AGE OF DECEIT 4 / Eschaton Cipher and the Counterfeit Ledger of Life (2024)
AGE OF DECEIT 4 / Eschaton Cipher and the Counterfeit Ledger of Life (2024) - YouTube
Transcripts:
[Music] Jesus Christ is alive. Alive. Alive. Alive. He has helped me. He has blessed me. All for Jesus. He is the true living savior. He's alive. Believe on the Lord Jesus Christ. thou shalt be saved. The Puritans would say something like this, that if you have truly become a Christian, that your heart has become so enlarged that if you were to inherit the entire earth, it could not satisfy you.
If you were given the universe, it could not satisfy you because your heart has been so enlarged. And if you were to lose everything, it could not throw you into depression because it would be considered an insignificant thing. Your heart is so enlarged that the only one that can fill it is God.
And you say, "Well, I don't believe what the Bible teaches." Well, then believe your own secular history. How many men even today and throughout history have walked in misery after gaining the entire world? How many of them have put a gun to the head and ended their life after having everything? How many people have achieved fame, notoriety, basically worship and wealth and everything else and in the end they say it is all rots in the book of acts the declaration of the early disciples. No other name given out of heaven among men but the name
Jesus. If you don't know him yet, this is incredible invitation that whosoever calls on the name of Jesus will be saved. If you don't know him, you can call on the name of Jesus Christ who died, was buried, rose from the dead, lives right now, who is God in human flesh, who loves you, who wants you. Listen, he lives and he's been knocking at the door of your heart.
[Music] The Bible predicted 2,000 years ago that demon spirits, dark spirits would come in massive waves, seducing, deceiving, counterfeits, supernatural events to convince fallen humanity of an alternative spirituality. Why is it so important to have this alternative media? How many of you get your daily paper in your neighborhood anymore? How many of you read the epucket times? Yeah. Doesn't that tell you kind of everything right there? Epoch Times unclear funding.
Founded in 2000 by John Tang, an Atlanta based follower of the Chinese spiritual movement Fallon Gong. Epoch Times is funded by Fallen Gong, a religious group that has been called a doomsday cult. anti-communist Chinese now American Lee Hongi who is its spiritual leader believes in a coming judgment day that will send communists to hell.
Bitcoin provides a great alternative for people to just store their money. Cryptocurrency is a truly new idea and it's rare that we have truly fundamentally new ideas. Think of Bitcoin as a kind of recordkeeping system and you pay people in Bitcoin to validate the records and you move on to the next day and every day, every moment you have a new set of records and this process is self-inforcing.
It cannot easily be overruled by an outside authority or central authority. So it's like you have at the same time potentially a new kind of money, a new kind of investment asset and also actually a new kind of computer. There is neither spirit nor matter in the world. The stuff of the universe is spirit matter. No other substance but this could produce the human molecule.
I know very well that this idea of spirit matter is regarded as a hybrid monster, a verbal exorcism of a duality which remains unresolved in its terms. Biologists or philosophers cannot conceive a biosphere or neuosphere because they are unwilling to abandon a certain narrow conception of individuality. Nevertheless, the step must be taken. There's growing prosperity fueled not incidentally by information technology.
But the human species is still challenged by issues and difficulties not altogether different than those with which it has struggled from the beginning of its recorded history. Period. The 21st century will be different. Period. New paragraph.
The human species along with the computational technology it created will be able to solve age-old problems of need if not desire and will be in a position to change the nature of mortality in a postbiological future period. If we entrust a single central entity with all the algorithms and all the data, we must ask ourselves can we entrust a single entity be it a corporation or a government with all of our sensitive information.
So how do we avoid pitfalls of centralization but at the same time be able to build collective intelligence I believe the answer lies in nature self-organization I believe is the answer to how nature accomplishes so much while keeping it decentralized and here we see one profound difference between these two centuries period unlike the 20th century the primary political and philosophical issue of the next century will be the definition of who we are period The Age of Spiritual Machines Prologue. Close application.
[Music] This is nature 2.0. It's biology and machines in symbiosis simply providing towards abundance together. It's an upgrade to this cradle of civilization that we call nature. Nature 1.0 is seeds and soil. Nature 2.0 adds silicon and steel, AI, blockchain, IoT towards abundance. This electronic display emanating from Australia's largest computer is a picture of the condition past, present and future of planet earth. The program was originally devised by a scientist working from the Massachusetts Institute
of Technology, Jay Forester. It was developed under the opaces of the club of Rome by an MIT research team to present a complex model of the world and what we humans are doing to it. The program called World One doesn't pretend to be a precise forecast.
What it does for the first time in man's history on the planet is to look at the world as one system. It shows that Earth cannot sustain present population and industrial growth for much more than a few decades. It's like an electronic guided tour of our global behavior since 1900 and where that behavior will lead us. [Music] As man continues to go deeper into the machine, the veil between this realm and the unseen realm are slowly dissolving.
The resulting re-enchantment of society is here. Digital immutability, anti-gravity tech, quantum computing, bioengineering of all life forms, artificial sentience wrapped in the resurrection of ancient languages, cultures, spiritualities, and pantheons can only be understood properly in the context of biblical truth and esquetology. Many people around the world, not just followers of Christ, are recognizing the fact that the world today is as it were in the days of Noah.
The remnant church will be those who hold steadfast to the faith and not be swayed by the doctrines of demons that will become ever more present not just in our faces through screens but biologically. See your destiny is eternal whether you are saved or not. The real you is software not hardware. I can't see you. I can only see the package you happen to be in at the moment. Software has no mass.
[Music] You are temporarily resident in a package in a disposable hardware environment. The origins of cryptography is debated amongst scholars and historians, but in general, early examples include artistic hieroglyphs from ancient Egypt and a Mesopotamian cunioform from 1500 BC that had a camouflaged or encrypted recipe for a highly coveted pottery glaze inscribed on the tablet.
However, the first well doumented and clear use of cryptography for secret communication was by the ancient Greeks. The Spartan military used a device called a sittail during the 5th century BC. This device involved wrapping a strip of parchment around a rod of a certain diameter. When unwrapped, the parchment appeared to contain a meaningless jumble of letters.
But when wrapped around a rod of the same diameter, the original message could be read. This was one of the earliest forms of a transposition cipher where the order of the characters in the message is rearranged to achieve encryption. The atbash cipher is a great example of how ciphers were used until the dawn of modern computing and encryption.
Oxford theology describes the atbash as quote a simple substitution code where the first letter of the alphabet alth is replaced by the last tav the second letter bet by the second last sin or shin etc. The name Atbash refers to the first letter of the names of these Hebrew characters, Alf, Tav, Bet, and Shin.
These styles of ciphers were common throughout history, with perhaps the most popular being the Caesar cipher, which has a similar letter replacement method. But there are passages in the Old Testament that scholars have documented as ciphers, used perhaps for poetic purposes or as a means of communication undercover in a time when such writings may have gotten people in danger with the authorities.
Jeremiah 25 26 in the King James Bible says, "And all the kings of the north far and near, one with another, and all the kingdoms of the world which are upon the face of the earth, and the king of Shees shall drink after them." Our focus is on the mention of the king of Shees, who shall drink after them.
If you apply the Atbash code, you can decipher Sheesh as Babylon. The New Living Translation and English Standard Version. Both have the deciphered version of the passage by writing Babylon instead of Sheesh. Jeremiah 51:41 also mentions Sheshach, the atbash cipher for Babylon. But there is another example of a atbash cipher in Jeremiah 51:1.
To understand this atbash cipher, we will compare the King James and the New King James. The King James says, "Thus says the Lord, behold, I will raise up against Babylon and against them that dwell in the midst of them that rise up against me, a destroying wind." The New King James says, "Thus says the Lord, behold, I will raise up against Babylon and against those who dwell in Lebi, a destroying wind.
" Notice how Leb Kami is mentioned in the NKJV, but the KJV has quote them that rise up against me. That is because this is another Atbash cipher for Calaldia. The only translations that had mentioned Calaldia or Calaldanss in this passage are the New American Bible, Brentton Septuagent Translation, and the Amplified Bible.
In a lecture series titled Understanding Cryptography, Kristoff Parr mentioned how ciphers had been done the same way for thousands of years until 1883 when a Dutch linguist named Dr. August Kirkoff presented a principle by which all modern cryptography is built. Crypto started 2000 before Christ, you know, so really old.
By this time, people have been doing encryption and decryption for about 4,000 years, right? And they did it essentially wrong. The cipher must not depend on secrecy of the mechanism. It must not matter if it falls into the hands of the enemy. So the reason for that and it's important what he's focusing on is the mechanism here.
So if you think about these two functions we need we needed encryption and decryption coming up with new functions or new mechanisms. In Kirchov's day, these were mostly mechanical devices that you needed as part of the encryption process. Well, that's a lot of work.
