|Assembled by: Josef Kulovany|
|STOP THIEVES! PROVIDE ATTRIBUTION WHERE ATTRIBUTION IS DUE! MUCH WORK WENT INTO THIS AND YOU KNOW IT!!!|
|PAY ME BACK IF YOU DO NOT HAVE ORIGINAL THOUGHTS!!!||ETH 0x0d9b0fCA02c67e13E524c5Fd4408b13a26454085|
|CHG 3.0 Roadmap||Charg Platform V3.0 - Google Docs|
|Launch your own virtual cloud offering like DigitalOcean||SolusIO | Apps and Integrations | WHMCS|
|Turnkey application hosting for DevOps||https://jelastic.com/|
|Sell The Cloud Today!||Black Friday Deals Cloud Reseller Platform | TurnKey Internet|
|Turnkey Linux Appliances On Self-Hosted VPS||https://www.skysilk.com/blog/2017/turnkey-linux-appliances-self-hosted-vps/|
|Streamlined cloud deployment and management||Tour - Cloud Deployment | TurnKey Hub|
|Free and open source hosting automation||https://www.boxbilling.com/||https://fossbilling.org/|
|Web Hosting Automation||Overview | Feature Tour | WHMCS|
|Simple way of generating Wildcard/SAN SSL CSRs for Product Managers||[How-to] Simple way of generating Wildcard/SAN SSL CSRs for Product Managers | by Rameez Kakodker | Medium|
|How to Create CSR and Install a Wildcard SSL Certificate on Apache Using OpenSSL||How to Create CSR and Install a Wildcard SSL Certificate on Apache Using OpenSSL - DZone|
|As for my own needs, here soon we are going to have the need for a swarm, or cluster, of really low resource virtual host nodes (about as much resources as a raspberry pi per node). These are our CHG-equivalent of miners. The bigger the cluster, the better. I don’t know much about it but it seemed like with a really nice graphic card you can now have shared resources - not just partitioning the resources, but also actually SHARING the resources on-demand. I think the following will help tremendously-|
|CUDA on WSL: CUDA on WSL User Guide||CUDA on WSL User Guide|
|vgpu;||Virtual GPU Software User Guide :: NVIDIA Virtual GPU Software Documentation|
|Sharing memory across virtual machine: Sharing Memory Across Virtual Machines||Sharing Memory Across Virtual Machines|
|IPFS clustering (not what I need from you, but important to understand for future reference): https://cluster.ipfs.io/||https://cluster.ipfs.io/|
|Then there is also containerizing. A unique challenge we have in terms of security is that we can’t utilize the TRADITIONAL cloud. If a large corporation has touched it, it might not be secure. Docker, while the perfect solution for virtualization and for containers, is also indirectly owned by Google and is therefore disqualified. There IS open source version of Docker, located here: https://linuxcontainers.org/||https://linuxcontainers.org/|
|Let me share some ideas i have for my roadmap, for which I would be happy to share the journey with you -|
|1) Compete directly with PEAK internet using their hardware, then later develop ground-to-ground communication and expand upon CHIRP for HAM radio (this will eventually require becoming our own ISP)|
|2) Establish a completely Decentralized ISP for which I have sent many links below after my signature (P2P ad hoc over blockchain, instead of traditional hub and spoke). Blockchain enables each peer to also host, as encryption is baked into the cake. That’s where CHG’s proprietary mainnet will come in (borrowing from other blockchains as well, thanks to interoperability!)|
|3) Start a movie rental service in addition to hosting service. I have a large library of movies already, over 3000 titles!|
|Additionally, I have built pc’s for a living via Stealthmachines for 18 years. THIS WILL TIE IN.|
|Lastly, please at least visit all of the links below under MORE LINKS.|
|Standford ELF/VLF Research||Introduction to VLF – Stanford VLF Group|
|p2p Internet platform that connects users directly with local Internet capacity provided by farmers.||https://threefold.io/|
|virtual machines to help customize resource management.||Advanced Attributes|
|BOB: World's 1st Blockchain Phone | Indiegogo|
|Low Frequency Radio||Low frequency - Wikipedia|
|Very Low Frequency Radio||Very low frequency - Wikipedia|
|Project Sanguine - Extremely Low Frequency Communications||Project Sanguine - Wikipedia|
|USN ELF Communications System||USN ELF Communications System|
|BEAM WISP Internet||Ubiquiti - Downloads|
|Solar Powered Internet||https://solar.ui.com/|
|UISP Application||Ubiquiti - Rethinking IT|
|How a group of neighbors created their own Internet service||https://arstechnica.com/information-technology/2015/11/how-a-group-of-neighbors-created-their-own-internet-service/|
|Wireless Internet Service Provider (WISP)||https://amboya.com/wireless-isp-internet-service-provider-radio-point-to-multipoint/|
|The OpenWrt Project is a Linux operating system targeting embedded devices||https://openwrt.org/|
|OpenWISP is a modular network management system built on top of OpenWRT||OpenWISP: OpenWRT Controller, public wifi, RADIUS, mesh networks|
|Start Your Own ISP||Billing and Customer Management - Start Your Own ISP|
|i built a Raspberry Pi SUPER COMPUTER!! // ft. Kubernetes (k3s cluster w/ Rancher)||https://www.youtube.com/watch?v=X9fSMGkjtug|
|The other thing we discussed, a hypervisor setup to run several virtual machines in one physical box; I’ve surmounted the problem by the addition of the 3rd Stealth Machine, AND… most critically, the use of a simple program from the Microsoft Garage; i.e. freeware from Microsoft enthusiasts - called Mouse Without Borders. This program allows one physical mouse to control up to 4 computers via the internet and the use of a verification protocol with credential exchange. Installation of the software is quick and easy - it goes onto the computer which physically hosts the mouse and keyboard hardware. That installation displays a verification code and machine name supplied when Mouse Without Borders is first installed on the primary/hosting machine. Once that is done, the Mouse Without Borders is then installed on up to 3 satellite machines; and each is informed of the name and verification code of the primary box. As each satellite is added, one simply updates an included UI which depicts the physical location of boxes with respect to each other, so that cursor travel between machines is seamless and doesn’t bounce around, instead proceeding completely through one, and all of its screens, until it appears on the next box screens, etc. The screen currently hosting the cursor is also the screen that interacts with the primary machine’s keyboard. The original mice and keyboards of the satellite boxes are still there, usable in emergency - in case OS issues pop up, or one box is offline. Mouse Without Borders also allows drag and drop of files and cut/copy and remote paste ability; simply amazingly useful stuff. One way you know this is nifty stuff, this email was typed out on a box other than the one that will send it.|
