be for speaking the truth about the steal.</p><p>In 2024, you were almost killed. I saw you stand up and yell &quot;Fight!&#x201D; and I thanked God. I believe our enemies are delusional or evil or both. You stand as a bulwark against that evil. For that you are an inspiration.</p><p>To your credit you came from outside of the system. I felt like an outsider as well. That is what drew me to technology and eventually bitcoin. It was meritocratic, disruptive and open.</p><p><strong>Bitcoin opens a way for people outside the system to transact despite censors and chokepoints.</strong> It makes permissionless online commerce possible, whether in white, grey or black markets. You exonerated Ross Ulbricht of the Silk Road, so you know this. The freedom community is grateful for you making that situation right. It was unjust how Ross was punished.</p><p>It&apos;s vital for America to uphold Freedom and Justice. Let people live. If someone has broken the law, let it be proven to an impartial judge and jury. In this ideal form, America is a beacon for the rest of the world.</p><p>In reality today, I see that light greatly diminished. I refer to the treatment of developers of open source software for digital payments. <strong>In particular, I ask you to examine the treatment of the Samourai Wallet Developers, Keonne Rodriguez and William Lonergan Hill. </strong></p><p>While you may not be a bitcoin user, I know you understand money. You once accepted a gold bar as payment for a real estate transaction. You know the value of peer-to-peer transactions and assets that don&#x2019;t fade. Bitcoin is fixed in supply and unstoppable in transmission. The critical flaw for individuals who use it, however, is in its transparent ledger. I think you can appreciate this since your tax returns were leaked maliciously. <strong>Lack of privacy endangers us all.</strong></p><p>Keonne and Bill found ways to help users spend bitcoin while obfuscating the origin of their coins. They helped users use bitcoin like it was cash exchanged behind closed doors. Just like your counterparty used gold for their lease deposit on 40 Wall Street in Manhattan in 2011, privately and with no middleman. That this can be done on bitcoin is tremendous for individual liberty and privacy.</p><p>The SDNY declared the Samourai Devs guilty of conspiracy to operate an unlicensed money transmission business. What they actually did is publish open source code that let bitcoin users spend coins privately.</p><p><strong>They never transmitted money.</strong> The app, which was on the Google Play Store for 9 years, was fully non-custodial. FinCEN blessed their non-custodial approach in their VASP guidance.</p><p><strong>Keonne and Bill deserve a full pardon.</strong> The SDNY created an impossible situation for them. They were forced to plead guilty to the money transmission charge despite it being absurd on its face. This was a self-serve tool for users to spend bitcoin privately. They never took possession of anyone&apos;s bitcoin. These men now find themselves at the tip of the spear that is <strong>Operation Chokepoint 2.0</strong>.</p><p>For America to continue to lead the world and protect her citizens, we must reinforce the right for developers to write code confidently, without fear of retribution for the applications they build. <strong>Please help to re-enshrine &#x201C;Code as Speech&#x201D; as part of Free Speech by pardoning Keonne Rodriguez and William Lonergan Hill.</strong></p><p>Thank you for your attention to this matter!</p><hr><figure class="kg-card kg-image-card"><img src="https://bc1984.com/content/images/2025/11/k-and-b.jpg" class="kg-image" alt="Pardon Samourai Devs, Mr. President" loading="lazy" width="1137" height="417" srcset="https://bc1984.com/content/images/size/w600/2025/11/k-and-b.jpg 600w, https://bc1984.com/content/images/size/w1000/2025/11/k-and-b.jpg 1000w, https://bc1984.com/content/images/2025/11/k-and-b.jpg 1137w" sizes="(min-width: 720px) 720px"></figure><h2 id="visit-billandkeonneorg-today"><code>&gt;&gt;&gt;</code> Visit <a href="https://billandkeonne.org/">billandkeonne.org</a> today! <code>&lt;&lt;&lt;</code></h2>]]></content:encoded></item><item><title><![CDATA[Quantum Infeasibility (?)]]></title><description><![CDATA[<p><code>AI;DR: (AI; Didn&apos;t Read) -- I doubt that Cryptographically Relevant Quantum Computing will be developed within the next 50 years. I have read a decent amount of other people&apos;s thoughts about this topic, but was a bit too lazy to synthesize all the notes I</code></p>]]></description><link>https://bc1984.com/quantum-infeasability/</link><guid isPermaLink="false">68f7c9990e7cda848203d5f0</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Tue, 21 Oct 2025 18:06:26 GMT</pubDate><media:content url="https://bc1984.com/content/images/2025/10/a9s5bm.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2025/10/a9s5bm.jpg" alt="Quantum Infeasibility (?)"><p><code>AI;DR: (AI; Didn&apos;t Read) -- I doubt that Cryptographically Relevant Quantum Computing will be developed within the next 50 years. I have read a decent amount of other people&apos;s thoughts about this topic, but was a bit too lazy to synthesize all the notes I had collected into a single coherent essay myself. So I outsourced my thinking to a machine.</code></p><p><code>The content below was written 95% by ChatGPT 5. Latest Addenda by Gemini Pro 3.1.</code></p><p><strong><em>Satoshi&apos;s coins won&apos;t be stolen within your lifetime, most likely.</em></strong></p><p>The concept of quantum computing has captured scientific and public attention for decades. It promises a new form of computation based on the principles of quantum mechanics, where information is encoded in quantum bits known as qubits. These qubits can exist in superposition and can become entangled, allowing quantum computers to perform certain tasks faster than classical computers. However, the practical development of large scale quantum computers that could break modern encryption remains far from reality.</p><p>Many experts and organizations have invested heavily in quantum research. Companies like Google, IBM, Microsoft, and Amazon have all announced progress in creating small prototypes. Some predict useful quantum machines will appear within a few years, showing advantages in chemistry, materials science, or optimization. Yet, most of these claims refer to near term or hybrid systems and not to the large fault tolerant quantum computers necessary for breaking strong encryption like RSA 2048.</p><p>The major technical challenge lies in maintaining quantum coherence. Quantum states are fragile and lose coherence due to interaction with their environment. Maintaining coherence while operating on thousands or millions of qubits requires conditions of extreme precision and isolation. No experiment so far has achieved the stability needed to run deep quantum algorithms over long durations.</p><p>Another obstacle is error correction. Quantum error correction methods require many additional physical qubits to form a single logical qubit that can resist noise. Estimates suggest that millions of physical qubits would be needed to factor large integers such as those used in cryptographic keys. Currently, the largest systems contain only a few thousand noisy qubits, none of which form a fully error corrected logical unit.</p><p>Gate fidelity is also a limiting factor. A quantum computer performs operations called gates that manipulate qubits. These gates must act with extremely high accuracy because small errors accumulate through a computation. Present devices achieve single gate fidelities near 99.9 percent for specific conditions, but complex circuits require far greater stability. Any error above a small threshold renders long algorithms unreliable.</p><p>The hardware itself remains a major barrier. Quantum processors rely on superconducting circuits, trapped ions, photons, or topological effects. Each platform faces unique engineering problems. Scaling any of these approaches to millions of qubits would demand unprecedented advances in materials, manufacturing, and control electronics. Maintaining such systems at cryogenic temperatures and ensuring signal integrity across large networks is far beyond today&#x2019;s capability.</p><p>Recent public demonstrations, such as Google&apos;s quantum supremacy experiment, show quantum devices performing specific sampling tasks faster than supercomputers. However, these tasks were not useful computations. They demonstrated hardware behavior rather than real algorithmic advantage. Such benchmarks do not imply progress toward useful quantum factoring or cryptographic attacks.