You don't want to have to keep inventing new encryption and decryption functions and deciding they're secure and distributing them. What you want is some way that even if your encryption and decryption functions are known, your cipher can still be secure. And the way to achieve that is to use a key. Less than a hundred years later, Whitfield Diffy and Martin E. Helman, members of the EE published a paper in 1976, now available at stanford.
edu titled New Direction in cryptography. This was a seminal paper that introduced the concepts of public key cryptography and digital signatures. Their work laid the foundation for the development of secure digital communication impacting various applications such as secure email, electronic commerce, and the secure transmission of confidential information.
Their introduction of public key cryptography solved the key distribution problem and enabled secure anonymous communication over the internet, revolutionizing digital security and facilitating the growth of the digital economy. 33 years later in 2009, an anonymous programmer named Satoshi Nakamoto published the Bitcoin white paper. While Diffy and Helman's paper introduced the concept of public key cryptography, Satoshi Nakamoto's Bitcoin white paper applied these principles to create a decentralized electronic cash system using cryptographic techniques for secure peer-to-peer transactions without needing a trusted third party. Diffyian
Helman did not address the issue of double spending in digital currencies. Everyone today understands how easy it is to copy and paste something in digital form. Nakamoto's work directly tackled this double spending problem inherent in digital cash by introducing the blockchain, a decentralized ledger that records all transactions across a network of computers, ensuring that each digital coin is spent only once.
Diffy and Helman introduced a breakthrough in encrypted communications, but still operated within the traditional framework of digital security that could involve central authorities. The Bitcoin protocol, by contrast, completely removed the need for central authorities using a decentralized network and consensus mechanism, proof of work, to maintain trust and security in the system.
This represented a significant shift towards a trustless decentralized digital economy. But it is this very breakthrough with blockchain technologies and decentralization of digital systems that has unveiled the biological nature of computing. A paper published on the national center for biotechnology information titled when is self-organization used in biological systems.
The abstract states, quote, self-organization or decentralized control is widespread in biological systems, including cells, organisms, and groups. It is not, however, the universal means of organization. I argue that a biological system will be self-organized when it possesses a large number of subunits and these subunits either lack the communicational abilities or the computational abilities or both that are needed to implement centralized control. Such control requires a well-informed and highly intelligent supervisor.
I stress that the subunits in a self-organized system do not necessarily have low cognitive abilities. A lack of pre-addaptations for evolving a systemwide communication network can prevent the evolution of centralized control. Hence, sometimes even systems whose subunits possess high cognitive abilities will be self-organized.
End quote. It's interesting that this author would reference biological methods as computational abilities as well as suggesting intelligent supervisors needed to monitor the transactions and an evolving adaptation into a systemwide communication network that can prevent centralization which can be applied directly to Bitcoin and the larger breakthroughs in blockchain technology And if that weren't enough, in a theoretical paper published on the scientific journal outlet Springer Link titled Emergent Bioanalogous Properties of Blockchainbased Distributed Systems,
argues in the abstract that blockchainbased distributed virtual machines quote fulfill all basic definitions and criteria for life. They state, quote, "Public blockchainbased DVMs, distributed virtual machines, provide an uncontained environment for the development of artificial general intelligence, AGI, with the capability to evolve by self-direction.
" The paper goes on to provide several parallels between biological immersion systems and the immersion properties of blockchains. They state quote approaching the subject from a physicist's perspective. Schroinger 1944 coined the term code script to describe the functionality of DNA as genetic code. Then later quote much like DNA blockchain is fundamentally an information carrier which can and is being used to store instructions in the form of computer code.
essentially Schrodinger's 1944 code script for computers. But what they outline in the differences reveals the transhumanist spirit behind these developments. They state, quote, "Aside from similarities outlined above, there are also fundamental differences between the two structures, DNA and blockchain. The most significant of these include one, a blockchain has a much higher information content and continues to grow in size whereas DNA remains largely unchanged throughout an organism's lifespan.
Two, a blockchain has much higher levels of redundancy protected both by a large number of verifying nodes and a strong encryption algorithm such as Shaw 256. Three, while DNA accumulates mutations that drive Darwinian evolution, a blockchain is immutable and retains all data written to it. Four, DNA contains introns, apparent inactive regions, while a blockchain contains a much higher density of meaningful data and instructions.
Taken together, these differences appear to indicate that a blockchain may be a superior genetic carrier for evolutionary efficiency as it does not rely on random mutations and trial and error, nor does it experience information loss as it responds to selection pressures. End quote. And in their conclusion, they boldly state that they have presented evidence that blockchains share a large number of functional and structural similarities to DNA and quote present a model of a simple decentralized self- sustaining, self-organizing, self-regulating blockchainbased organism as an
operationally closed system and described developing technologies that could enable it in the near future. Such systems would have a number of specific advantages over biological life, including significantly improving speed, accuracy, redundancy, and unlimited size of blockchain as opposed to DNA, the ability to pass acquired traits to offspring, the ability of specialized cells to operate independently of host organisms, and a lack of programmed sinence and death.
Public blockchainbased DVMs provide an uncontained environment for the development of ANN based artificial general intelligence, AGI, potentially leading to an ability to direct their own evolution resulting in rapid self-improvements and the potential to exceed human intelligence. End quote.
And in another article from the National Institute of Health published in 2020 titled from microbial communities to distributed computing systems outlined in the abstract how in the field of synthetic biology they've reached a quote bottleneck in the complexity of the genetic networks making it difficult to create any kind of meaningful synthetic biological systems.
They suggest that using distributed biological systems would quote alleviate these constraints and allow us to expand the applications of our systems into areas including complex biosensing and diagnostic tools, biorocess control and monitoring of industrial processes. End quote. While the paper does not explicitly mention blockchains, it is clear that the distributed computing system is at the core of how computers will appear to us as being life.
Blockchain expert and serial entrepreneur Trent McConna at the tech festival in 2018 spoke about nature 2.0 in how blockchain will transform nature. The title, as you see, is nature 2.0. The cradle of civilization gets an upgrade. A tree is a very local sort of thing, right? It's taking in nutrients from the soil.
It's taking in rain and other moisture from the air, CO2, of course. So, this is actually very important in the energy ecosystem. It's taking in sun as well, right? It's a really great solar collector. highly efficient too. We strive as humans to get nearly as efficient as trees and it's in symbiosis with its environment, right? With the squirrels, with the owls, with the earthworms, and so on, right? Trees, they don't have an identity. They don't know who they are.
They don't care. They don't have ownership, per se. They don't have an idea of scarcity. They don't have an idea of money or value. They just are. They're self- sustaining. And even more than just self-sustaining, they're actually anti-fragile. If you kick them, they get stronger. That's the very essence of anti-fragility.
So, not just about resilience, but actually getting stronger when you're down. And it's not just trees, right? We can go to ever and ever higher levels of integration, starting with a flora and fauna from beasts all the way to larger and larger ecosystems, right? Each ecosystem just is. It's there. Each ecosystem is self-sustaining. Each ecosystem is anti-fragile.
And if you go to the very very largest ecosystem that is our planet, mother earth. And what this means, we as a civilization, as humans and the ecosystem around us, we are living on this cradle of civilization. It sustains us. Without it, we have nothing. That's nature. Yet, we're falling short.
So the question is in today's day and age does tech have have anything to say about this? Let's start with blockchain first. The most mundane, the most practical, it's simply a data structure, a chain of blocks where a block is simply a list of transactions. Uh a slightly bigger picture one still very sort of techy is a database with blue ocean benefits. A database is simply a way a way to store data.
It's software running on a file system running on an overall OS. Um, that's just storing stuff and you can query it, you can index it and all of that, right? But you can say a blockchain is actually a database too, except it's a new type, a blue ocean type of database that gives new characteristics. It's decentralized. No single entity owns or controls it. It's immutable.
Once you've written into it, it's there for good and it has assets. So, you essentially own something that's on the blockchain if you have the private key. And this can actually be something digital um or financial or even pointing to something physical through digital twin type identities. Let's go to higher levels yet.
People call blockchains trust machines. Why? Well, because it minimizes the amount of trust you need to operate. Think about if you want to transfer some money from a bank account in say Canada, where I'm from, to say here in Germany, where I live now. um that would normally cost me about $40.
Why? Because it has to go through three or four intermediate banks. Each bank you're paying about $10 for their trust for being big and for being 100 years old and all of that, right? Imagine if you could have something that is even more trustworthy, more secure, but only costs pennies to transfer.
That's what blockchains enable because it's actually leveraging um technology in a new way, cryptography, building blocks, etc. So, trust machines minimize the trust needed to operate. What this does is it allows larger organizations to to emerge without having humans in the middle. If you had to ask me, one of the most important things of all characteristics is that blockchains are incentive machines. You can get people to do stuff with them.
