On Sunday, November 16, 2025, at 1:23 AM, Quan Tesla wrote: > Perhaps, us old-school relics may have to return to our old, proven ways. > Offline and disconnected (cold wallets) still seem like the best form of > security. Only upload what you need per work session, then backup offline. > From what others informed though, such practices may lead to credentials > issues and users may find themselves cold shouldered by AI and even have > subscriptions limited and near-denied (isolated). So, there may be a > generalized harvesting and sublimation campaign out there, somewhere? At > best, a conspiracy theory - old-world agencies now gone superhuman on AI? > Only they would know.
Yes I know I’ve worked on both sides of security in the past, professionally. I’m a holdout on MS Windows, such a great operating system, but it’s not until recently I realize it’s time to move off since it’s just so blatant now. And the CPU is compromised you have to flash the BIOS. And the network is compromised, yes, everything is compromised right into your eyes and brain and back into your youth. All accessible. We were “granted” some privacy but now the kooktards have lost any sort of moral compass. That will take decades to even possibly fix. A couple years ago I lost my main tranche of crypto, our hijacked government’s legal warfare started forcing people off exchanges like Binance, orchestrating their stablecoin games, into wallets then “supposedly” North Korea hacked them. Notice Changpeng Zhao has been pardoned. Some things can be fixed but people have to do something. Prob. is “democracy” itself is a psyop. The main source of problems is the monetary system and there is a whole front of people working on it. This is not a lone wolf thing. Sure you could just disconnect and forget about it all, I know some of the most prolific thinkers doing just that. I have to resist my wife wanting us to go hide in SE Asia. It may get bad soon and the new Bolsheviks are capable of anything. On Sunday, November 16, 2025, at 1:23 AM, Quan Tesla wrote: > I have a novel security architectural platform that is begging to be > developed. The result of decades of theoretical and componentized field > testing. It's been buried restlessly in my head, never written down, not even > detailed in my consciousness. Kept safe as potential, quietly updated as time > passed, a niche hobby, one building block at a time. Should I even be > divulging this much <= paranoia whispers. Yes I hear what you’re saying since sometimes you know when an access attempt occurs. To hide that it’s difficult and speculative though AFAIK, like building a virtual model ship in an obscured bottle using remote semi-isomorphic mental tools rather than the obvious ones while avoiding directly acknowledging the ignored model. At some point you have to share what you have IMO perhaps to help someone else before the bottle is lost. ------------------------------------------ Artificial General Intelligence List: AGI Permalink: https://agi.topicbox.com/groups/agi/T7ff992c51cca9e36-M5885ad09014cc8e4084823b2 Delivery options: https://agi.topicbox.com/groups/agi/subscription