</p><p>Skeptics argue that the field overstates its achievements. They point to the lack of progress in factoring even small numbers with general purpose quantum algorithms like Shor&#x2019;s. Since the first demonstration of factoring the number 15 in the early 2000s, no larger or fully functional implementations have appeared. Critics claim that many demonstrations involve partial compilation or prior knowledge of the solution, which invalidates them as true computations.</p><p>Theoretical estimates suggest that breaking 2048-bit RSA encryption would require on the order of tens of millions of logical qubits and trillions of error free gate operations. To reach that level within fifty years (by 2075) would mean several orders of magnitude of improvement in coherence, error correction, and manufacturing. Even optimistic projections from major research groups do not foresee such capability within that time frame.</p><p>Some futurists anticipate breakthroughs in topological qubits or other exotic materials that could simplify error correction. These ideas remain speculative. No experiment has yet proven a stable topological qubit capable of scalable computation. If such a discovery occurred soon, new progress could follow, but nothing indicates it will arrive quickly.</p><p>A small number of scholars and engineers have questioned whether large scale quantum computation is possible in principle. They argue that real matter may not support the continuous precision required to manipulate quantum amplitudes accurately across huge state spaces. According to this view, control errors, correlated noise, and physical imperfections could make full scale quantum computing unachievable even in theory.</p><p>Most scientists remain cautiously optimistic but acknowledge that the timeline is uncertain. It is possible that small quantum devices will continue to serve in specific research fields such as quantum chemistry, materials modeling, or limited optimization tasks. These systems may offer valuable insights into physics itself but will not threaten public key cryptography.</p><p>If progress continues at the present pace, useful commercial quantum computers may appear in limited roles within two or three decades. Cryptographically relevant quantum computers, capable of undermining secure communications, are likely much farther in the future, if they ever arrive. The resources required to construct such machines are beyond foreseeable technology.</p><p>In summary, the expectations placed on quantum computing are far greater than what current science supports. Despite major investments and periodic announcements of progress, every significant barrier remains unresolved. Unless new physical phenomena or manufacturing methods are discovered, the dream of a machine that can break RSA 2048 encryption appears infeasible within our lifetime.</p><p><strong>Sources:</strong></p><ul><li><a href="https://scottlocklin.wordpress.com/2019/01/15/quantum-computing-as-a-field-is-obvious-bullshit">https://scottlocklin.wordpress.com/2019/01/15/quantum-computing-as-a-field-is-obvious-bullshit</a></li><li><a href="https://mattdf.xyz/why-quantum-computing-will-take-another-50-years">https://mattdf.xyz/why-quantum-computing-will-take-another-50-years</a></li><li><a href="https://arxiv.org/abs/2211.07629">https://arxiv.org/abs/2211.07629</a></li><li><a href="https://spectrum.ieee.org/the-case-against-quantum-computing">https://spectrum.ieee.org/the-case-against-quantum-computing</a></li><li><a href="https://www.reuters.com/technology/google-says-commercial-quantum-computing-applications-arriving-within-five-years-2025-02-05">https://www.reuters.com/technology/google-says-commercial-quantum-computing-applications-arriving-within-five-years-2025-02-05</a></li><li><a href="https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/a-game-plan-for-quantum-computing">https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/a-game-plan-for-quantum-computing</a></li><li><a href="https://www.bcg.com/publications/2021/building-quantum-advantage">https://www.bcg.com/publications/2021/building-quantum-advantage</a></li><li><a href="https://cacm.acm.org/news/a-quantum-leap-forward">https://cacm.acm.org/news/a-quantum-leap-forward</a></li><li><a href="https://arxiv.org/abs/2303.04061">https://arxiv.org/abs/2303.04061</a></li></ul><hr><h2 id="addendum-march-2026">Addendum: March, 2026</h2><p>Recent work has moved the benchmark beyond the old &#x201C;15 or 21&#x201D; examples, but not in a way that materially changes the conclusion about Cryptographically Relevant Quantum Computers. A 2024 paper on quantum annealing reported the largest factorization problems yet encoded on a D-Wave annealer, up to a (21 x 12)-bit multiplier, and actual experimental runs on available hardware reached instances corresponding to numbers as large as (33,423,105 = 131,071 x 255), though this was done by mapping factoring into a specialized optimization problem rather than by running Shor&#x2019;s algorithm on a fault tolerant gate based quantum computer. A separate 2024 preprint then pushed the announced annealing result to a 29-bit instance using a hybrid classical plus quantum approach, explicitly noting that this does not change the problem&#x2019;s complexity class and mainly improves the practical packaging of small subproblems for present day annealers. In other words, the field has demonstrated better encodings, better embeddings, and somewhat larger toy demonstrations, but not the kind of scalable quantum factoring method that would threaten RSA 2048 in practice. (<a href="https://www.nature.com/articles/s41598-024-53708-7">nature.com</a>)</p><p>Over the next 25 to 50 years, the most reasonable expectation is that this line of work could produce stronger heuristic tools for optimization, better hybrid attacks on small or specially structured arithmetic problems, and perhaps useful preprocessing components inside larger classical cryptanalytic workflows. What it does not presently suggest is a credible annealing path to breaking large public keys at Internet scale. The real cryptographic threat still comes from fault tolerant gate model machines running Shor-type algorithms, and even there the discussion remains about enormous error corrected systems far beyond today&#x2019;s hardware. So this new work is best understood as evidence that quantum annealing is becoming more technically sophisticated, not as evidence that Bitcoin Satoshi-era keys or RSA 2048 are about to become factorable. (<a href="https://arxiv.org/abs/2410.04956">arxiv.org</a>)</p><p><strong>References:</strong></p><ul><li>Ding, Spallitta, Sebastiani et al., &#x201C;Effective prime factorization via quantum annealing by modular locally-structured embedding,&#x201D; <em>Scientific Reports</em> (2024). (<a href="https://www.nature.com/articles/s41598-024-53708-7">nature.com</a>)</li><li>&#x201C;Maximizing the practical achievability of quantum annealing attacks on factorization-based cryptography,&#x201D; arXiv:2410.04956 (2024). (<a href="https://arxiv.org/abs/2410.04956">arxiv.org</a>)</li><li>Craig Gidney, &#x201C;How to factor 2048 bit RSA integers with less than a million noisy qubits,&#x201D; arXiv:2505.15917 (2025). (<a href="https://arxiv.org/abs/2505.15917?utm_source=openai">arxiv.org</a>)</li></ul><hr><h2 id="addendum-ii-late-march-2026">Addendum II: Late March, 2026</h2><p>While the early March 2026 quantum annealing updates did not threaten RSA-2048, a separate wave of gate-model breakthroughs published just weeks later now forces a material reassessment of my 50-year timeline. The existential threat to cryptography has shifted entirely away from RSA and onto Elliptic Curve Cryptography (ECC-256), the standard that secures Bitcoin and Ethereum.</p><p>Because ECC relies on much smaller keys for the same level of classical security, it presents a drastically smaller quantum target. As researchers recently summarized, &quot;ECC-256 requires roughly 100x fewer quantum operations to break than RSA-2048 at the same classical security level&quot; [1].</p><p>By combining this smaller algorithmic footprint with new high-rate quantum error-correcting codes, researchers have shattered the &quot;millions of physical qubits&quot; assumption. A theoretical hardware architecture proposed by researchers from Oratomic, Caltech, and UC Berkeley demonstrates that &quot;Shor&#x2019;s algorithm can be executed at cryptographically relevant scales with as few as 10,000 reconfigurable atomic qubits&quot; [1]. They project that by scaling up slightly to roughly 26,000 neutral-atom physical qubits, the algorithm could break ECC-256 in about 10 days [1].</p><p>Simultaneously, a whitepaper from Google Quantum AI mapped identical vulnerabilities for superconducting architectures, proving their circuits &quot;can execute on a superconducting qubit CRQC with fewer than 500,000 physical qubits in a few minutes&quot; [2].