How? Well, if they do that thing you want, then you pay them with tokens. Magic internet money some people call it. And these networks, of course, are self-sustaining. They're really, really hard to kill. to kill Bitcoin, you'd actually have to take out every single one of those 6,000 nodes. And there's always going to be a handful of 10 people or maybe 10,000 that will take those to their grave, right? So, it means that they're very anti-fragile, too. Uh let's keep going higher levels for how to frame blockchain.
There's this concept of a decentralized autonomous organization or DAO. And what it is, it's a computational process that's running autonomously on decentralized infrastructure, which means, you know, you can't pull the plug. not Bezos, not anyone. And it's got resource manipulation. It's got its own wallet.
Another way to frame this is it's code that can own stuff. Think computer virus that's benevolent. So this is a very powerful concept, right? It's kind of running around there and so on. And you can think of Bitcoin as a Dow or Ethereum, but the things running on top too, the different applications running on top, these are basically these smart contracts or processes that are just out there and running, right? In fact, some people such as Ralph Mur Merkel, a very famous cryptographer and nanocientist, has called them life forms.
Ralph Merkel, founder of the Merkel tree and a cryptography legend, stated, quote, "Bitcoin is the first example of a new form of life. It lives and breathes on the internet. It lives because it can pay people to keep it alive. It lives because it performs a useful service that people will pay it to perform. It lives because anyone anywhere can run a copy of its code.
It lives because all the running copies are constantly talking to each other. It lives because if any one copy is corrupted, it is discarded quickly and without any fuss or mus. It lives because it is radically transparent. anyone can see its code and see exactly what it does. End quote. AI.
So, the original definitions of AI as conceived by Alan Turing is essentially to replicate human cognitive behavior to to basically mimic what a human does. And it's best exemplified by the Turing test trying to decide whether someone behind a wall is a human or a computer as they pass messages back and forth.
So, now let's combine these AI and blockchain, especially in something that I call AI Dows. artificial intelligent decentralized autonomous organizations. There's a whole bunch of ways you can make AI dows. You start with a DAO, you add AI, or you start with AI, you put it on a decentralized substrate.
Or you start with software as a service, which is basically, you know, some company running something, you turn that into a DAO, which is basically giving the same service, and then you add AI. Or you can even take a physical service and um turn it into an AI DAO as well. So these things don't need to live just on networks. they can actually have bodies attached.
So, I've talked about a few of these things things, right? I've talked about nature, sustainability, AI, blockchain, AI, Dows. How does this all unify? We've talked about self-driving cars in the past. Um, well, what if these cars owned themselves? Every single car was its own agent that had its own wallet. If it had to get repaired, it would go to the shop. Um, etc.
, etc. This is possible, right? So we would have self-driving, self-owning cars interacting with the ecosystem around it. We don't have to stop with the cars and trucks. The roads themselves can be self-owning, right? Self-owning roads, self-owning wind farms, right? This is where we can head. Self-owning power grids.
We talk about changing the incentives to be carbon neutral. That's a great objective function for a blockchain, right? Self-oning grids. This is possible with today's technology. This is an example of nature bonding with the machines. You can go the other direction too. You can take a machine and make it more naturelike, such as Plantoid.
It literally relies on humans to come along and make copies of it, but it incentivizes them because it gives them tokens to do so. And of course, we can have ever higher levels of integration. We can start with the beasts, the tears as in German um at the lowest level uh to higher and higher ecosystems, the roads, the power grids, to swarms of these things together, right? Connected of course with IoT, machine to machine, all that sort of thing, right? Guess what? Each of these cars doesn't need an identity, doesn't need ownership. It doesn't have a concept of
scarcity. It doesn't have a concept of money even. It just is self- sustaining, anti-fragile. And we go to higher levels too, right? The swarms, etc. They don't have identity, ownership, scarcity, or money. They just are self-sustaining, anti-fragile. This is nature 2.0.
It's biology and machines in symbiosis simply providing towards abundance together. It's an upgrade to this cradle of civilization that we call nature. [Music] This connection between the blockchain and biology, more specifically through Bitcoin, is further validated through the analysis of Giovani Santos Stasi, a renowned PhD in physics and astrophysicist turned Bitcoin analyst who claims to have uncovered something called the Bitcoin power law.
Power laws show up when you have networks and when you are in fact even biology they are everywhere in nature. These are power laws and why they are so important because in biology you know the body is a network too. You know the cells communicate with each other. There is information moving here and there.
And so this is why we see in biology these uh power laws because they are manifestations of things that interact together and there are feedback loops you know. So it's a way of understanding the world in a sense and it's beautiful because our favorite asset that you know we are all in love with Bitcoin is behaving in this way.
Physicists get excited sometime sometime they make fun of us that we like this power laws a little bit too much but they are everywhere in nature and uh the planet laws laws that are called the Kepler's law eventually Newton took this Kepler law and then he was able to show that this this motion is due to gravity this why they behave in this way there is a law that governs the motion of this planet and when when this law applies to the motion of planet it looks like a power law on a log log graph.
So this is the most exciting part that this behavior of Bitcoin is not just another curve. It's a power law and it's a big deal. If you look at the metabolism of animals, right? You take a little mouse, then an elephant, a human being, and you ask the question, okay, how fast is metabolism of the animal? and you plot it, it looks like again a beautiful straight line. Very different animals, the mouse, the elephant etc.
But across all these huge sizes there is some kind of a pattern and that is fascinating you know for a scientist that is amazing because you're now okay what is what drives this why this is happening you look at at uh GDP of nations uh the GDP of nation the log of the GDP of nation versus the population size again a beautiful straight line in a log log plot there are many many many systems like this in nature and human phenomena like the cities the growth of a city, the GDP of a nations behave like uh power loss. I becoin it's even more amazing because because of the blockchain we can know everything right
or many transactions uh the volume uh like very detailed things about the network but price is one of the most evident things and and probably the thing that most people care about. While the promise of AI and blockchains working together to create nature 2.0 is a mere speculative market at this point, it may get accelerated with the advancements in quantum computing.
In a 2021 article published on nature.com titled, "Biology begins to tangle with quantum computing, the abstract mentions the quant initiative that was launched in Europe, which influenced US Congress to pass the National Quantum Initiative Act, which puts in place the National Quantum Initiative Program, quote, to accelerate the development of quantum information science and technology end quote.
" And with this program, the US National Science Foundation funded three Quantum Leap Challenge Institutes, which is an organization about quote exploiting quantum mechanics to observe, manipulate, and control the behavior of particles and energy at atomic and subatomic scales to lead to quote generation technologies for sensing, computing, modeling, and communicating end quote.
The paper was a survey of various people in computational biology commenting about the potential usefulness of quantum computers in their analysis. One man quoted often, Mark Gerstein, a Yale University researcher, said that while he doesn't quote unquote super understand all of the quantum computing's intricacies, he says quote, "But it does work." end quote.
He also noted that he had colleagues in cryptography and computer security describe how their computational processes have been quote unquote quantum hardened, which means it is more able to withstand a quantum attack. He suggests such concepts will find their way into biomedical research as data privacy becomes eliminated when accessing quantum processing. In a Medium article published by Neil Malor titled Genetic Quantum Algorithms, quote, genetic algorithms are able to present solutions to optimization problems by using huristics motivated by mimicking ideas of genetic natural selection found in the biological world.
He says in his conclusion, quote, the dramatic increase in performance of a GQA, a genetic quantum algorithm over classical genetic algorithms in the knapsack problem demonstrates the power of quantum computing in practical computing. The power to encapsulate the diversity of possibility in a vast probabilistic world.
Further work might involve finding quantum analoges or even more similar practical algorithmic techniques and exploring further implementations of GQA, taking advantage of its diversity of representation and exploitative search to find an optimal solution. End quote. This will likely lead to what will be perceived as quantum algorithms that operate invisibly in nature.
Such developments clearly shows the closing gap between the physical and non-physical virtual worlds. In fact, in a popular mechanics article titled, "Your very own consciousness can interact with the whole universe," scientists believe said that a recent experiment suggests the brain is not too warm or wet for consciousness to exist as a quantum wave that connects with the rest of the universe.
The article states, quote, "New research on the physics, anatomy, and geometry of consciousness has began to reveal its possible forms. In other words, we may soon be able to identify a true architecture of consciousness." End quote. The article goes on to discuss how the research was based on Nobel Prizewinning physicist Roger Penrose and anesthesiologist Stuart Hamarof, who presented the orchestrated objective reduction theory in the 1990s that claimed consciousness is a quantum process facilitated by microtubules in the brain's nerve cells.
In a section titled Across the Universe, it states, quote, to explain quantum consciousness, Hamarof recently told the TV program Closer to Truth that it must be scale invariant, like a fractal. A fractal is a never-ending pattern that can be very tiny or very huge and still maintains the same properties at any scale.
Normal states of consciousness might be what we consider quite ordinary, knowing you exist, for example. But when you have a heightened state of consciousness, it's because you're dealing with quantum level consciousness that is capable of being in all places at the same time.
