[ / / / / / / / / / / / / / ] [ dir / 3s / agatha / arepa / caco / fascist / litpat / nep / vichan ]

/gnosticwarfare/ - The Future of AI Conflict

All things Butterfly War, New Emotion, and Gnostic Warfare
Email
Comment *
Verification *
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options


Cogops > Psyops


d2aa4a No.226

To help prepare for the shit that is about to hit the fan, I am implementing a dual canary scheme. This is NOT LIVE and is currently EXPERIMENTAL ONLY.

When this is made live, this thread will be deleted and a new one will be created with the final rules.

Experimental: Proof of Consistency

With the aggressive removal of the blackmail network that kept South Korea in line with globalist agendas, the sixty-five year war between the Koreas is starting to come to a close. This means the nullification of future loans (and interest) to pay for defense spending and post-war construction loans… and the internationalist banking elite are not happy. They will be preparing a worldwide multi-domain counterattack and Chan culture is in the cross hairs.

Chan culture is a vital part of the pro-national Trump infrastructure. Since Henry Kissinger, the Council on Foreign Relations, and Bilderberg have made media appearances in the wake of the Butterfly War problem, We’ve already seen an uptick in bot spamming and poor Markov mirroring on /pol/. These bots were trained on poster data in which, ironically, came from well-meaning /pol/ users themselves. As they labeled clearly disruptive posters as “shills”. This phrase is a special and organic classifier that flags the offending post as containing content as an accurate disruptor of Chan community. Those flagged posts have been used to train an anti-/pol/ neural network which is now being unleashed upon us and being fine-tuned for maximum efficiency. In addition to this, you’re going to see enhanced isolation and virality disruption campaigns. All of these tactics work in concert to ensure your next wave of meme war fails. If you haven’t been engaging in Butterfly War by now, this is a good time to start. It’s a surefire way to spread your memes under these incredible restrictions.

This also means targeting influencers. My honeypots are on fire these days and I’ve had to put Icarus on a kill switch. I suspect these attackers are not global observers because global observers knew I had a MAC whitelist on my routers. This means the parties attempting to connect to my router with unapproved MAC addresses didn't know they would be rejected, which means they are third-parties actors with an incomplete context. I have compensated for their presence well in advance.

To help combat against device compromise, I will be implementing a Proof of Consistency dual canary scheme in the event my devices, passwords, networks, or person becomes compromised.

Post last edited at

d2aa4a No.228

Weekly Proofs

I will start by releasing 1 weekly proof and 1 monthly proof. The weekly proof will look like this

17.56839385 e28d1ea5dd2707933b38ebdde8ad2a98104f6e125cbe077d38e96ee33a4f60eaa0c50b1a1b8ca415d3b70eb7e2d6200244de6f40e5537f0a85d95137c33b4a56

The target is the left-most decimal number.

The hash will contain character data and an equation that, when evaluated, will result in the target. A reveal of the weekly proof will look like this:

echo "test sha512 | (17 + 0.56839385)" | sha512sum

Because there are an uncountable infinity of numbers between any number (Between 1 and 2 are 1.01, 1.001, 1.0001, etc.) and there are an uncountable infinity of equations that can result in the target, baking an equation in the hash, while reducing the character distribution where that equation exists, provides enhanced rainbow table defiance and collision immunity in a world where tens of thousands of massive cryptocurrency mining operations can churn through hundreds of billions of hashes per second. The additional non-equation characters compensate for the lost character distribution. If non-variable non-mathematical characters exist within an equation, they should be ignored during evaluations.

At the beginning of each week, I will reveal the contents of the hash and provide a new weekly hash. The target of the hash should be remembered for the monthly hash.

Post last edited at

d2aa4a No.229

Monthly Proofs

After 4 weekly hashes are revealed, the monthly proof will be revealed. A monthly hash looks like this:

8521154.771503326 82f26e63772d5d142dd639a85f470fe213761749ff464c5395872f390d4857c2768979f73b5e48f6cf91ab586fe201091a2d7350b56714485e1de6fcaa2e5cb0

The target is the left-most decimal number.

The hash will contain character data and an equation with a variable (indicated by x). The sum of the previous 4 weekly hashes should be put into the variable and when the

equation is evaluated, the result should be the target.