</p><p>However, before concluding that Satoshi&apos;s coins will be stolen tomorrow, we must contextualize these numbers within the strict physical and temporal realities of a cryptographic attack. There is a massive distinction between the time required to attack a dormant wallet versus the time required to intercept a live network transaction.</p><h3 id="the-mempool-on-spend-window">The Mempool &quot;On-Spend&quot; Window</h3><p>To steal a live Bitcoin transaction, an attacker must execute an &quot;on-spend&quot; attack. When a user broadcasts a transaction, it sits unconfirmed in the public mempool for roughly 10 minutes before miners record it to the blockchain. During this window, the sender&apos;s public key is exposed. To intercept the funds, a quantum attacker must derive the private key, forge a redirect transaction, and submit it with a higher miner fee all before the 10-minute clock expires.</p><p>The Google whitepaper correctly identifies that only &quot;fast-clock&quot; architectures (like superconducting qubits) could act swiftly enough to execute these real-time attacks. Google estimates that &quot;the first fast-clock CRQCs would enable &apos;on-spend&apos; attacks on public mempool transactions&quot; [2]. But crucially, achieving this speed requires abandoning high-compression, low-qubit algorithms. A January 2026 study by Kim et al. analyzed circuits optimized specifically for execution speed, finding that breaking an elliptic curve in 34 minutes would require an 19.1 million physical qubits, and extending that to 96 minutes would require roughly 6.9 million [8]. Therefore, a massive, million-qubit array was expected to be the minimum barrier to entry for the speed required to perform a mempool heist.</p><h3 id="homing-in-on-slow-clock-architecture-targets">Homing in on &quot;Slow-Clock Architecture&quot; Targets</h3><p>Conversely, the much smaller 26,000-qubit neutral-atom system proposed by Oratomic is a &quot;slow-clock&quot; architecture. Measuring its stabilizer cycles takes roughly 1 millisecond per step, extending the time to break a key out to 10 days [1]. A machine that takes a week and a half to solve a key cannot perform a 10-minute mempool heist. Its only viable targets would be exposing the keys of &quot;dormant digital assets&quot; with already-known public keys, such as early-era Satoshi wallets.</p><h3 id="the-physics-of-perfect-integration">The Physics of Perfect Integration</h3><p>Finally, we must distinguish theoretical minimums from functional hardware. Neutral atom arrays trapping upwards of 6,100 physical qubits already exist in laboratories today [1]. But perfectly integrating these innovations with deep-circuit coherence on a reliable, stable, fault-tolerant 26,000 qubit system is a monumental leap.</p><p>We know from a recent EUROCRYPT 2026 paper by the INRIA Rennes team (Chevignard et al.) that minimizing the qubit footprint requires a massive increase in the sheer volume of operations. They proved you can shrink the footprint for ECC-256 to just 1,098 logical qubits, but it requires executing upwards of 2^38.10 Toffoli gates [9]. Running Shor&apos;s algorithm at that depth for 10 consecutive days requires the quantum computer to execute billions of logical operations without a single uncorrectable error. The authors of the Oratomic paper openly acknowledge this gap, stating, &quot;substantial engineering challenges remain&quot; to integrate continuous large-scale trapping, universal operations, and high-rate magic state generation into one unified apparatus [1].</p><h3 id="takeaways">Takeaways</h3><p>My previous 50-year estimate is now officially dead. The theoretical barrier to breaking ECC-256 has dropped from millions of qubits to tens of thousands, placing the physical hardware scale potentially within a 10-to-15 year horizon. However, successfully maintaining fault-tolerance for days on end to execute billions of gates and rob a dormant wallet, let alone building a multi-million physical qubit superconducting machine to rob in-flight active transactions in 10 minutes, ensures that the practical, existential threat to the crypto economy remains safely out of the immediate, near-term future.</p><hr><h2 id="ranking-of-bitcoin-output-and-address-types-for-long-term-storage-with-quantum-security-in-mind-assuming-no-address-reuse">Ranking of Bitcoin output and address types for long-term storage with quantum security in mind, assuming NO ADDRESS REUSE</h2><h3 id="least-suitable-for-quantum-conscious-cold-storage">Least suitable for quantum-conscious cold storage:</h3><ul><li><strong>Pay-to-Public-Key (P2PK)</strong> -- Prefix: none -- This early Bitcoin output type locks funds directly to a raw public key. If cryptographically relevant quantum computers are ever built, outputs of this type would be direct targets for Shor&#x2019;s algorithm because the public key is already exposed on-chain.</li><li><strong>Pay-to-Taproot (P2TR)</strong> -- Prefix: <code>bc1p</code> -- Taproot outputs commit directly to a tweaked x-only public key rather than hiding it behind a hash until spend. That means dormant unspent outputs would also be direct targets for a future Shor-capable quantum attacker, making P2TR less attractive for very long-term cold storage if quantum risk is a primary concern.</li></ul><h3 id="most-suitable-for-quantum-conscious-cold-storage">Most suitable for quantum-conscious cold storage:</h3><ul><li><strong>Pay-to-Public-Key-Hash (P2PKH)</strong> -- Prefix: <code>1</code> -- This legacy format hides the public key behind a 160-bit HASH160 commitment until the output is spent. That public-key-hiding property is the main quantum-relevant advantage for long-term storage.</li><li><strong>Pay-to-Script-Hash (P2SH)</strong> -- Prefix: <code>3</code> -- Commonly used for older multisig and script-based wallets, P2SH hides the redeem script behind a 160-bit HASH160 commitment until spend. As with other hash-committed outputs, its primary quantum advantage is that spending details are not revealed while the coins remain dormant.</li><li><strong>Pay-to-Witness-Public-Key-Hash (P2WPKH)</strong> -- Prefix: <code>bc1q</code> -- Native SegWit single-key output type. Preserves the same key-hiding benefit as P2PKH while also improving transaction weight efficiency. For unspent outputs, the public key remains hidden until it is revealed in a spending transaction.</li><li><strong>Pay-to-Witness-Script-Hash (P2WSH)</strong> -- Prefix: <code>bc1q</code>, typically longer than P2WPKH -- Native SegWit script-based output type. Hides the witness script behind a SHA-256 commitment until spend and also benefits from SegWit&#x2019;s transaction-weight advantages. Because it uses a 256-bit hash commitment instead of HASH160, it has a larger theoretical margin against Grover-style preimage search. However, this does not currently create a major practical quantum-security advantage over P2PKH, P2SH, or P2WPKH.</li></ul><h3 id="bottom-line">Bottom line:</h3><p>For Bitcoin long-term storage under realistic quantum threat models, the dominant benefit is keeping the public key unrevealed until spend. On that dimension, <strong>P2PKH</strong>, <strong>P2SH</strong>, <strong>P2WPKH</strong>, and <strong>P2WSH</strong> all achieve the main protection. P2WSH&#x2019;s 256-bit hashing provides a higher theoretical margin against Grover-style preimage attacks, but this distinction is secondary in practice. The main quantum concern remains Shor&#x2019;s algorithm against already-exposed public keys.</p><hr><h3 id="references">References</h3><ol><li>Shor&apos;s algorithm is possible with as few as 10,000 reconfigurable atomic qubits: <a href="https://arxiv.org/abs/2603.28627">https://arxiv.org/abs/2603.28627</a></li><li>Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations: <a href="https://quantumai.google/static/site-assets/downloads/cryptocurrency-whitepaper.pdf">https://quantumai.google/static/site-assets/downloads/cryptocurrency-whitepaper.pdf</a></li><li>How to factor 2048 bit RSA integers with less than a million noisy qubits: <a href="https://arxiv.org/html/2505.15917v1">https://arxiv.org/html/2505.15917v1</a></li><li>The Post-Quantum Clock Is Already Ticking - And Almost Nobody Is Ready: <a href="https://coderlegion.com/12840">https://coderlegion.com/12840</a></li><li>Google Urges Governments to Accelerate Quantum-Resistant Encryption Adoption: <a href="https://mlq.ai/news/google-urges-governments-to-accelerate-quantum-resistant-encryption-adoption-amid-imminent-threats">https://mlq.ai/news/google-urges-governments-to-accelerate-quantum-resistant-encryption-adoption-amid-imminent-threats</a></li><li>Q-Day Revisited &#x2013; RSA-2048 Broken by 2030: Detailed Analysis: <a href="https://postquantum.com/q-day/q-day-y2q-rsa-broken-2030">https://postquantum.com/q-day/q-day-y2q-rsa-broken-2030</a></li><li>A new era of quantum computing may pose threats closer than we think, Google warns: <a href="https://www.euronews.com/next/2026/03/27/a-new-era-of-quantum-computing-may-pose-threats-closer-than-we-think-google-warns">https://www.euronews.com/next/2026/03/27/a-new-era-of-quantum-computing-may-pose-threats-closer-than-we-think-google-warns</a></li><li>New Quantum Circuits for ECDLP: Breaking Prime Elliptic Curve Cryptography in Minutes: <a href="https://eprint.iacr.org/2026/106">https://eprint.iacr.org/2026/106</a></li><li>Reducing the Number of Qubits in Quantum Discrete Logarithms on Elliptic Curves: <a href="https://eprint.iacr.org/2026/280">https://eprint.iacr.org/2026/280</a></li><li>Bitcoin Address Types (Unchained): <a href="https://www.unchained.com/blog/bitcoin-address-types-compared">https://www.unchained.com/blog/bitcoin-address-types-compared</a></li></ol>]]></content:encoded></item><item><title><![CDATA[PGP Key Management]]></title><description><![CDATA[<p><strong>This post outlines PGP key practices through user scenarios and hardware-based options for Linux users, focusing on security and usability.