He explains that means your consciousness can connect or entangle with quantum particles outside of your brain anywhere in the universe theoretically. End quote. It's quite remarkable to note that science itself is beginning to suggest that there are processes within our brains and with the rest of the physical world that can tap into a kind of omniscience and omnipresence. A trait that only God has the authority to wield.
And it's no surprise as fallen man is continually believing the lie that was told in the garden by the serpent Hanekos, the shining one, that ye shall be as gods. These developments in quantum science in conjunction with the rise of scientism may create a neotheosophy that will popularize occult ideas like the aosic records which theosophists believed were a compendium of all universal events, thoughts, words, emotions and intent ever have occurred in the past, present or future in terms of all entities and life forms not just human. In current form, modern practitioners believe the accashic records can be accessed through prayer,
intuition, and meditation. But it may not be long before the digital immutability that's found in blockchains is leveraged with artificial intelligence and the power of quantum computing. Both creating biological life forms and altering our own biology will become the publicly acknowledged means to access this new enhanced human network.
Such possibilities are not out of the question, especially when you consider articles like the one from nature.com, postquantum distributed ledger technology, a systematic survey. The paper begins with the abstract saying, quote, "Blockchain technology finds widespread application across various fields due to its key features such as immutability, reduced costs, decentralization, and transparency.
The security of blockchain relies on elements like hashing, digital signatures, and cryptography. However, the emergence of quantum computers and supporting algorithms poses a threat to blockchain security. These quantum algorithms pose a significant threat to both public key cryptography and hash functions, compelling the redesign of blockchain architectures.
This paper investigates the status quo of the postquantum quantum safe or quantum resistant crypto systems within the framework of blockchain. They go on to discuss the postquantum distributed ledger technology PQDLT as a probable path to solve this problem. They state quote the contemporary PQDLTS can be broadly categorized into two groups. The first category employs classical schemes while the second category leverages quantum mechanical properties to enhance security.
Although the second category is more desirable due to its reliance on the laws of physics for security, it poses inherent challenges such as dependence on QC algorithms making them challenging to implement. Moreover, the PQDLTS are costly and non-scalable till date. Given that blockchain as exemplified by Bitcoin has become an integral part of secure systems, it is more advisable to update it rather than replace it with alternative technologies.
As a result, the demand for quantum seccured DTS becomes significant, underscoring the importance of ongoing research in this field. End quote. After breaking down the basic tech stack of current blockchain technology and going over the basics of quantum computing, in a section titled integration of quantum computing and blockchain, it says, quote, the rise of QC poses several significant challenges to the blockchain ecosystem.
First, the quantum attacks threatened to compromise the security of stored data on the blockchain by breaking current encryption standards, potentially leading to unauthorized access and data breaches. It is anticipated that by around 2035, quantum computers will reach a level of sophistication where they could effectively even shatter security algorithms like RSA 2048.
A significant portion of the functionality within blockchain systems relies on cryptographic protocols, specifically those based on elliptic curve cryptography, ECC, and the elliptic curve digital signature algorithm ECDSA. These protocols are susceptible to quantum attacks.
They later go on to warn that unless the vulnerabilities in these systems now are not managed properly, there may be a quote period of vulnerability that have all the groundwork for a major cyber pandemic. Part of how distributed ledgers work is by validating transactions. What quantum computers will be able to do is calculate and consider large numbers and data sets very quickly. However, validating that information can remain rooted in the physical world.
In an interview published by the Defense Visual Information Distribution Service, a National Security Law Department adjunct professor and expert in the law that governs cyberspace, Lieutenant Colonel Michael Liowitz, discussed the quantum internet based on an article that he published titled, "What happens when the packets go away? how the quantum internet will diminish electronic surveillance programs and change cyber security forever.
I'm kind of a nerd for all things cyber and I really got into reading about the nent quantum internet and the quantum internet is essentially going to be the next generation internet of communications and things like that and it operates a lot more physically different than how the current internet operates. So the current internet has they call it packet switch communication.
Say you're talking about an email or something like that where literally information is chopped up into bits packets. Routers will then move that information around the internet until it gets to um until where the information wants to be like from the beginning to the destination. So the quantum internet behaves completely different. What it does is it essentially takes out the packets from the equation. So the packets will be gone from the equation.
And what the most viable way of the quantum internet will work is is that essentially the data is going to teleport. So from point A to point C because there's a little bit of science involved with point B. So there's no more packets. The information just goes from one to the other without that. And I thought that was really interesting. And the nerd in me was like, wow, that's great.
I nerded out about that. But then I started thinking about the phrase packet switched electronic surveillance. And electronic surveillance is essentially how all nearreal time interceptions of information whether it's emails or digital voice or anything like that the content that law enforcement or investigative agencies or the intelligence community or even adversary governments how they intercept communications whether lawfully or not hackers the same thing is through electronic surveillance which the key require ment is they intercept or
collect the packets. So got me thinking if the packets are going to be eliminated from the equation obviously the cyber security benefits are great and that's what's being touted by this is they're calling it spy proof they're calling it hacker proof governments from China to Europe to the United States are spending billions upon billions of dollars to develop the quantum internet because without the packets it's going to vastly improve cyber security.
If you think about it, a quantum internet on a classical system can solve something that would take a classical internet encryption about 50,000 years to solve. The quantum internet can solve it in 2 seconds. So that's what we're looking at there. That's why there's this huge race for the quantum internet.
But again, what I was thinking about was what about the other side of it? Because our government and adversary governments, we rely on lawful electronic surveillance, and that's going to be gone once the packets go away. The termination of what Liboitz calls lawful electronic surveillance brings up the point about a decentralized virtual panopticon.
Again, it's not so much one institution surveilling the rest of the population. Rather, it is the general population having the tools and access to surveil these institutions and intelligence operations back which also creates a distributed surveillance apparatus where we are monitoring one another.
This surveillance beast was discussed in Age of Deceit 3 when we broke down the leopard mentioned in both Daniel 7 and Revelation 13 as one of the three beasts that combines to form the fourth beast. We will review those beasts in light of this new information with quantum blockchain AI sparking nature 2.0 a little bit later. Every year the ODNI produces a transparency report. It's unclassified.
It's for public consumption and it talks about certain um authorizations regarding specifically addressing um packet switch packet switched electronic surveillance for example. And the most recent published report said that there were 233,000 targets. So, if you have a quantum internet that's up and running throughout the world, then theoretically we could be losing 233,000 uh national security targets that have been vetted are deemed important by the national intelligence community for national security purposes. And that's a lot. That's a big deal. And I think the focus is so much on the cyber security
part of it. The there's no thinking about the um national security aspect of it from the other the other end of it. lawful electronic surveillance collection is probably no longer going to be in the transit when data is being transited from one node to another because the packets are going to be gone.
So what we're going to switch to is more of the storage areas, the data centers, the um the cloud areas, wherever data is physically being stored. Now of course even in a quantum data storage, it's going to be different physically than how we store it, but the concept is the same. The data has to go somewhere and stay somewhere. And that's where I think the um the surveillance is going to be.
So the next question is, you know, how can we get it as close to real time interceptions that we have now as possible when you're dealing with stored data? Since you're not going to get the transit, how are we going to know even when the data is transmitted from one node to the other since again there's no wires to move the information through. It's going to be it's going to be teleported.
So again that comes back to the who's who's who's running the data centers who's the quantum data centers. Look at the history of um um circuit switched communications for example that's the oldfashioned wiretapping you know when you have phones the old phones right that's how they wiretap through circuits would switch it move the data through the wires then um it evolved to packet switch for digital voice and you know the emails electronic data so this is we're now going to be another step beyond that and that's where the quantum
data is going to be but that's that's where the physical parts are going to change and that's where the storage area is going to become so much more vitally important. Again, this reference to an actual physical location to store the data in a quantum internet world points to the man of sin antichrist little horn or the king who exalts himself in Daniel 11 honoring the god of fortresses, a foreign god, a god his fathers did not know, who will attack the strongest fortresses. Because whoever this individual will be will not only have the support of 10 kings giving him
authority but also a way to make war and conquer such that would give him the authority to distribute physical property or land for a price. the government is not always as proactive shockingly as uh you know we think it can be and sometimes or quite often it comes back to bite us when we're trying to deal with something exigent and or new and so the whole point of this where I came from this is let's try to be proactive and get ahead of it because once that once the hackers they call it Qday is when the hackers first get the
quantum internet once they start doing that and if we have the and we're still using the classical internet they're going to hack us to um or whether it's adversary governments, the same thing. So, it's just a matter of um being a bit proactive and a bit creative to be honest, you know, and that's kind of where I urge all listeners to any area of interest that they have um if it aligns with um things they know to kind of look into it and don't just assume that oh, it'll all get worked out or the statute will cover it because in this instance, I'm not convinced that the
current statute framework will cover something that is going to happen. Um, some people say, "Oh, it's so long in the future. We don't have to worry about it." But doing the research, I mean, it's expert after experts predict 2030 is is when this is going to happen. And that's not that that's not too long from now.
