Warning: Some posts on this platform may contain adult material intended for mature audiences only. Viewer discretion is advised. By clicking ‘Continue’, you confirm that you are 18 years or older and consent to viewing explicit content.
It’s obviously not a comprehensive guide on how to cheat the system. I’m making the point that computers will never be secure under the current paradigm when there are massive and powerful actors with vastly greater resources than the average person. I strongly suspect that an org like the DoD (which had exclusive access to integrated circuit technology for three years before anyone else) could probably capture/spoof virtually the entire network if they wanted too.
By spending billions of dollars in order for them to dupe a transaction worth a couple million at most. Once. Before the entire network realizes what happens and a fork is made. It’s just idiotic enough to work!
It’s obviously not a comprehensive guide on how to cheat the system. I’m making the point that computers will never be secure under the current paradigm when there are massive and powerful actors with vastly greater resources than the average person. I strongly suspect that an org like the DoD (which had exclusive access to integrated circuit technology for three years before anyone else) could probably capture/spoof virtually the entire network if they wanted too.
By spending billions of dollars in order for them to dupe a transaction worth a couple million at most. Once. Before the entire network realizes what happens and a fork is made. It’s just idiotic enough to work!