</strong></p><h2 id="pgp-key-vignettes">PGP Key Vignettes</h2><p><strong>Alex</strong> is a sales rep learning about Linux and encryption. He is dipping his toes in for the first time on using PGP for secure email. He</p>]]></description><link>https://bc1984.com/pgp-key-management/</link><guid isPermaLink="false">68af2c670e7cda848203d597</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Wed, 27 Aug 2025 16:39:43 GMT</pubDate><media:content url="https://bc1984.com/content/images/2025/08/keyoxide.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2025/08/keyoxide.jpg" alt="PGP Key Management"><p><strong>This post outlines PGP key practices through user scenarios and hardware-based options for Linux users, focusing on security and usability.</strong></p><h2 id="pgp-key-vignettes">PGP Key Vignettes</h2><p><strong>Alex</strong> is a sales rep learning about Linux and encryption. He is dipping his toes in for the first time on using PGP for secure email. He uses Thunderbird on Ubuntu. He starts by installing GnuPG via <code>sudo apt install gnupg</code> and generates a key pair with <code>gpg --full-generate-key</code>, choosing a strong passphrase he stores in a password manager like KeePassXC. For safety, he backs up his key to an encrypted USB drive kept offline. To make daily use easy, he sets up Thunderbird&apos;s built-in OpenPGP support to handle encryption automatically after entering his passphrase once per session. Alex practices by sending test emails to himself, ensuring he never shares his private key and revokes it if his laptop is ever compromised.</p><p><strong>Jordan</strong> is a Senior IT Admin at X/xAI who must safeguard his PGP keys like a fortress while signing and decrypting messages dozens of times a day. He runs RHEL and relies on GnuPG for core operations, generating subkeys with <code>gpg --expert --full-generate-key</code> so the master key stays on an air-gapped machine, offline in a secure locker. For usability, he pairs his setup with a YubiKey: after installing <code>sudo dnf install yubikey-manager pcsc-lite gnupg2 yubikey-personalization</code>, he transfers subkeys to the YubiKey using <code>gpg --edit-key</code> and card commands, enabling touch-to-confirm for each sign/decrypt action. This way, Jordan plugs in the YubiKey for quick, hardware-protected access via tools like <code>gpg --card-status</code>, rotating subkeys once a year with <code>gpg --edit-key</code> to revoke old ones &#x2014; balancing ironclad protection with the speed needed for high-volume work.</p><p><strong>Riley</strong> is an anonymous software dev building open-source crypto wallet software. He needs PGP to sign code releases and his APKs he compiles, and for communicating with his mutuals while protecting everyone&apos;s identity. Riley uses TAILS OS and GnuPG, creating keys anonymously via <code>gpg --full-generate-key</code> on the &quot;amnesiac&quot; live USB boot for isolation, so nothing is retained in RAM or on disk (unless he uses persistent encrypted storage), and no personal details are attached to his keys. He chooses to export his master key and revocation certificate to an encrypted external USB drive for offline storage, so nothing persists after shutdown. For top-tier protection, he has opted to use a NitroKey (installing the libraries needed with <code>sudo apt update &amp;&amp; sudo apt install nitrokey-app opensc pcscd libccid libpcsclite1 scdaemon</code>). He loads his keys onto it with <code>gpg --edit-key</code> and card tools, requiring a PIN and touch confirmation for each use. When building wallet binaries, Riley uses GnuPG and signs his git commits with <code>git config --global gpg.program gpg</code>, talking to the NitroKey. Riley keeps everything air-gapped for sensitive tasks, backing up encrypted exports to multiple secure locations and using Tor for key and signature publication &#x2014; ensuring anonymity and key integrity in his high-stakes crypto dev world.</p><h2 id="passphrases">Passphrases</h2><p>When generating passphrases, use something like the <a href="https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases">diceware</a> list with 7+ words, for example, to protect against offline cracking of the key file itself. This is most important for software-stored private keys. For hardware-stored keys, a PIN is typically used.</p><h2 id="other-options-generating-keys-on-hardware-devices">Other Options: Generating Keys on Hardware Devices</h2><p>To generate PGP keys directly on a YubiKey on Debian Linux, first install prerequisites with <code>sudo apt update &amp;&amp; sudo apt install yubikey-manager pcscd gpg</code>. Insert the YubiKey, reset the OpenPGP applet if needed via <code>ykman openpgp reset</code>, and set PINs with <code>ykman openpgp access set-pin</code>. Then, generate keys on-device using <code>gpg --card-edit</code>, entering admin mode with <code>admin</code> and running <code>generate</code> to create the master key and subkeys (e.g., RSA 4096-bit, or EdDSA with Curve25519). Export the public key with <code>gpg --export --armor YOUR_KEY_ID &gt; public-key.asc</code> and pre-generate a revocation certificate via <code>gpg --output revoke.asc --gen-revoke YOUR_KEY_ID</code>; store these encrypted offline. Private keys remain secured on the device and aren&apos;t exportable. (You cannot recover your master private key from the device if lost!)</p><p>For a NitroKey on Debian, install dependencies using <code>sudo apt update &amp;&amp; sudo apt install nitrokey-app opensc pcscd libccid libpcsclite1 scdaemon</code>. Insert the device and verify with <code>nitrokey-app</code> or <code>nk-info</code>. Initialize by setting PINs in the NitroKey app or via <code>gpg --card-edit</code> (use <code>admin</code> mode). Generate keys on-device in the GnuPG prompt with <code>generate</code>, specifying options like key type and size (e.g., RSA 4096-bit or EdDSA with Curve25519). Export the public key (<code>gpg --export --armor YOUR_KEY_ID &gt; public-key.asc</code>) and create a revocation certificate (<code>gpg --output revoke.asc --gen-revoke YOUR_KEY_ID</code>), encrypting and storing them offline; private keys stay non-exportable on the hardware for security. (You cannot recover your master private key from the device if lost!)</p><p>Generating and storing PGP keys on hardware devices like YubiKey or NitroKey offers strong security by ensuring private keys never leave the secure element, protecting against software-based attacks or malware, but it introduces tradeoffs like the risk of total loss if the device is damaged, stolen, or fails, as keys can&apos;t be easily extracted. Recovery relies on revoking via pre-made certificates and regenerating from an offline master (if using subkeys), which can cause downtime. As an alternative backup strategy, you could provision identical subkeys on a second or third identical device (e.g., another YubiKey) using GnuPG&apos;s <code>keytocard</code> command after initial generation, storing these extras off-site in a secure location like a safe &#x2014; providing redundancy without exposing keys digitally, though it adds cost and requires careful handling to avoid compromising multiple devices.</p><h2 id="best-practice-for-best-security">Best Practice for Best Security</h2><p>Best practice is generating the master key fully offline on a secure airgapped computer, and then generating subkeys which can be used on your daily &quot;online&quot; computers (e.g., for software like Thunderbird) or copied over onto multiple hardware keys like YubiKey or NitroKey for convenience and redundancy. Subkeys can be replaced (with verifiability through a signature from the airgapped master key) as needed, if lost.