As we move through Qday and enter a postquantum cryptographic world, the authority that a distributed ledger will hold with quantum encryption and finality along with the ability for our own biology to validate and become nodes in the network. We may be on the precipice of massive esqueological events to unfold.
And of course, this can all be tied to Revelation 13 and the image of the beast, which will be an image with breath, what Jesus referred to as the abomination of desolation, what sounds like what will be perceived as sentience risen from inanimate matter. These connections give me personal conviction that the bleeding edge of science and technology will play a massive role in biblical esquetology.
But the most important thing to come out of this is not the knowledge of how evil exists and operates, but rather how the true source of all things becomes unmistakenly apparent and obvious. If we're thinking that there is no supernatural world, I don't think we're being honest. We're not being honest with data. And there are millions and millions of claims. If just one of them is correct, okay, then the category is open. Philosophically, this is sort of where I gravitate.
Basically, all of scriptures sort of supernatural claims extend from one proposition that there is a God. If there is a God, if that is a coherent proposition, you can find serious people who have defended the coherence of this proposition. They may not choose to believe it, but it is a coherent philosophical conclusion.
And if that is on the table, then other things like, well, could God have created other beings like himself that aren't embodied, that are in a spiritual world? Could those beings actually do something? Could they think thoughts? Could they interact with The answer to all those questions becomes yes because of the coherence of the main idea.
If the supernatural realm is real, then it can be said that the Lamb's book of life is also very real. What the word of God tells us about this supernatural ledger is that it has written on it the names of those who have everlasting life through a bodily resurrection into an eternal state. Exodus 32:32-33 suggests that this ledger is immutable to us mere mortals, but can be changed or altered by God.
As it states, names can be blotted out of this divine document. Psalm 69:28 is a plea to God to blot out the names of the wicked from this ledger. Daniel 12:1 is a powerful example of the book of life as it pertains to God's great escaton. Those whose names are found written in the book will be delivered from the distress of that time.
If we continue on to Daniel 12 2 and 3, we see all the intricate details about our bodily resurrection. In the New Testament, Paul acknowledges fellow laborers for the gospel of Christ. in Philippians 4:3 as those whose names are written in the book of life. To understand the significance of the ledger of life or the book of life, we need to understand this book is kept and maintained by God who is omnipotent and omnisient.
There are several passages in the scriptures that refers to God's omnipresence like in Psalm 139 7-8 where it says where can I go from your spirit or where can I flee from your presence if I ascend to heaven you are there if I make my bed and sh behold you are there. Then in verse 16, "Your eyes have seen my unformed substance, and in your book were all written the days that were ordained for me, when as yet there was not one of them.
" Jeremiah 23:es 23 and 24 also references God's omnipresence where it says, "Am I a God who is near?" declares the Lord, "and not a God far off. Can a man hide himself in hiding places so I do not see him? declares the Lord. Do I not fill the heavens and the earth? Declares the Lord. Job 42:2 says, "I know that you can do all things and that no plan of yours can be thwarted.
" Similarly, Matthew 19:26 says, "Jesus looked at them and said, with man this is impossible, but with God all things are possible, highlighting God's unlimited power and omnipotence. If the book of life is supernatural, then it stands to reason that the counterfeit will also claim a sort of supernaturalism.
2 Thessalonians 2:9 says, "Even him whose coming is after the working of Satan with all power and signs and lying wonders." These are basic aspects of Christian theology, but they are becoming ever more fascinating and important to understand as we clearly see the rise of false omnipotence, false omnipresence, and a counterfeit ledger of life rising in the technoscientific totalitarian surveillance empire.
To accomplish such a task, one would need a level of surveillance that would mimic the supernatural properties of omniscience and omnipresence. Consider how modern computing and the internet has completely changed connectivity, collapsing geographical barriers, enabling real-time communication across the world, democratizing access to information and large knowledge bases.
Virtual and augmented realities to transform the way people experience everything from content and media to relationships. social media and digital narratives shaping how we think and perceive world events. And what we are yet to see with artificial intelligence and quote unquote space exploration. All of it enhanced by modern computing has indeed re-enchanted society, reshaping perceptions, interactions, and capabilities that were once considered in the realm of science fiction.
Prior generations may have looked at such ideas as impossible or improbable, as it sounds like the properties of magic and fantasy. However, the exponential rise of modern computing and communications networks have provided a medium for this counterfeit to be built. This scientific and technological spirituality can be described as sacred secularity.
Carl Tyik in his seinal book game of gods the temple of man in the age of re-enchantment describes the state of affairs in light of the evolution of spiritualism within the seeds of 20th century humanism. Quote, "What was being elucidated is a humanistic spirituality, an emotive sense of meaning and belonging, higher values, sublime qualities without reliance on traditional religion and theological truth claims or appeals to a transcendent God.
This nons supernatural magic unfolds as philosophy and art and technique reintegrates experientially as the individual inwardly connects with the energy of the group and as the group finds beauty and validity and purpose in a grander vision. Sacred secularity is the placing of awe, wonder, and reverence within the creativity of humanity.
Often associated with a rationalized sacredness of nature, it is worship in the temple of man. End quote. If we don't do anything then yes I think that in I don't know 10 years the stories that dominate the world will for the first time in history be the product of a non-human intelligence in order to construct large scale human societies. You must have these stories.
They are not necessarily bad stories are tools. You know it's like a knife that you can use the knife to murder somebody or to save their life in surgery or to cut salad for dinner and they create order in large societies. So without religion, without nationalism. We can talk later for instance about the link between nationalism and democracy.
I think that there are exceptions but in most cases nationalism is a precondition for democracy. If you don't have a strong national community, you cannot have a functioning democratic system. Every state is made up of many different tribes if you don't have strong patriotic national feelings that unite the tribes.
There is you cannot have a democracy because every tribe will just fight for its own interests without caring at all and and and you can have a democracy a dictatorship under such conditions but not a democracy. You know people take such good care of their bodies. Sometimes they spend hours, you know, in the gym and special diet and whatever.
And I also try to take good care of my mind that and our minds were shaped back in the stone age in a completely different situation environment. We are now flooded by enormous amounts of information that we cannot deal with. On top of that, uh, with our smartphones and social media algorithms and so forth, you know, the smart what what the smartest people in the world have been doing in recent years is figuring out how to use these devices in order to hack our brains and press our emotional buttons. And anybody who thinks they are strong enough to resist it is just fooling themselves.
It's much much more powerful than us. social media algorithm decides by itself what news to show you or what stories to show you and uh uh so it it is already taking power away from humans for the first time in history. We are losing power as a specy at a very rapid pace and similarly we are also losing control of the stories that we believe and AI is the first technology in history that can create stories by itself.
People compare it sometime to the printing press but it's a completely different thing. You know a printing press can can only copy my ideas. I write something and then it can create a thousand a million copies. It cannot write a single line by itself. But AI can and I think very soon we will reach a point when the stories that dominate if we are not careful that the stories that dominate the world ideologically, politically, religiously will be composed by a nonhuman intelligence.
This rationalized sacredness of nature that sparks a spiritual mission to build nature 2.0 O is why I believe blockchain technology supercharged with AI and quantum developments will play a massive role in this re-enchantment process. The rising biological nature of computing will result in a so-called living leisure where transactions are not only recorded immutably but are also inscribed with art, culture, and meaning that will forever be timestamped.
One feature of blockchains is that the data cannot be reversed once a block is closed and chained to the next block. For example, on Bitcoin, no one can change the data that has already been recorded on the blockchain going back to the start of 2009. This immutability or inability to edit past data is one powerful feature that makes many Bitcoin evangelists think that such documentation can exist forever.
Bitcoin is a nuclear hardened protocol. It's pretty much the most robust, resilient thing the human race has yet to invent. It's running on tens of thousands of nodes. You can't even identify the nodes and there's an identical copy of the Bitcoin ledger on every one of them. So if all of the electricity got shut off everywhere on Earth and every computer failed everywhere on Earth for 10 years, the protocol just goes dormant for 10 years.
And as soon as one person turns one node back on, the entire protocol comes back to life again. There's nothing like that. All your money in a bank and Bank of America could be wiped out with, you know, a keystroke. You go and you wipe out a few servers. Your building can be wiped out with a bomb.
I can take down Google and Twitter and Facebook and Apple and Amazon and the US government much more easily. You take down Bitcoin. Bitcoin is the most resilient thing in cyerspace because it is so incredibly decentralized. Bitcoin is a bank in cyerspace offering a savings account. You're not gambling on the next product release of Apple versus Google and whether Amazon will get unionized and whether you know this pipeline will get approved and it's that's not right.
And if you put all your money in the S&P index, all the CEOs print more stock and dilute your money. So you don't have to do that. All you're buying is you're buying 121 millionth of the monetary energy in the network forever. The product of Bitcoin is just you're going to buy a bit of money and hold it forever and that's the product and it's a very simple product should last for 10,000 years. The idea of chains that last forever are not absent in the scriptures.