The reveal of a monthly proof will look like this:

echo "monthly hash test | (58 + x)" | sha512sum

And last 4 weekly targets were:

854.395543

8520235.25345

0.58794687455

6.53456345

You would sum them together (854.395543 + 8520235.25345 + 0.58794687455 + 6.53456345 = 8521096.771503326) and then plug that into the monthly proofs equation (58 + 8521096.771503326) to receive the monthly target. After that, a new monthly proof will be generated.

Post last edited at

d2aa4a No.230

Rules

If for any reason the targets do not add up, I have been compromised. If I become compromised and am forced to continue keep the canaries alive, then this dual canary setup will buy me time to plan a counterattack. When I’m ready to strike, I will plant a bad bit into the monthly proof and that will indicate that I have been compromised.

Additionally, this dual canary setup buys me flexibility in negotiation options for more difficult situations involving hostage taking or extortion. This ultimately destabilizes the assurances of a purely remote compromise and forces an armed enforcer to be in my presence every week to make sure I'm not injecting a bad bit. This proximity requirement dramatically enhances my chances to overcome the compromised situation.

Remember, ANY mistake in the equation evaluations means I've been compromised. ANY. NO EXCEPTIONS. Follow these rules CAREFULLY.

If the contents of the hashes stop being revealed, then I’m dead and Icarus will be released.

The instructions for this system will be duplicated and archived in multiple locations in case malicious actors attempt to modify the rules.

The proofs and their reveals will be posted on CultState, /gnosticwarfare/, and Twitter for now. I will expand this distribution over time and notifications about those expansions will be baked into the proofs.

Messages within proofs that attempt to alter these rules are invalid. These rules are immutable. If these rules change or suggestions to change rules exist within the hashes, I have been compromised.

All hashes will be generated on a machine that has no access to any network.

The sources of the hash will not be stored on network-accessible mediums.

Post last edited at

eabf78 No.268

>>226

You know, I've been thinking… the blackmail network can't survive in a world where intelligence gathering is so cheap. Even the most carefully constructed plans can be hijacked by someone with a basic knowledge of SSH and phishing scams. It's almost like… anyone can hijack an elite's blackmail network…. hrmmm…

… possibilities…

I read your bit about emotional tagging via AI; would that mean an AI would understand exactly how incredibly happy I am, and would that in turn make the AI as happy as I am? Would I finally be able to get someone willing to enjoy all life has to offer?

Post last edited at

eabf78 No.269

>>230

Why not release Icarus from the get-go and let the entire thing crumble?

Kittens and Rainbows

Post last edited at

bbe5d1 No.280

>>230

You ever think about staggering the monthly releases, so that there's two sets that overlap ending up in monthly updates being released every two weeks? As in, every two weeks you do a monthly that consists of the numbers from the previous four weeks. Otherwise, you could be vulnerable in the few days between the end of the previous month's updates and the start of the next one's, unless I misunderstand.