</p><p>In practice, you should always generate revocation certificates upfront for both the master key and subkeys, and then encrypt them and store backups offline. This helps to avoid issues if any hardware fails or anything is stolen.</p><h2 id="distributing-your-pgp-keys">Distributing Your PGP Keys</h2><p>For easy distribution, publish your public key using <code>gpg --send-keys YOUR_KEY_ID</code> to popular OpenPGP keyservers like <a href="https://keys.openpgp.org/">keys.openpgp.org</a>, <a href="https://pgp.mit.edu/">pgp.mit.edu</a>, or <a href="https://keyserver.ubuntu.com/">keyserver.ubuntu.com</a>; alternatively, upload to <a href="https://keybase.io/">Keybase</a> for social-proof integration, ensuring others can easily find and verify your key.</p><h2 id="summary">Summary</h2><p>These PGP strategies offer practical ways to secure keys for various needs, from basic email to high-stakes development, with hardware options improving protection when paired with revocation certificates and subkeys.</p><hr><h3 id="addendum">Addendum</h3><ul><li>For those with the most to lose, consider that when sharing your PGP public key out to various sites (like public key servers), that some of them will log or retain IP addresses; Best do everything over Tor.</li><li>Also consider keeping separate PGP keys for separate purposes; Don&apos;t reuse one key for multiple nyms.</li></ul><hr><h3 id="additional-resources">Additional Resources</h3><ul><li>Diverter: &quot;As Easy as P, G, P&quot; (Archived) - <a href="https://web.archive.org/web/20230208170414mp_/https://diverter.hostyourown.tools/as-easy-as-pgp/">https://web.archive.org/web/20230208170414mp_/https://diverter.hostyourown.tools/as-easy-as-pgp/</a></li><li>OpenKeychain (FOSS Android App): <a href="https://www.openkeychain.org/">https://www.openkeychain.org/</a> ; <a href="https://github.com/open-keychain/open-keychain">https://github.com/open-keychain/open-keychain</a></li><li>Dread /d/pgp &quot;Best of&quot; Collection: dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad[.]onion/post/536223499f033f4a873a &#x2013; <em>remove the <code>[</code> and <code>]</code> characters and navigate to it in Tor Browser</em></li></ul>]]></content:encoded></item><item><title><![CDATA[One Thousand Diverted, One Million Discouraged: Android Innovation Extinguished]]></title><description><![CDATA[<p>Google&apos;s new developer verification policy, though packaged as &quot;security,&quot; erects digital barbed wire around Android&apos;s open frontier. For every leviathan institution applauding this gatekeeping, a thousand innovators and dissidents are silenced. What follows isn&#x2019;t speculation &#x2014; it&#x2019;s tomorrow&apos;s</p>]]></description><link>https://bc1984.com/android-innovation-extinguished/</link><guid isPermaLink="false">68ae10740e7cda848203d568</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Tue, 26 Aug 2025 20:08:16 GMT</pubDate><media:content url="https://bc1984.com/content/images/2025/08/barbedwirebw.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2025/08/barbedwirebw.jpg" alt="One Thousand Diverted, One Million Discouraged: Android Innovation Extinguished"><p>Google&apos;s new developer verification policy, though packaged as &quot;security,&quot; erects digital barbed wire around Android&apos;s open frontier. For every leviathan institution applauding this gatekeeping, a thousand innovators and dissidents are silenced. What follows isn&#x2019;t speculation &#x2014; it&#x2019;s tomorrow&apos;s graveyard of unborn tools.</p><h2 id="consider-the-ramifications">Consider the Ramifications</h2><p>In <strong>Singapore</strong>, Li Wei wants to build a zero-knowledge ballot auditing app. As a pseudonymous cypherpunk operating from a state with compulsory ID laws, he intends to help journalists verify elections without exposing sources. Verification demands would reveal his identity &#x2014; and turn whistleblowers using his app into targets.</p><p>In <strong>Nigeria</strong>, Chidi wants to build a p2p Tether USDt wallet routing through decentralized exchanges. Trapped under capital controls where banks report transactions to authorities, he needs anonymity to help protest organizers keep control of their own funds without any unecessary PII leaks.</p><p>In <strong>Afghanistan</strong>, Fatima and Zahra want to build F-droid animal husbandry guides for predominatly illiterate shepards. Their situation: Denied IDs under Taliban rule and forbidden from official tech work by male guardians, their offline-first app offers science-based livestock care &#x2014; a lifeline for struggling villages.</p><p>In <strong>Indonesia</strong>, Asep wants to build a labor-union app to help plan and coordinate strikes. Working in Jakarta&#x2019;s palm oil industry, Asep wants to help others document wage theft through covert audio logs and cannot risk employer retaliation via state-linked ID databases.</p><p>In <strong>Thailand</strong>, Niran wants to build a Bluetooth panic-alert mesh for democracy rallies. Living under a monarchy where protest coordinators face sedition charges, his identity exposure through verification makes his family vulnerable to royalist militias.</p><p>In <strong>America</strong>, Jordan has been working on a new kind of network proxy app that can easily route traffic through multiple, potentially hostile ISPs on the most affordable stock-Android phones. As the architect of a next-gen Tor-type network, he requires absolute anonymity. If his adversaries subpoena Google, or simply hack into the centralized ID Verification databases to get his identity, his very life may be at stake, much less his new protocol.</p><p>In <strong>Japan</strong>, Kenji wants to build a salaryman privacy tool for scrubbing biometric data from workplace surveillance apps. As he is employed at a zaibatsu that requires full digital transparency, his moonlight project could cost him his career if it were linked to his ID.</p><p>In <strong>Sweden</strong>, Elin wants to build a GPS-free forest defender network for Sami reindeer herders. Activists resisting state-backed mining ops need detailed land-rights maps, which she can help others to piece together collaboratively. But she must avoid leaving any breadcrumbs that governments can easily pick up through app developer registries.</p><h2 id="what-alternative-do-developers-have">What Alternative Do Developers Have?</h2><p>So what choice do these developers now have? They must now abandon their code, or move their projects onto other, less accessible platforms.</p><p>Li Wei&#x2019;s auditing app might vanish into Signal chats or Progressive Web Apps (PWAs).</p><p>Chidi&#x2019;s wallet prototype could become a &quot;text guide&quot; on Telegram, sure. But its impact is greatly reduced.</p><p>What about Fatima and Zahra&#x2019;s animal care manuals? All they are left with is to revert to oral traditions. But their reach is now limited to their immediate vicinity (again).</p><p>Asep&#x2019;s strike tool will surely die without the anonymity and option to simply distribute through sideloading now.</p><p>Niran&#x2019;s protest mesh? It will collapse into whispered warnings and covert hand signals.</p><p>Jordan&#x2019;s network proxy, meanwhile, will have to migrate to Raspberry Pi&apos;s, Linux Phones, and laptops and avoid Android entirely.</p><p>Kenji&#x2019;s anti-surveillance tool will be dropped like a burner phone into a storm drain, left to rot in an anonymous Codeberg graveyard.</p><p>Elin&#x2019;s land-mapping? She will need to surrender to and rely on corporate cartographers, who are unlikely to share her mission.</p><p>It is all well and good for Google to get endorsements for their new policy from banks and technocratic nation states, and claim to be supporting user security. But the policy in and of itself is fundamentally hostile to the frictionless innovation that Android once championed. The 2nd and 3rd order effects are clear if you spend more than 1 minute thinking about what will be lost.</p><p>If Google really puts the new policy into practice, it will be the dictators that win. The dissidents and pioneers will fade away, or remain in the dark for good.</p><p>The <code>developerID</code> &quot;Know Your Developer&quot; program isn&#x2019;t accountability. It is a kill-switch for corporations and corrupt governments.</p><p>Google must reconsider. We need categorical carveouts for apps distributing open-source binaries (and APKs), privacy/security tools requiring operational anonymity, and non-commercial projects that are just getting started.</p><p><strong>Please reconsider, Google.</strong></p><h2 id="request-to-readers">Request To Readers</h2><p><strong>Please submit your own feedback at the link below. This is critical!