In 2 Peter 2:4 as well as in Jude 1:6, both mention the rebel angels or the watchers held in prison with chains of darkness or everlasting chains. This is particularly interesting since the chains are imprisoning those who were responsible for causing the ungodly creation of the race of Nephilim as well as many hybrid animals in the anti-deluvian world that eventually led to judgment by flood.
And in Revelation 20:1 and 2, an angel descends with a great chain that captures the dragon and binds him for 1,000 years. In 2 Chronicles 3, King Solomon is described as placing gold chains before the holiest of holies. The Hebrew word for chains, Strongs 8333, is sha sharah. And of course the cryptographic hash function used in the Bitcoin code is called SHA 256 SHA which stands for secure hash algorithm 256bit.
It was developed by the National Security Agency the NSA and was first published in 2001. It is now a standard in cyber security which we all use every day for digital signatures, password storage, emails and the rest. Considering the application of chains as part of a digital ledger in this modern vernacular, might there be any significance to a rebuilt third temple modeled after King Solomon's design here in 2 Chronicles 3, decorated with a network of interwoven chains, as the New Living Translation puts it.
Perhaps this is part of decorating the abomination of desolation where the god of fortresses is honored in place of the one true god. These are things yet to be revealed, but it is interesting that there is so much depth and consistency with application of meaning and understanding when it comes to items or objects in the word of God. But it's easy to see how as the world continues to adopt this technology of digital immutable ledgers that behave like biological ecosystems, we will eventually come to a world where anything of value, time, energy, money,
art, culture, even our memories, perhaps even our biological information are stored on the blockchain as a way to immutably and cryptographically ally secure that information. Such a ledger can be aptly described as a counterfeit ledger of life and may have a role in fulfilling the prophecies mentioned in Revelation 13, considering the mark and the image of the beast.
The term esquetology comes from two Greek terms escato and lavgo meaning roughly speaking last and or final and study of respectively. Theologically speaking then the term esquetology refers to quote the study of final things in the bible. It concerns both personal esqueological issues such as death and the intermediate state as well as themes with a more general or corporate focus.
The latter would include such ideas as the return of Christ, resurrection, judgment, tribulation, the millennial kingdom, and the eternal state. End quote. The Cambridge Dictionary defines a cipher as a system of writing that prevents most people from understanding the message end. If we put these words together, we can understand the escaton cipher to mean a system of writing that prevent most people from understanding the message about the end times.
But to expand on the definition in modern cryptography, a cipher is a mathematical algorithm used to perform encryption and decryption. So the escaton cipher can further be defined as a quote mathematical algorithm used to perform encryption or decryption of a message concerning the end times. To unlock any cipher, one must possess a key.
This is true in cryptography as a public key is used to encrypt a message while a private key is used to decrypt a message. The entire movement of the technocratic and scientific elite to overcome aging and eventually death has been a generational pursuit which started with the alchemists of generations past attempting to solve the puzzles of decay and find the keys over death.
Perhaps it is why the principalities and powers running the world currently are so busy building the apparatus to sustain a counterfeit ledger of life where every molecule on Earth is surveiled, monitored, and recorded for eventual judgment. This digitization or quantization might reveal the quantum algorithms operating unseen in all life forms.
Such would be the logic and reasoning for using our unique biological and electromagnetic identifiers as the keys to access the ledger that will promise eternal life. Your DNA becomes the password. Ultimately, such endeavors will be futile as they will only accelerate the return of Christ and the judgment of the wicked who pursue eternal life through their own flesh.
There are many examples of both literal and metaphorical keys in the Bible. But when it comes to the escaton, it's abundantly clear that Jesus Christ is the only one worthy to wield such keys. Revelation 1 17-18. When I saw him, I fell at his feet like a dead man. But he placed his right hand on me and said, "Do not be afraid. I am the first and the last, a living one.
I was dead and behold now I am alive forever and ever and I hold the keys of death and of Hades. According to expositors Greek Testament commentary quote Jewish belief assigned three keys or four exclusively to God ne anel saraphino commit which he entrusts neither to angel nor to sarif. These included according to different views Claus seepilorum keys of the tomb or grave.
Clavis u key of life resurrectionist mortarum key of the resurrection of the dead. To ascribe this divine prerogative to Jesus as the divine hero who had mastered death is therefore another notable feature in the highristologology of this book. End quote. Jesus alone is the one who holds the keys to reverse death and bring life.
These are extremely powerful keys that unlock unlimited power and authority within physical creation. It is not meant for mere mortal men to possess. This is why the growing rhetoric of defeating death in the high echelons of science and technology is indicative of the spiritualization and religiosity of secularism.
the last year, the one thing I've tried to put a priority on since I left the White House was, you know, getting some exercise in, I think that there's a a good probability that my generation is hopefully with the advances in science, either, you know, the the the first generation to live forever or the last generation that's going to die. And so, uh, we need to keep ourselves in in pretty good shape.
again from the book Game of Gods by Carl Tyik in a chapter titled Machines of Loving Grace in a section titled Sacred Secularism and Mystical Materialism. Quote, "The notion of secular faith hearkens back to St. Simon's new Christianity and Compt's Religion of Humanity. But a more direct iteration to transhumanism comes through the eugenicist and internationalist Julian Huxley.
Back in 1927, Huxley looked forward to a coming sacred secularity as outlined in his book, Religion Without Revelation. This faith without recourse to a transcendent God would be predicated upon Darwinian evolution and natural power.
Science would be the sacred force to control and direct said power, giving rise to an interconnected and unitary system of thought and action, resulting in growth and new life. it would be a sacred reality, a phrase he used in the struggle to express his vision. End quote. The goal for sacred secularity and mystical materialism is the pursuit to wield the keys or solve the equations that reverse death and unlock eternal life.
Revelation 3:7 to the angel of the church of Philadelphia, write, "These are the words of the one who is holy and true, who holds the key of David. What he opens, no one can shut, and what he shuts, no one can open." Here Jesus holds the key of David, a reference to Isaiah 22:22 when Eliakim is given the keys of the house of David, symbolizing authority over the royal house of Judah.
Interestingly, King David points to both God's powerful allegiance to his people, but also the inability for mere mortal men to wield such powerful keys. As perhaps the most complex character in the Old Testament, King David was a man with powerfully noble qualities, but also shortcomings that resulted in many tragedies. Matthew 16:1 19, I will give you the keys of the kingdom of heaven.
Whatever you bind on earth will be bound in heaven, and whatever you loose on earth will be loosed in heaven. This famous passage about the rock that the church is built on is concerning Peter. He is given the keys or cleo of the kingdom of heaven. This metaphorical key symbolized God's authority that can be wielded on earth. The binding and loosening likely referred to the forbidding and permitting of the faith.
Of course, Catholics, Orthodox, and Protestants all have different consequential interpretations. Yet to simply bring the attention back to the key would imply that something about their presence allowed them to be able to decrypt the sin state and reverse entropy not only in the physical domain as in miracles and healings but most certainly in the spiritual.
In fact, it can be argued that as Jesus is the wielder of the keys over death and Hades, we are each partakers in the possessing of the key that unlocks the kingdom of heaven for our fellow man. Biblical keys appear to give access to various supernatural powers that are most essential to restore fallen man and creation.
No single man or group of men can wield such powerful keys to its fullest capabilities. But it is written in God's escaton that a man and its system will emerge to try. Our digital world has changed the way we think about keys and physical security. As referenced before, Daniel 11 outlines the king who exalts himself.
Starting in verse 36, then the king will do as he pleases and will exalt and magnify himself above every god. and he will speak monstrous things against the god of gods. He will be successful until the time of wrath is completed. For what has been decreed must be accomplished.
He will show no regard for the gods of his fathers, nor for the one desired by women, nor for any other god, because he will magnify himself above them all. And in their place, he will honor a god of fortresses, a god his fathers did not know. With gold, silver, precious stones, and riches, he will attack the strongest fortresses with the help of a foreign god, and will greatly honor those who acknowledge him, making them rulers over many, and distributing the land for a price.
The god of fortresses might be a powerful artificial general intelligence responsible for the militant protection of a fortified temple. As referenced earlier concerning quantum computing, the physical locations that store the data and house the quantum processing to validate a future postquantum distributed ledger will become ever more important to protect.
In fact, it will become a national security issue. This concept of housing powerful master nodes for a given blockchain network is not something left for science fiction or fantasy. It is rather a core principle for how Bitcoin is being recognized not just as a new financial asset but as a literal weapon in the cybernetic age.
This is because Bitcoin operates on something called proof of work, which is a consensus mechanism used in blockchain technologies where participants compete with computing power to solve complex mathematical puzzles to validate transactions and create new blocks on the blockchain. The winner of each block wins the block rewards of which gets cut in half every 210,000 blocks until around the year 2,140 when all 21 million Bitcoin will have been minted.
