[ / / / / / / / / / / / / / ] [ dir / random / 93 / biohzrd / hkacade / hkpnd / tct / utd / uy / yebalnia ]

/gnosticwarfare/ - The Future of AI Conflict

All things Butterfly War, New Emotion, and Gnostic Warfare
Email
Comment *
Password (Randomized for file and post deletion; you may also set your own.)
Archive
* = required field[▶Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options


Cogops > Psyops


d4afb1 No.375

http://cultstate.com/2018/07/30/What-Is-A-Cult-State/

> Moore’s Law states the number of transistors in a dense integrated circuit doubles about every two years. By doubling the transistor density, the time to perform information labor halves. This results in the reduction of price for media creation, data analysis, and data collection while simultaneously increasing its distribution potential. This also drives an increase of the volume of domestic and foreign signal analysis competition against bloated, unaccountable centralized state-backed intelligence agencies. As Moore’s Law makes information processing cheaper, the blackmail network that keeps the nuclear paradigm stable can be discovered, evaluated, and captured in part or in whole by any upcoming competiton. Deterring this outcome has become increasingly difficult for state actors as processors, data centers, and data science techniques become cheaper and more abundant. The Hapsburg-dominated Church once experienced this same exact problem within the context of the printing press, and in a way, the transistor is the American printing press, but that’s an analysis for another day.

> The insurance file for Julian Assange is a massive collection of encrypted data. The unencrypted contents of that file have kept him alive through two administrations. This has made him a difficult person to make an example out of because I suspect within that insurance file is a significant number of video footage, images, and information about the blackmail network. Upon Assange’s death, his deadman switch will activate, and the key to unlock those files will be available to all who have downloaded the file. What options do central intelligence agencies have to thwart this trend?

____________________________
Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.

461bec No.395

https://twitter.com/CultStateDotCom/status/1042173953798823943

> Canadian beatings will continue until the appropriate parties flip on each other.

> #thirdTempleDown

It's his 666th tweet

hrmmm

Disclaimer: this post and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the 8kun administration.



[Return][Go to top][Catalog][Nerve Center][Random][Post a Reply]
Delete Post [ ]
[]
[ / / / / / / / / / / / / / ] [ dir / random / 93 / biohzrd / hkacade / hkpnd / tct / utd / uy / yebalnia ]