</strong></p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://docs.google.com/forms/d/e/1FAIpQLSfN3UQeNspQsZCO2ITkdzMxv81rJDEGGjO-UIDDY28Rz_GEVA/viewform"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Android developer verification requirements</div><div class="kg-bookmark-description">Use this form to submit questions or feedback about the new Android developer verification requirements announced in August 2025. You can learn more about the requirements in the Android developer verification guide. Sign up for early access here.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://ssl.gstatic.com/docs/forms/device_home/android_192.png" alt="One Thousand Diverted, One Million Discouraged: Android Innovation Extinguished"><span class="kg-bookmark-author">Google Docs</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://lh5.googleusercontent.com/rlHhjha4C8YRTEvp-uWygry1v5Kzc_ZhcrIrw85GjS1zdVotTWEQifrKWWqaBROMvkSpvaAOwuC9Gk8l3lKQ5blSo5RaezH9JPGFz0dOWUpY0R-y93k=w1200-h630-p" alt="One Thousand Diverted, One Million Discouraged: Android Innovation Extinguished"></div></a></figure><hr><p>LINKS:</p><ul><li><a href="https://web.archive.org/web/20250826090045/https://android-developers.googleblog.com/2025/08/elevating-android-security.html">https://web.archive.org/web/20250826090045/https://android-developers.googleblog.com/2025/08/elevating-android-security.html</a></li><li><a href="https://web.archive.org/web/20250826094228/developer.android.com/developer-verification">https://web.archive.org/web/20250826094228/developer.android.com/developer-verification</a></li></ul>]]></content:encoded></item><item><title><![CDATA[Review of Ashigaru Whirlpool: RSA Blinding & Deanonymization Concerns]]></title><description><![CDATA[<p><strong>&gt;&gt; UPDATED on Sat Jul 12, 2025 at 05:38:00 UTC &lt;&lt;</strong></p><p><code><strong>view also as gist: <a href="https://gist.github.com/84adam/e130b40cff5915de67b86fc8e452c8aa"><a href="https://gist.github.com/84adam/e130b40cff5915de67b86fc8e452c8aa">https://gist.github.com/84adam/e130b40cff5915de67b86fc8e452c8aa</a></a></strong></code></p><hr><h1 id="ashigaru-whirlpool-security-analysis">Ashigaru Whirlpool Security Analysis</h1><h2 id="introduction-to-the-problem">Introduction to the Problem</h2><p>The Ashigaru Whirlpool coordinator has faced significant scrutiny regarding its implementation of RSA blinding protections for Bitcoin</p>]]></description><link>https://bc1984.com/ashigaru-terminal-whirlpool-review/</link><guid isPermaLink="false">687191a40e7cda848203d547</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Fri, 11 Jul 2025 22:41:20 GMT</pubDate><media:content url="https://bc1984.com/content/images/2025/07/ashigaru-illustration-3.png" medium="image"/><content:encoded><![CDATA[<img src="https://bc1984.com/content/images/2025/07/ashigaru-illustration-3.png" alt="Review of Ashigaru Whirlpool: RSA Blinding &amp; Deanonymization Concerns"><p><strong>&gt;&gt; UPDATED on Sat Jul 12, 2025 at 05:38:00 UTC &lt;&lt;</strong></p><p><code><strong>view also as gist: <a href="https://gist.github.com/84adam/e130b40cff5915de67b86fc8e452c8aa"><a href="https://gist.github.com/84adam/e130b40cff5915de67b86fc8e452c8aa">https://gist.github.com/84adam/e130b40cff5915de67b86fc8e452c8aa</a></a></strong></code></p><hr><h1 id="ashigaru-whirlpool-security-analysis">Ashigaru Whirlpool Security Analysis</h1><h2 id="introduction-to-the-problem">Introduction to the Problem</h2><p>The Ashigaru Whirlpool coordinator has faced significant scrutiny regarding its implementation of RSA blinding protections for Bitcoin coinjoins. These concerns were first raised in a Bitcoin Talk forum post titled &quot;New ashigaru whirlpool coordinator can de-anonymize users&quot; on June 23, 2025 [1], which highlighted potential vulnerabilities that could allow a malicious coordinator to link inputs and outputs during the mixing process.</p><p>The core issue stems from a vulnerability originally discovered by security researcher &quot;nothingmuch&quot; in December 2024 [2], which demonstrated that whirlpool coordinators could potentially deanonymize users by providing each participant with a unique RSA public key during the blind signature process. Since different clients would receive different keys, the coordinator could later correlate the unblinded signatures with specific users, completely breaking the anonymity guarantees of the ZeroLink protocol.</p><p>The Bitcoin Talk forum discussion revealed several technical concerns. The original poster, 1440000bytes, examined both the Ashigaru Whirlpool client and server code repositories and concluded that &quot;the vulnerability is not fixed.&quot; The analysis pointed to code in the client that appeared to still accept server-provided RSA public keys, and server code that continued to send public keys to clients. However, as the discussion progressed, it became apparent that the situation was more nuanced than initially presented.</p><p>A subsequent forum post by the same user noted that Ashigaru Terminal [4] appeared to use a different approach than the standalone whirlpool client, implementing hardcoded RSA public keys rather than accepting keys from the server. This observation led to further investigation of whether this approach actually solved the original vulnerability or introduced new security concerns. The forum discussion also raised additional potential attack vectors, including DoS vulnerabilities and the possibility that coordinators could still perform linking attacks even with hardcoded keys.</p><p>The debate highlighted the complexity of implementing secure coinjoin protocols and the challenges faced by developers attempting to maintain privacy guarantees while preventing coordinator-based attacks. Community members, including Wasabi maintainer lontivero, emphasized that the criticism was not motivated by competition but by genuine security concerns from privacy advocates seeking to improve the ecosystem. This context sets the stage for a detailed technical analysis of how Ashigaru Terminal actually implements RSA blinding and whether the current approach adequately addresses the identified vulnerabilities.</p><h2 id="initial-analysis-the-hardcoded-key-approach">Initial Analysis: The Hardcoded Key Approach</h2><p>Our first comprehensive analysis focused on examining the Ashigaru Terminal codebase to understand how it handled RSA public keys for blind signature operations. The investigation revealed what initially appeared to be a robust fix for the original vulnerability discovered by nothingmuch.</p><p>The key finding was in the <code>MixProcess.java</code> file within the Terminal&apos;s <code>darkjar</code> module, where we discovered that the client implementation explicitly rejects any RSA public keys sent by the coordinator. The critical code section showed that when the server attempts to provide a public key through the <code>confirmInputMixStatusNotification.publicKey64</code> field, the client immediately throws a <code>ProtocolException</code> with the message &quot;not expected to receive public key for blind signature from whirlpool server.&quot; This represented a fundamental departure from the original vulnerable implementation where clients would accept and use whatever public key the server provided.</p><p>Instead of using server-provided keys, the Ashigaru Terminal implementation relies on hardcoded RSA public keys embedded within the client application itself. These keys are stored as PEM files in the client&apos;s resources directory, with separate keys for mainnet and testnet operations. The mainnet key is located at <code>cipher/mainnet/blind_signature_public_key.pem</code> and the testnet key at <code>cipher/testnet/blind_signature_public_key.pem</code>. The client&apos;s <code>MixClient.java</code> loads the appropriate key based on the network configuration during initialization.</p><p>This approach appeared to completely eliminate the per-client key differentiation attack vector. Since all clients use the same hardcoded public key regardless of what the server sends, a malicious coordinator cannot provide different keys to different participants within the same mixing round. The cryptographic operations would fail if the server attempted to sign with a different private key than the one corresponding to the client&apos;s hardcoded public key, making the attack technically impossible.</p><p>Our initial analysis concluded that this implementation represented a significant security improvement over the original vulnerable whirlpool protocol. The hardcoded key approach seemed to provide strong protection against coordinator-based deanonymization attempts while maintaining the core functionality of the blind signature protocol. We documented the specific RSA public keys used by the system and verified that the client&apos;s rejection mechanism would prevent any fallback to vulnerable behavior.