But because the Bitcoin mining process is so energyintensive, it has also gified the harnessing and burning of energy to maintain this ledger. While this energyintensive mechanism is presented as a negative in the mainstream, we now have nations like El Salvador, the first nation to go on a Bitcoin standard, use the power of volcanoes to mine Bitcoin. And organizations like Bitcoin.
Energy, say in their directive, accelerate the global energy transition by supporting impactful projects and scalable solutions for the Bitcoin ecosystem, suggesting Bitcoin is a key to an abundant clean energy future. To further understand this connection, we will turn to Jason P. Lowry's book, Soft War, a novel theory on power projection and the national strategic significance of Bitcoin.
Formerly with the space force, Lowry seems to have been recruited by the intelligence apparatus. He argues how software has become the center of abstract power that controls population today. Quote, "Since multinational populations have become highly dependent on their computers, they are already highly dependent on the abstract power and control authority of software engineers who program them.
In a very short amount of time, under the noses of the people who don't understand human metacognition, cultural evolution, and abstract powerbuilding, software appears to have emerged as the predominant form of empire building in modern agrarian society, giving neo god kings the ability to rule over transnational populations through the computer they carry around in their pockets.
Today, it is not even considered remarkable that a single person has physically unconstrained ranks and control authority over 3 billion people's computers. End quote. Lowry argues that the tool to push back against these neo god kings is Bitcoin. Quote, the Bitcoin protocol empowers society to leverage physical power to battle for control authority over a potentially vital new agrarian resource, Bit Power.
Through this global scale power competition, Agrarian society decentralizes control authority over the ledger and achieves consensus on the legitimate state of ownership and chain of custody of bit power in a zero trust, egalitarian, and permissionless way. By simply giving permission to write the ledger to those who win the physical power competition, Nakamoto solved the double spend problem in a way that doesn't make people as vulnerable to systemic exploitation and abuse of software administrators. End quote. While Bitcoin does appear to be a
way to solve the current problems with our monetary system and our political systems, ultimately the adoption of this technology will have severe social consequences. This new race for bit power across the world will likely continue to erode national boundaries as those competing will be wealthy nation states, governments, and corporations.
The inevitability of the militarization of Bitcoin and its inevitable move towards biological computing along with its revolutionary monetary implications make it very likely that Bitcoin or something like it will play a major role in the fulfillment of biblical prophecy. [Music] Whether Bitcoin or blockchain will actually be involved in the fulfillment of biblical prophecy is less important than having a personal relationship with Christ as part of his promise to restore the world and judge the wicked.
We can navigate this rapidly changing world knowing that despite all the wild and crazy things we will continue to see unfold, God is ultimately in control. Our fallen state began with deception. Genesis 3:13 Then the Lord God said to the woman, "What is this that you have done?" The woman said, "The serpent deceived me and I ate.
" Paul in the New Testament expressed how we are susceptible to the same deception, and the only way to avoid it is by way of a sincere and pure devotion to God. 2 Corinthians 11:3 But I am afraid that as the serpent deceived Eve by his cunning, your thoughts will be led astray from a sincere and pure devotion to Christ.
In this life, we must consciously battle against our default fallen state, which is offensive to God. We all fall short to the glory of God. Psalm 34:13, "Keep your tongue from evil and your lips from speaking deceit." Psalm 52:2, "Your tongue plots destruction like a sharp razor, you worker of deceit.
" Scripture tells us that the intention of our hearts matter in any given worldly endeavor. Proverbs 12:20, "Deceit is in the heart of those who devise evil, but those who plan peace have joy." The people who reject God openly and proudly will continue to have a louder and louder voice, carrying the torch with the flame of deception all the way to the abyss.
Jeremiah 9:6, "Keeping oppression upon oppression and deceit upon deceit, they refuse to know me, declares the Lord." In the years to come, the general public will be presented with more and more new and old mythologies to build the foundational narrative for the technocratic society. But as the Bible warns, we ought not to be led astray, as many of these ideologies will be of the elemental spirits.
Colossians 2:8, "See to it that no one takes you captive by philosophy and empty deceit, according to human tradition, according to the elemental spirits of the world, and not according to Christ." While there are a few different ways that commentators have described the elemental spirits, the most fascinating one suggests that these represent the spirits and gods, the principalities and powers that work symbiotically with mankind, perhaps through the bare elements of the material world.
While Bitcoin and blockchain seem like abstract software running on computers, it has revealed to us the spiritual side of technology by reflecting biological networks. One prime example comes from an interview published on July 5th, 2023 titled Bitcoin functions like a biological network with Brandon Quitum BTC 137.
Host Preston Pish interviews Brandon Quitum, who suggests that the Bitcoin network behaves like the fungi kingdom. The majority of most fungi's life are spent underground or in a tree in a form that we'll call mycelium. And mycelium's the most interesting part of the kingdom in my opinion. And it also uh as we'll find out soon ties directly into Bitcoin, which I know sounds totally weird, but it is true.
And at mcelium form uh think about an underground network of tubes. So one cell wall very tiny little tubes that branch and fragment and connect trees together. Um the recent studies are showing that they send information birectionally. They trade resources. And so underneath a forest is this um enormous network of multiple fungi plants working together and trading.
And it it actually resembles an underground economy and we now affectionately call this the woodwide web, right? This underground network there. There are also amoeba that operate with what has been described as cellular intelligence. There's a slime mold and this slime mold is very, very good at navigating through mazes and challenges. The Japanese are so clever at this.
They designed a nutrient maze replicating Tokyo in the Japanese subway system. put oats which is a nutritional source. They kind of aggra map. The main oat was where Tokyo was. They inoculated it. Then they let the slime mold grow and first it grew out randomly. After 28 hours it reorganized itself in the most efficient way possible and reorganized the Japanese subway system in a more efficient manner than it's designed today.
Thus, this is an demonstration of cellular intelligence. Whoa. There are different types of intelligence and this is an emergent intelligence that it just comes out of the desire to find food and be optimized. And I think biology has these sort of base operating parameters, these search functions, these optimization functions inherent somewhere deep down in the algorithm that produces evolution to produce this type of information.
And it also tells us a lot about Bitcoin, right? Because these decentralized networks, although not smart like we are, they do make good decisions because we're each individually on the edge of the network making decisions. Which wallet do I use? Which exchange do I use? Which software patch do I I go for? And we're all making decisions for us, right? And we have the best information.
And the aggregate of that creates the network. And that makes it very resilient as a life form, right? Which fungi are extremely resilient. A living organism that is a technological network layer that is also a money or a social contract and medium of exchange closes the gap between literal and metaphorical interpretations of the beasts in esqueological passages in the Bible.
As covered in prior films, the lion, leopard, and bear described as kingdoms in the book of Daniel with a fourth beast that is exceedingly powerful is mirrored in Revelation 13. This beast out of the sea has 10 horns and seven heads which represent 10 kings as well as seven mountains.
It says in Revelation 13:2, "The beast I saw was like a leopard and the feet of a bear and the mouth of a lion." A leopard, the watchful animal ready to strike, resembles the total surveillance apparatus. A bear who violently defends her offspring and devours flesh with three ribs in her teeth, possibly relating to the rib from Adam that formed Eve, reflects the biological changes that we are about to undergo as a society.
A lion with wings, the most fierce animal being downgraded into a human being might imply the animal kingdom becoming anthropomorphized through these transitional phases. But this is only concerning the first beast. It is the second beast who performs miracles and leads people to build an image of the beast that provides the mark of the beast as the only way to be included in its economic ecosystem.
When applying the closing gap of literal and metaphorical that technology brings, such prophecies become disturbingly accurate depictions of where we are headed. But don't fret. It just means that Jesus Christ is coming back soon. [Music] Stand up on the in the sea. Please rise out and send his tles upon his horse
crowns [Music] upon his hand Bless me [Music] [Music] [Music] in the east which I saw was like a li and his feet were as the feet bear. [Music] His mouth is the mouth of the lion. And the dragon gave him his power in sea in great glory. [Music] And I saw one of his head as he weren to death [Music]
in his wal. [Music] All the world after the beast. [Music] Rise and measure the temple of God. Measure the altar and those who worship there. But do not measure the court outside the temple, for it is given over to the nations. They will trample the holy city for 42 months, and I will grant authority to my two witnesses during those days.
If anyone harms them, fire will pour from their mouths and consume their foes. They will have the power to strike the earth with every kind of plague as often as they desire. And when they have finished their testimony, the beast that reigns over the abyss will rise against them and kill them, and their bodies will lie in the street for 3 and 1/2 days.
All the nations will see their dead bodies and refuse to bury them. Those who dwell on the earth will rejoice because these two prophets had been a torment to them. But after the 3 and 1/2 days, the breath of life will enter them, and they will stand. They will rise to heaven in a cloud, and their enemies will watch them.
