Why Nostr? What is Njump?
2024-08-15 21:01:08

andre21 on Nostr: Source: Political Disgruntlement The global population is being exploited and abused ...

Source: https://x.com/mars_quaking/status/1824139558352548312

Political Disgruntlement
The global population is being exploited and abused through their belief systems at unprecedented scales. Whether it's people believing they can have honest elections, people believing their political currency isn't being massively abused, or people believing the software they use is secure and isn't being used to manipulate them and cause population scale behavior.

People have an instinctual sense that something is deeply wrong with the system they exist in but because the abuse they are experiencing doesn't leave a blood trail they are having a difficult time pinpointed where that abuse is coming from. Many people will place blame on one political party or the other without realizing that people in both parties are unsympathetic to the rule of law that ostensibly exists to ensure everyone is playing on a level field. People are using computers more and more in their everyday lives for work, entertainment, and everyday needs without realizing they are trapped in a trust-based system where the people who control the software they use have complete and total control over their data, and are psychologically abusing and manipulating them through that data to get them to believe what they want them to believe, think what they want them to think, and ultimately take the actions they want them to take in three dimensional meatspace. This includes who they want you to vote for, what they want you to eat, what they want you to drink, where they want you to live, what products they want you to buy, what illicit drugs they want you to use, and what medications they want you to take.

You may be thinking at this point "that's a lot of shadowy "they" talk, who are "they"". They are the people who are at the top of the trust-based hierarchy you are ostensibly locked into. Whether that's the people running the government, or the people in control of the software you use. Trust is a demonstrably bad security strategy, and people in the US currently trust 0.00008% of the population not to abuse the trust placed in them by the other 99.9999%. There exists a massive benefit to the people at the top of this hierarchy to abuse the trust placed in them for their own personal gain. Humans are going to act in their own self-interest. Abuse of this trust comes as no surprise.

The urge to want to learn how to cause human behavior has been around for a long time. A more extreme example of this in recent history is the MK Ultra research project conducted by the intelligence community of the US.
This research is ongoing, their quest to understand how to cause individual behaviors in humans has only scaled up and is at the point now where they are becoming adept at causing not just individual behaviors but population scale behavior. Where typical animals can become domesticated via artificial selection, humans can become psychologically domesticated. When an animal becomes domesticated the people who domesticate it can then easily control and exploit it for the resources it provides. This is the ultimate goal of projects like MK Ultra, to domesticate a society to the point where the people creating the belief system in which domesticated humans exist have complete and total authority over the people and the economic resources they provide.

But people don't have to be trapped in a trust-based system where the people with control cannot be trusted. There is another option and nature has known this solution for billions of years. Humans need to establish a physical-power-based hierarchy to break free from the abstract chains that bind them. In a trust-based system, we must trust people who are abusing that trust to determine the legitimate chain of custody of the populations resources. On the other hand, physical-power-based hierarchies are permissionless and zero-trust systems that are inclusive to all members of the system. This is why we have 190+ countries on the planet that creates decentralized control over the planets resources. If we zoom into a single one of these jurisdictions however, in many of them the people are being exploited and psychologically domesticated by their ruling class so they can have total control over the populations resources. So nations physically compete with each other to establish their position in a physical-power-based hierarchy that decentralizes control over resources between 190+ nations. But how are smaller organizations of people within these jurisdictions supposed to participate in this physical power competition, especially when many of these nations are heavily armed and outmatch the kinetic power of the populations in their jurisdiction? The answer is we need to find a way to physically compete to secure their property, and what they believe in, in a non-kinetic way.

Extradinarily this appears to be exactly what the Bitcoin protocol and its underlying hardware represents. Fifteen years ago, an anonymous software engineer released a protocol that allows humans to physically compete using non-lethal electricity to determine the legitimate state and chain of custody of a valuable monetized resource in a permissionless, zero-trust, and inclusive way that today is emerging as the most decentralized physical-power-based hierarchy our planet has ever witnessed. Furthermore, this valuable monetized resource is from a first principles perspective simply bits of machine readable information produced using very large and infinitely scalable amounts of physical power. This means that theoretically, software engineers can use these new kind of bits to design software that imposes a severe physical cost on anyone who would attempt to abuse or exploit their software. This means software engineers can design software that doesn't rely on a trust-based hierarchy to achieve security. The implications of this is that not only has 7the ability to engage in physical power competition to establish ones position in the global physical-power-based hierarchy been democratized to the individual level, but that the legacy internet itself is going to start becoming physically decentralized and physically secured. The implications of this technology and it's complex emergent behavior is profound and could be compared to the invention of agriculture.

Act permissionlessly. Run a node. Control your own hash power. Sell your political currency that is being abused and exploited by untrustworthy people for a form of monetized resource they cannot exploit.


Author Public Key
npub1eqc7yg03v6xaptd26pkrcet52e54gualxf5z35fdkrxayanzt74qhjdfpd