You are viewing a single comment's thread from:

RE: Scenario Planning and Predictions for the 2020’s Transhumanist Global Revolution

@taskmaster4450 - In the early days of the internet there were 1000's of internet service providers which worked similar to dialups where you would use the telephone company to route a call through a modem into another computer. Telephone companies started to panic because of the disintermediation of their income stream (email could replace phone calls, long distance revenue dropped). So they decided to become the access point to stay in control of the decentralizing effect of people dialing up into each others computers. The early "windows for workgroups 3.11" had an application called Telnet that would allow this kind of connection in the early 90's.

These days, telephone companies have become the gate keepers to the internet by rebranded themselves as communication technologies. Then they bought each other into a mostly single conglomeration company that controls access. This has become a centralized choke hold point through which an "internet drivers license" can be implemented as the Hegelian response to the cyber plandemic exercises of Klaus Schwab and the WEF have planned (probably when they do the Tether rug pull).

There are ways to defeat the tracking of IP addresses by such technologies as chain analytics (used to track bitcoin). Edward Snowden used both Tails and Qubes (Linux distros) to make sure that machine (mac addresses) are spoofed and IP's are chain proxied, etc. However, if you ever interacted with your crypto without using ToR (The Onion Router), there will be a record that can be traced back to either a VPN log or you directly. Typically a centralized exchange will associate the KYC data to an exit address (bitcoin or private crypto wallet) giving it your identity.

If you mined your crypto using ToR, there is no KYC for those coinbase awards, but they also have no "dirty history" or "taint" as the CFTC would call it. Bitcoin being a transparent ledger though can be monitored for future IP address interaction by chain analytics and use a form of eigenvector analysis to probabilistically guess the owner (which will fail if ToR is always used).

There are coins out there that are not transparent, and cannot be monitored using zero knowledge proofs. There are DEX technologies like atomic swaps that do not use centralized exchanges or entities where human decisions can be made. They are unconscious code operating "boolean like" decisions as to whether a UTXO is valid or not. The problem with these technologies up to this point has been the lack of liquidity.

The question that remains is which way does the system break? Does it favor decentralization or centralized control?

The early days of the internet were transparent with http. Now it's rare for a website to operate without http(S). The same is already happening in the crypto industry and projects like Monero have been gaining recently against Bitcoin. People forget (or never knew) that Satoshi Nakamoto was intrigued by the developments in privacy, saying on bitcointalk.org that (he/she/they) didn't know how to implement it.

Some are still making the assertion that the seemingly "all powerful" cabal is still fully in control. Maybe in control enough to survive the coming collapse, but from my perspective, definitely not God.