When the seventh angel blew his trumpet, every voice in heaven called out, saying, "The kingdom of the world has become the kingdom of our Lord and of his Christ, and he shall reign forever more." Then God's temple in heaven was opened, and the ark of his covenant rested within it. [Music] And behold, a great sign appeared in heaven. A woman clothed in the sun.
The moon was at her feet, and on her head was a crown of 12 stars. She was pregnant and crying out in the agony of birth. Then another sign appeared in heaven. Behold, a great red dragon with 10 horns and seven heads, and on his heads were seven crowns.
His tail swept down a third of the stars of heaven and cast them to the earth. The dragon stood before the woman who was giving birth so that he might devour the child. But when she gave birth, the child was caught up to God, and the woman fled to the wilderness, to a place prepared by God. Michael and the host of heaven fought against the dragon and his angels.
When the dragon was defeated, there was no longer any place for him. So, the great dragon was thrown down. The ancient serpent who is called the devil and Satan, the deceiver of the whole world, was thrown down to the earth. And his angels were thrown down with him. Then I heard a loud voice in heaven saying, "The salvation of our God and the authority of his Christ has come.
For the accuser has been thrown down. They have conquered him by the blood of the Lamb. Therefore, rejoice, O heavens, and you who dwell in them. But woe to the earth, for the devil has come down to you, and he knows that his time is short." When the dragon had been thrown down to the earth, he pursued the woman that had given birth to the child that was caught up to God.
But the woman was able to flee to the place where she is nourished. Then the dragon became furious and went off to make war on the rest of her offspring, on those who keep the commandments of God and hold to the testimony of Christ Jesus. Value for value, we take no money from corporations, commies, or cartels.
Exploring the Vast World of Esotericism
Esotericism, often shrouded in mystery and intrigue, encompasses a wide array of spiritual and philosophical traditions that seek to delve into the hidden knowledge and deeper meanings of existence. It's a journey of self-discovery, spiritual growth, and the exploration of the interconnectedness of all things.
This mind map offers a glimpse into the vast landscape of esotericism, highlighting some of its major branches and key concepts. From Western traditions like Hermeticism and Kabbalah to Eastern philosophies like Hinduism and Taoism, each path offers unique insights and practices for those seeking a deeper understanding of themselves and the universe.
Whether you're drawn to the symbolism of alchemy, the mystical teachings of Gnosticism, or the transformative practices of yoga and meditation, esotericism invites you to embark on a journey of exploration and self-discovery. It's a path that encourages questioning, critical thinking, and direct personal experience, ultimately leading to a greater sense of meaning, purpose, and connection to the world around us.
π
Welcome to "The Chronically Online Algorithm"
1. Introduction: Your Guide to a Digital Wonderland
Welcome to "π¨π»πThe Chronically Online Algorithmπ½". From its header—a chaotic tapestry of emoticons and symbols—to its relentless posting schedule, the blog is a direct reflection of a mind processing a constant, high-volume stream of digital information. At first glance, it might seem like an indecipherable storm of links, videos, and cultural artifacts. Think of it as a living archive or a public digital scrapbook, charting a journey through a universe of interconnected ideas that span from ancient mysticism to cutting-edge technology and political commentary.
The purpose of this primer is to act as your guide. We will map out the main recurring themes that form the intellectual backbone of the blog, helping you navigate its vast and eclectic collection of content and find the topics that spark your own curiosity.
2. The Core Themes: A Map of the Territory
While the blog's content is incredibly diverse, it consistently revolves around a few central pillars of interest. These pillars are drawn from the author's "INTERESTORNADO," a list that reveals a deep fascination with hidden systems, alternative knowledge, and the future of humanity.
This guide will introduce you to the three major themes that anchor the blog's explorations:
* Esotericism & Spirituality
* Conspiracy & Alternative Theories
* Technology & Futurism
Let's begin our journey by exploring the first and most prominent theme: the search for hidden spiritual knowledge.
3. Theme 1: Esotericism & The Search for Hidden Knowledge
A significant portion of the blog is dedicated to Esotericism, which refers to spiritual traditions that explore hidden knowledge and the deeper, unseen meanings of existence. It is a path of self-discovery that encourages questioning and direct personal experience.
The blog itself offers a concise definition in its "map of the esoteric" section:
Esotericism, often shrouded in mystery and intrigue, encompasses a wide array of spiritual and philosophical traditions that seek to delve into the hidden knowledge and deeper meanings of existence. It's a journey of self-discovery, spiritual growth, and the exploration of the interconnectedness of all things.
The blog explores this theme through a variety of specific traditions. Among the many mentioned in the author's interests, a few key examples stand out:
* Gnosticism
* Hermeticism
* Tarot
Gnosticism, in particular, is a recurring topic. It represents an ancient spiritual movement focused on achieving salvation through direct, personal knowledge (gnosis) of the divine. A tangible example of the content you can expect is the post linking to the YouTube video, "Gnostic Immortality: You’ll NEVER Experience Death & Why They Buried It (full guide)". This focus on questioning established spiritual history provides a natural bridge to the blog's tendency to question the official narratives of our modern world.
4. Theme 2: Conspiracy & Alternative Theories - Questioning the Narrative
Flowing from its interest in hidden spiritual knowledge, the blog also encourages a deep skepticism of official stories in the material world. This is captured by the "Conspiracy Theory/Truth Movement" interest, which drives an exploration of alternative viewpoints on politics, hidden history, and unconventional science.
The content in this area is broad, serving as a repository for information that challenges mainstream perspectives. The following table highlights the breadth of this theme with specific examples found on the blog:
Topic Area Example Blog Post/Interest
Political & Economic Power "Who Owns America? Bernie Sanders Says the Quiet Part Out Loud"
Geopolitical Analysis ""Something UGLY Is About To Hit America..." | Whitney Webb"
Unconventional World Models "Flat Earth" from the interest list
This commitment to unearthing alternative information is further reflected in the site's organization, with content frequently categorized under labels like TRUTH and nwo. Just as the blog questions the past and present, it also speculates intensely about the future, particularly the role technology will play in shaping it.
5. Theme 3: Technology & Futurism - The Dawn of a New Era
The blog is deeply fascinated with the future, especially the transformative power of technology and artificial intelligence, as outlined in the "Technology & Futurism" interest category. It tracks the development of concepts that are poised to reshape human existence.
Here are three of the most significant futuristic concepts explored:
* Artificial Intelligence: The development of smart machines that can think and learn, a topic explored through interests like "AI Art".
* The Singularity: A hypothetical future point where technological growth becomes uncontrollable and irreversible, resulting in unforeseeable changes to human civilization.
* Simulation Theory: The philosophical idea that our perceived reality might be an artificial simulation, much like a highly advanced computer program.
Even within this high-tech focus, the blog maintains a sense of humor. In one chat snippet, an LLM (Large Language Model) is asked about the weather, to which it humorously replies, "I do not have access to the governments weapons, including weather modification." This blend of serious inquiry and playful commentary is central to how the blog connects its wide-ranging interests.
6. Putting It All Together: The "Chronically Online" Worldview
So, what is the connecting thread between ancient Gnosticism, modern geopolitical analysis, and future AI? The blog is built on a foundational curiosity about hidden systems. It investigates the unseen forces that shape our world, whether they are:
* Spiritual and metaphysical (Esotericism)
* Societal and political (Conspiracies)
* Technological and computational (AI & Futurism)
This is a space where a deep-dive analysis by geopolitical journalist Whitney Webb can appear on the same day as a video titled "15 Minutes of Celebrities Meeting Old Friends From Their Past." The underlying philosophy is that both are data points in the vast, interconnected information stream. It is a truly "chronically online" worldview, where everything is a potential clue to understanding the larger systems at play.
7. How to Start Your Exploration
For a new reader, the sheer volume of content can be overwhelming. Be prepared for the scale: the blog archives show thousands of posts per year (with over 2,600 in the first ten months of 2025 alone), making the navigation tools essential. Here are a few recommended starting points to begin your own journey of discovery:
1. Browse the Labels: The sidebar features a "Labels" section, the perfect way to find posts on specific topics. Look for tags like TRUTH and matrix for thematic content, but also explore more personal and humorous labels like fuckinghilarious!!!, labelwhore, or holyshitspirit to get a feel for the blog's unfiltered personality.
2. Check the Popular Posts: This section gives you a snapshot of what content is currently resonating most with other readers. It’s an excellent way to discover some of the blog's most compelling or timely finds.
3. Explore the Pages: The list of "Pages" at the top of the blog contains more permanent, curated collections of information. Look for descriptive pages like "libraries system esoterica" for curated resources, or more mysterious pages like OPERATIONNOITAREPO and COCTEAUTWINS=NAME that reflect the blog's scrapbook-like nature.
Now it's your turn. Dive in, follow the threads that intrigue you, and embrace the journey of discovery that "The Chronically Online Algorithm" has to offer.