</p><p>However, this initial assessment was based on an incomplete understanding of how the server-side implementation actually worked and how the client-server interaction functioned in practice. The analysis failed to account for the full protocol flow and made incorrect assumptions about the cryptographic mismatch between client and server operations.</p><h2 id="corrected-analysis-understanding-the-complete-system">Corrected Analysis: Understanding the Complete System</h2><p>Upon receiving expert feedback that challenged our initial conclusions, we conducted a more thorough investigation that revealed fundamental flaws in our original analysis. The expert reviewer correctly pointed out that &quot;reusing the same key for all rounds doesn&apos;t solve the problem. It actually makes the task easier for a malicious coordinator.&quot; This critique prompted a deeper examination of both the client and server implementations.</p><p>The corrected analysis revealed that our original assessment had misunderstood how the Ashigaru system actually operates. Rather than creating a cryptographic mismatch between client and server, the system actually implements a coordinated approach where both sides use the same static RSA keypair. The server-side implementation in <code>CryptoService.java</code> shows that the coordinator must be configured with a <code>blindSignaturePrivateKeyPath</code> pointing to a static RSA private key file that corresponds to the public key hardcoded in the client.</p><p>The critical insight came from examining the <code>Mix</code> constructor in the server code. When a new mixing round begins, the server loads its static keypair through <code>cryptoService.getOrGenerateKeyPair()</code>, but then sets the <code>publicKey</code> field to an empty byte array (<code>new byte[0]</code>). This empty array is then encoded and sent to clients as part of the <code>ConfirmInputMixStatusNotification</code>. When clients receive this empty array and decode it, the result passes the security check (<code>publicKey.length &gt; 0</code> evaluates to false), causing the client to fall back to its hardcoded public key.</p><p>This design ensures that both client and server use the same static RSA keypair for all blind signature operations. The server must be configured with the private key that corresponds to the client&apos;s hardcoded public key, otherwise the cryptographic operations would fail. The empty array mechanism serves as a way for the server to signal that clients should use their embedded keys rather than accepting a server-provided key.</p><p>While this approach does successfully prevent the per-client key differentiation attack within a single mixing round, it introduces a more serious long-term vulnerability. By using the same RSA keypair across all mixing rounds, the system enables cross-round linkability attacks. A malicious coordinator or any observer with access to multiple mixing sessions can potentially correlate users&apos; blind signatures across different rounds, building long-term profiles of mixing behavior.</p><p>The corrected analysis identified this cross-round linkability as a more severe privacy threat than the original per-client differentiation attack. While the original vulnerability only compromised anonymity within a single mixing round, the cross-round correlation issue affects users&apos; entire mixing history. This cumulative privacy loss represents a significant architectural weakness that undermines the long-term anonymity guarantees that users expect from a coinjoin system.</p><h2 id="final-findings-and-recommendations">Final Findings and Recommendations</h2><p>Based on our comprehensive analysis of both the initial and corrected assessments, we can draw several important conclusions about the current state of Ashigaru Terminal&apos;s security implementation and the broader implications for coinjoin privacy.</p><p>Ashigaru Terminal has successfully addressed the immediate per-client RSA key differentiation vulnerability that was originally discovered by nothingmuch. The hardcoded key approach prevents coordinators from providing different RSA public keys to different participants within the same mixing round, effectively eliminating this specific attack vector. The implementation is technically sound and prevents the cryptographic operations from succeeding if a coordinator attempts to use a different private key than the one corresponding to the client&apos;s embedded public key.</p><p>However, the fix introduces a different and potentially more serious privacy concern. The use of static RSA keypairs across all mixing rounds creates opportunities for cross-round signature correlation. This allows malicious coordinators or external observers to potentially link users across multiple mixing sessions, building comprehensive profiles of mixing behavior over time. Unlike the original vulnerability which only affected anonymity within individual rounds, this cross-round linkability represents a persistent and cumulative privacy threat.</p><p>The Bitcoin Talk forum discussion highlighted additional concerns beyond the RSA key handling, including potential DoS vectors and signature validation issues. While our analysis focused primarily on the RSA blinding implementation, these additional attack surfaces warrant further investigation. The forum poster&apos;s claim that &quot;the coordinator can link input-outputs even with the hardcoded key&quot; suggests there may be other protocol weaknesses that could be exploited independently of the RSA key differentiation issue.</p><p>For users currently considering Ashigaru Terminal, the risk assessment depends largely on their usage patterns and threat model. Users who perform occasional single-round mixing may find the current protections adequate, as they are protected against the most obvious coordinator-based attacks. However, users who engage in frequent mixing or who require long-term anonymity protection should be aware of the cross-round correlation risks.</p><p>Our primary recommendation is for the Ashigaru development team to implement per-round RSA key rotation while maintaining the protection against per-client differentiation. This would involve generating fresh RSA keypairs for each mixing round while ensuring all participants in the same round receive the same key. Such an implementation would require cryptographic commitments or other mechanisms to prove key consistency within rounds, but would provide both short-term and long-term privacy protection.</p><p>Additionally, we recommend implementing shorter key lifetimes as an interim measure, such as daily or weekly key rotation, to limit the window for cross-round correlation attacks. The development team should also consider implementing the full ZeroLink specification with proper anonymity set isolation between rounds and forward security properties that protect past mixing sessions even if current keys are compromised.</p><p>For the broader coinjoin ecosystem, this analysis highlights the importance of thorough security review and the challenges inherent in implementing complex cryptographic protocols. The initial community criticism, while sometimes overstated, served an important function in identifying real security concerns that might otherwise have gone unnoticed. The collaborative process of security analysis, expert review, and iterative improvement is essential for building robust privacy tools that users can trust with their financial privacy.</p><p>Users should approach any coinjoin coordinator with appropriate caution, conducting their own research and understanding the specific trade-offs involved in each implementation. While Ashigaru Terminal represents a significant improvement over the original vulnerable whirlpool implementation, the ongoing evolution of both attacks and defenses means that continued vigilance and improvement are necessary to maintain effective privacy protection in the long term.</p><h3 id="links">Links</h3><ol><li><a href="https://bitcointalk.org/index.php?topic=5547639.0" rel="nofollow">https://bitcointalk.org/index.php?topic=5547639.0</a></li><li><a href="https://groups.google.com/g/bitcoindev/c/CbfbEGozG7c/m/w2B-RRdUCQAJ" rel="nofollow">https://groups.google.com/g/bitcoindev/c/CbfbEGozG7c/m/w2B-RRdUCQAJ</a></li><li><a href="https://ashigaru.rs/" rel="nofollow">https://ashigaru.rs</a> ; <a href="https://ashigaru.rs/download/" rel="nofollow">https://ashigaru.rs/download/</a></li><li>[TOR-ONLY] <a href="http://ashicodepbnpvslzsl2bz7l2pwrjvajgumgac423pp3y2deprbnzz7id.onion/Ashigaru/Ashigaru-Terminal" rel="nofollow">http://ashicodepbnpvslzsl2bz7l2pwrjvajgumgac423pp3y2deprbnzz7id.onion/Ashigaru/Ashigaru-Terminal</a></li></ol><hr><h2 id="notes">Notes</h2><p>This security analysis was conducted on the official Ashigaru Terminal v1.0.0 release. The code was analyzed from the downloaded file:</p><p><code>ashicodepbnpvslzsl2bz7l2pwrjvajgumgac423pp3y2deprbnzz7id.onion/Ashigaru/Ashigaru-Terminal/releases/download/v1.0.0/ashigaru_terminal_v1.0.0_x86_64.tar.gz</code></p><p>The authenticity of the software was verified by confirming the signed message of the SHA-256 digests following the instructions at <a href="https://ashigaru.rs/download/" rel="nofollow">https://ashigaru.rs/download/</a>. The PGP signature was verified using Keybase and confirmed to be signed by &quot;ashigarudev&quot;. The SHA-256 hash of the downloaded file was manually verified to match the hash in the signed message.</p><pre><code>-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Linux (Intel/AMD): Ubuntu/Debian