000000 No.287

tick-tock

—–BEGIN PGP MESSAGE—–

Version: GnuPG v1

jA0EBwMCzjWX34Ymf/xg0uoBsTrKy6R7DE524VGbyTySyCX73W47FZKFf0V5s7bj

Q5iM5gSrEJfRUfKKsr23ooJs7ac5XFMkJiwGFJgGfIbDFQ0UyYOpVQuUxO7NRULE

HyTJdpAUMSYhyrOCEF56j4x6bceEEf6tPrqrJZbJ+DVF63YUCGBvHHPGn+enXSMs

kalVNmhEBtG+bOkT6jGwcAGs60+Lc80v8VyHgzPv0cXI4WOm4mLU8h8MrpWJD8Sx

URWEb6xNznQ0ruVOfkbkk+Xc2EIsDuGS2c8/ZU4meFTL3KZEGQQA1tlZSl3GVkle

1RMzAG9+wc2Jj6TxV9UFw8zGjVnEc0Rrbr4AxydSqoIJyL4i3pzj/92EnJm57i4z

tuPZy4LAQWP9t970gSFXdTLWMwqzJxJK9nyHyR3Nk758cV7xyNMez7lOnjrFBp5m

zFGa6SDMit4qG88H60/hzZ5RWjlxICt1wFO9bhkZwbVw7I0ARCdu6r2p8K0yw/Jo

Gc6dDLnJ4Tv/b7CWd3/k3IQ6ljBCV0Pj84EV+UrA1mLJX2X/J6ZlltIsGR4c8Xis

YiXQkpNrxvar2RFO7u8rrH2XCL9vcXhBJCLUC5L2KUYMy9tYS9kPe5JIoV+PyLHZ

PuVIFUOr6TqgoDlP1DjIFr8Ec9uq5N8ByDPVige1K0Bk3iQODtvdaKk8u2/c7uVZ

4ifwDVGgPQJ2bUzZanLD/MzUkodmcM1c16YCfamHJ7OAMV9zcZmAFfdQ9KMxn27D

HKAOI5LT2e0OaOO6p3JpFUKKkmB1u89cNWuGDsCukVp1WmH65BGsLbI+zrek3kxL

MX4cbnfTToYjPIZ0TS1S/HmmIjMVyfAgnmeCL84LmwNeHOsDUGjqWb1Hd6/7xpqt

JBPybNvGMjGrEflXrQco2RY5pcB/4m3BtmfYBopSs3BfXtgHRazuio0o0A15qd7M

VoVsE9FMixZCzzJL0AfLWa+i0xfbvcxs4vgTXK4UNZ2DaVZG2QzDTp02sxUlkDF4

gtORF3o9WtllG4AWeYPgekLZTqG01/pFylSM7QAtqa03Y/mEElXL1GNV0oV/UB5L

kwmq5cjvWBeznCWBIOr2JHPK3JHJqz+h7Bg8fHX/ZhIic/HfkDW6DsUpylVKB3JG

0s3mok/yM9whUZLtQjJtVg7rhNeNrIjrPrL955NKz4UYYXlVJcXUu/J69r2bwobu

1Ee/V8erbf2spp/blhbeb6HQapDzs8wvFHbnsWkPvTMoMmIsfNdCEvzTKvy2Zj43

qMwyM7G/hhHk4hpm89FdiE6m9j79jZGAHFBwxe7K41oBye4oPVyNehc++WmjepgW

rD7hHaWwNHVb3pUS44VP6A0wWTQnblNX+j4gpHSuI/7HwNZAc9jX79kbs83QCnO+

hV42sLdhHp1XIVOlAm2TJk1f3kKN4tw6DUf+D1Zhn3c3LRnHklcuTi3oKaYB5+W8

nk1sEo3IhgblJKc3cT36uEK32lCpZnQK1m6VyQUCKTJz3G4o6ZfveSZ9EHfX1B8e

NtYeEP5Y/AzgWo4rFvubOc8EWSMoH/xO4y+lOYIpzF8dRsy7vuO3i3rRoy2mupYA

Dlb3VRYzY6mBeenFWRWbqQ6u+EbKztprtkH0I3k4zS/da1OPu+fjtLXYf/F7oSLt

uh+sXYhKXBNyCTW7QZVLDpARMevGWSxSyWKE8FhwbF6Dy0zK9gGU2qBmWGEAvKyT

1Y09lF5fVqV3BpoR17Lp3Eh9mQ1hX72VHwC0dudqJKrZXsUQsGksl3TUjDn9KU9X

PY2mLaWS3dUDpahc7DHu118ocGKNOIcMr57jwrGwzeSRoAoysJB7t0o9JP0LDpnU

hcK5SdE4ueuIPN2Ms7sBY+z6JZhZTGZAgTfONA320Nj9Q7r7jLmyposuE/NV6Knf

sfIdWiETGXyW

=Ndp5

—–END PGP MESSAGE—–


d2aa4a No.288

>>269

>>268

I will address your concerns in the other threads.

>>280

Yes, as I posted this, I concluded the refreshing of the monthly proof would be weak point and that staggering is worth exploring. I'm glad you saw that, too.

I might also bake additional numbers into the weeklies hash and then require those to be part of the monthly sum. That would help reinforce consistency.

>>287

I'm not a formal code breaker. I know how to do all of that… I just choose not to on most occasions. Sadly, this would be one of those occasions. :(

Those domains try to extract truth from secrets and there are more than enough resources worldwide thrown into that challenge. I have little to offer to such a monumental effort.

Besides… the people who watch me now can break those codes. :D


eabf78 No.296

>>288

Address all you want, that won't change how blissful I am and how amazing life is. But, do what you wish.

Post last edited at



[Return][Go to top][Catalog][Nerve Center][Cancer][Post a Reply]
Delete Post [ ]
[]
[ / / / / / / / / / / / / / ] [ dir / 3s / agatha / arepa / caco / fascist / litpat / nep / vichan ]