File name: ashigaru_terminal_v1.0.0_amd64.deb
SHA-256 Hash of file: 15081f7f3957b2d60abf1f5c0dc5435d09e3387636b44215688dac2d01b4334f

Linux (Intel/AMD): Standalone
File name: ashigaru_terminal_v1.0.0_x86_64.tar.gz
SHA-256 Hash of file: f0bb53055ac9a0f7712e0de09a08f0acf8aeda59332fff681e0480eae1a744d7

Linux (Intel/AMD): Redhat/CentOS
File name: ashigaru_terminal_v1.0.0_x86_64.rpm
SHA-256 Hash of file: b98c58c389f1124dd26ae0ca5bacc46da5f4c5d98af4e4b64a3a18d2358c4da8

MacOS (Apple M-series)
File name: ashigaru_terminal_v1.0.0_macos_aarch64.dmg
SHA-256 Hash of file: ca85bed92c7281490b08ba2a524e1e595be8531bd8e5a8f7fed2f44403225ac6

MacOS (Intel): 11+
File name: ashigaru_terminal_v1.0.0_macos_x86_64.dmg
SHA-256 Hash of file: 8a67dff12c9c0dafdb175134a4fc73558d71e4bebbc3aafd43d21a8e322ef5d4

Windows 10+
File name: ashigaru_terminal_v1.0.0_windows.zip
SHA-256 Hash of file: 771a6efe91f5eafa22715e6a1f93e8cdfaca3447a1a4c733906f49e95de4db96

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEERF+AeZb3BYa3Fce4oTgGsfoqZ2sFAmhYRNcACgkQoTgGsfoq
Z2s6dhAA5aSK2jkzCuqTjRgeac7UpPwav2eA5w7VJeRHlauL+w69l/fiW6hZtey7
8bKxC6CMaEUtydyvPJU2qyJKujE4sn/kl75/F2JAf0q5yNE0dZAKTgYTPnZ4XChD
lI1ptXZ2/dDcxZU2YoNatNF0Ble48YsN/Te/zxyK5a1qtPxMVr/G2JRSLfUJrObp
GWypPjyy1z+cWfNSOyW6ZhNBCHCr0Kff6VGWjIv6sXBJluay72AgylAMrnS/FWW9
WAQRh3iCRsjXPHDuwlaNsfZ3k8ZRTnnq2HkbIxqDO12HRJnxFS9gbW97cB4fVeCi
bEoTqCYBNQIBNaxKPZkMRVoaAUCdZ9ORXa2YH2316e3G8PC8Ir26yQnofB1UNdDc
drVp5wffD7EP4Whn4shCYbaXxrdQMaHl+9WhP5CspX74B5Dzkh1a7X+F3qfDmRMN
+BHXFXCNAtpnNIhObp+aFrCGVsxxGNUuZ9/09nKsPG20BWHVNgtC/iyZmxFnpOMb
Q3742Ad0T5gdEJRLU6hnI8iGulc3LVZ/er94uFCslcS1VP6ajR38ucscIMy3TnuA
hWvfst9zsspi1rbvNaMWEI9lP7rAPwAC8ISJ7HuLPyFmKHIXw4Ftlrgo8mreFdRS
OsOaEf0fyKNNgwrqswNCM9/falzbIUxQwVDYcmqYCveGmd33UkY=
=iOWZ
-----END PGP SIGNATURE-----
</code></pre><p>Verified on <a href="https://keybase.io/verify" rel="nofollow">https://keybase.io/verify</a> as &quot;Signed by ashigarudev&quot;</p><p>Manual SHA-256 verification confirmed the hash matches the signed message:</p><pre><code>$ sha256sum ashigaru_terminal_v1.0.0_x86_64.tar.gz
f0bb53055ac9a0f7712e0de09a08f0acf8aeda59332fff681e0480eae1a744d7  ashigaru_terminal_v1.0.0_x86_64.tar.gz
</code></pre><h2 id="note-on-ai-tools-used">Note on AI tools used</h2><p>For this analysis, I used claude-sonnet-4 as the Agentic AI in VSCodium with the Cline extension.</p><p><strong>I encourage you to try to corroborate these results yourself independently and with different models as well.</strong></p>]]></content:encoded></item><item><title><![CDATA[Samourai & Ashigaru Resources]]></title><description><![CDATA[<h2 id="podcasts-talks">PODCASTS &amp; TALKS</h2><p>Bitcoin Magazine: The Battle For Privacy: Free Samourai w/ Zack Shapiro, Econoalchemist, Diverter NoKYC &amp; Tor Ekeland<br><a href="https://www.youtube.com/watch?v=mqZstqEGUMM">https://www.youtube.com/watch?v=mqZstqEGUMM</a></p><p>Rock Paper Bitcoin &#x2022; 68 - Ashigaru w/ jordan<br><a href="https://fountain.fm/episode/l85r6omTifdYFxmBdcaU">https://fountain.fm/episode/l85r6omTifdYFxmBdcaU</a></p><p>Ungovernable Misfits: #FreeSamourai by damm kewl<br><a href="https://podcasts.apple.com/us/podcast/freesamourai-by-damm-kewl/id1491067458?i=1000659746042">https://podcasts.apple.</a></p>]]></description><link>https://bc1984.com/samourai-ashigaru-resources/</link><guid isPermaLink="false">687163930e7cda848203d537</guid><dc:creator><![CDATA[bc1984adam]]></dc:creator><pubDate>Fri, 11 Jul 2025 19:24:51 GMT</pubDate><media:content url="https://bc1984.com/content/images/2025/07/ashigaru-illustration-2.png" medium="image"/><content:encoded><![CDATA[<h2 id="podcasts-talks">PODCASTS &amp; TALKS</h2><img src="https://bc1984.com/content/images/2025/07/ashigaru-illustration-2.png" alt="Samourai &amp; Ashigaru Resources"><p>Bitcoin Magazine: The Battle For Privacy: Free Samourai w/ Zack Shapiro, Econoalchemist, Diverter NoKYC &amp; Tor Ekeland<br><a href="https://www.youtube.com/watch?v=mqZstqEGUMM">https://www.youtube.com/watch?v=mqZstqEGUMM</a></p><p>Rock Paper Bitcoin &#x2022; 68 - Ashigaru w/ jordan<br><a href="https://fountain.fm/episode/l85r6omTifdYFxmBdcaU">https://fountain.fm/episode/l85r6omTifdYFxmBdcaU</a></p><p>Ungovernable Misfits: #FreeSamourai by damm kewl<br><a href="https://podcasts.apple.com/us/podcast/freesamourai-by-damm-kewl/id1491067458?i=1000659746042">https://podcasts.apple.com/us/podcast/freesamourai-by-damm-kewl/id1491067458?i=1000659746042</a></p><p>Ungovernable Misfits: #FREESAMOURAI<br><a href="https://podcasts.apple.com/us/podcast/freesamourai/id1491067458?i=1000653727890">https://podcasts.apple.com/us/podcast/freesamourai/id1491067458?i=1000653727890</a></p><p>Ungovernable Misfits: Whirlpool is back (Ashigaru)<br><a href="https://www.ungovernablemisfits.com/podcast/whirlpool-is-back-ashigaru/">https://www.ungovernablemisfits.com/podcast/whirlpool-is-back-ashigaru/</a></p><p>Ungovernable Misfits: 100 SPEARS, 100 PIECES, ASHIGARU INTERVIEW<br><a href="https://archive.ungovernablemisfits.com/podcast/100-spears-100-pieces-ashigaru-interview/">https://archive.ungovernablemisfits.com/podcast/100-spears-100-pieces-ashigaru-interview/</a></p><p>Ungovernable Misfits: Still Here | The Confab 02: Diverter &amp; Zelko<br><a href="https://podcasts.apple.com/us/podcast/still-here-the-confab-02-diverter-zelko/id1491067458?i=1000657153155">https://podcasts.apple.com/us/podcast/still-here-the-confab-02-diverter-zelko/id1491067458?i=1000657153155</a></p><p>Watchman Privacy: Samourai Wallet Arrested<br><a href="https://www.youtube.com/watch?v=3qzYKC7l7Tw">https://www.youtube.com/watch?v=3qzYKC7l7Tw</a></p><p>Watchman Privacy: Post-Samourai Wallet: Max Tannahill &amp; Diverter_NoKYC<br><a href="https://www.youtube.com/watch?v=4j2IWfsCoMs">https://www.youtube.com/watch?v=4j2IWfsCoMs</a></p><p>Watchman Privacy: Ashigaru: Vetting a Samourai Wallet Fork<br><a href="https://www.youtube.com/watch?v=0MEEde8yBEA">https://www.youtube.com/watch?v=0MEEde8yBEA</a></p><p>Watchman Privacy: Craig Raw: Sparrow Wallet Post-Whirlpool<br><a href="https://www.youtube.com/watch?v=-2j8UwdA6YM">https://www.youtube.com/watch?v=-2j8UwdA6YM</a></p><p>Watchman Privacy: Max Tannahill: Censoring Bitcoin<br><a href="https://www.youtube.com/watch?v=okbXry5QJ2s">https://www.youtube.com/watch?v=okbXry5QJ2s</a></p><h2 id="links">LINKS</h2><p>Ashigaru: Whirlpool Announcement<br><a href="https://ashigaru.rs/news/announcement-whirlpool/">https://ashigaru.rs/news/announcement-whirlpool/</a></p><p>Ashigaru: Terminal v1.0.0 Release<br><a href="https://ashigaru.rs/news/release-terminal-v1-0-0/">https://ashigaru.rs/news/release-terminal-v1-0-0/</a></p><p>k3tan: Ashigaru Whirlpool<br><a href="https://k3tan.com/ashigaru-whirlpool/">https://k3tan.com/ashigaru-whirlpool/</a></p><p>Free Samourai (dot com)<br><a href="https://freesamourai.com/">https://freesamourai.com/</a></p><p>P2P Rights Fund: About<br><a href="https://p2prights.org/about.html">https://p2prights.org/about.html</a></p><p>Ungovernable Misfits: Free Samourai<br><a href="https://www.ungovernablemisfits.com/free-samourai/">https://www.ungovernablemisfits.com/free-samourai/</a></p><p>RoninDojo: Always Rise after a Fall<br><a href="https://blog.ronindojo.io/always-rise-after-a-fall/">https://blog.ronindojo.io/always-rise-after-a-fall/</a></p><p>Escape The Technocracy: The Return of the King: Whirlpool is Back<br><a href="https://escapethetechnocracy.com/the-return-of-the-king-whirlpool-is-back-o/">https://escapethetechnocracy.com/the-return-of-the-king-whirlpool-is-back-o/</a></p><p>Defi Education Fund: Prosecuting Privacy: Examining Samourai Wallet, Money Transmitters, and the Criminalization of Innovation<br><a href="https://www.defieducationfund.org/_files/ugd/84ba66_87dfb370e81a4766811bf16e5293c6da.pdf">https://www.defieducationfund.org/_files/ugd/84ba66_87dfb370e81a4766811bf16e5293c6da.pdf</a></p><p>The Rage: New Samourai Indictment Paints Anonymity As A Crime<br><a href="https://www.therage.co/samourai-wallet-new-indictment/">https://www.therage.co/samourai-wallet-new-indictment/</a></p>]]></content:encoded></item></channel></rss>