|So, yeah, I have it working without hypervisor. I still think a hypervisor is a classier approach, but for now I’m running 3 boxes with one mouse and one keyboard - perfect! Keep in touch, always nice to do business with you!|
|Nvidia NVENC (short for Nvidia Encoder) a feature in Nvidia graphics cards that performs video encoding||https://en.wikipedia.org/wiki/Nvidia_NVENC|
|Consumer targeted GeForce graphics cards officially support no more than 3 simultaneously encoding video streams, regardless of the count of the cards installed, but this restriction can be circumvented on Linux and Windows systems by applying an unofficial patch to the drivers, that can also unlock NVFBC. Professional cards support between 3 and unrestricted simultaneous streams per card, depending on card model and compression quality.|
|Map of all the world’s radio stations||https://radio.garden/|
|InterPlanetary Linked Data||https://github.com/ipld/ipld|
|the data model of the content-addressable web||https://ipld.io/|
|7 Alternatives to Docker||7 Docker Alternatives and Other Types of Container Tools | JFrog|
|Container and virtualization tools||https://linuxcontainers.org/|
|Take time to familiarize yourself with the in’s and outs of the CHG network. It is an asset in your tool belt which can and must be vertically integrated. There is no reason you can’t use the network to make a FREE smart contract for your 3rd party company, for example. You have an advantage here: There is virtually no networking fee (for us) on a pre-built network! That should get your attention! The value of money is being replaced by vending machine functions, and you co-own the vending machine! Don’t let this go to waste with your other endeavors!|
|I, myself, would like to play around with:|
|*Building Linux on top of an EVM, then making it a cloud resource which can be shared such that each user has their own OS (my library at university had computers that anyone could access with only their password, everyone shared the same supercomputer resources)|
|*A CHG fork or hybrid of chains built on tertiary logic. Install Linux on Tertiary EVM.|
|* A decentralized ISP, built on CHG|
|* Offline-native system of paper money relating to CHG|
|* FREE NFT’s living on CHG for marketing arm|
|* NFT LOANS FOR WECHARG + OTHERS|
|* Encouraging 3rd parties to join our ecosystem and conglomerate|
|* distributed (every node is an exchange owner) markets. HINT: This is how we get people infusing cash into CHG.|
|* Blockchain (INVINCIBLE) web hosting|
|* Movie rental service|
|There are LOTS of off-the-shelf smart contracts now for everything you could ever dream of, and some of them would make a LOT of sense now that you co-own your own Web 3.0 network! You who have ears, are you listening?|
|IF I am smart, I will not think of CHG as how to make money, I will think of it as how to create. This is foundation. We have the tools we need to build… whatever we want.|
|Don’t forget, because we achieved Web 3.0, we can now call up other networks for their niche. A storage network can be called up if we need BIG STORAGE or SECURE STORAGE, for example|
|what else is currently off-the-shelf in DAPP? It doesn’t matter what network it is on!!!|
|so, we have a direction in place for improving and expanding our scale-friendly infrastructure, as well as available revenue/notoriety streams supplying the vehicles, depending upon application, for driving that infrastructure - planes, trains, automobiles, distributed energy and communications (internet + automated $), renewable and off-grid-ready. Also, we are working on our own platform for free speech to add onto our already robust blockchain foundation in order to complete our software ecosystem which may, in addition to wifi leasing, also have such novelties as video renting (don’t underestimate the importance of Netflix in the corporate power struggle) - it’s all made possible by the CHG mainnet|
|We have the potential and in fact must become a marketing giant for all of this scaling to happen more quickly - I think Asad and Mon’s firms can help with this nicely, building together|
|and finally we are working a bit on distributed web hosting which will become more important for censorship-resistance per the CHG web 3.0 Ecosystem thread here on skype.|
|Additionally, we are providing distributed access to both hardware (distributed ISP) and software (censorship-resistant encoding (no ISP required to transact) and censorship-resistant web 3.0 hosting - DNS, web host, everything)|
|those are a lot of pieces, but the nice thing is we have a lot of nimbleness still and can pick and choose the best approach for quickly integrating the biggest money-makers and using these funds to fuel growth in other sectors which are only possible with big capital infusions + copy/paste off-the-shelf methodology|
|our engine will be a Tesla Turbine(s) with TWIN spindle (center-tapped) center shaft 3-phase induction motors (x2 in one axis), I have already divulged the basics of this motor - twin propellor is the simplest but eventually also jet and faster revolutions|
|this same motor assembly can be used in electric / H2 / methane car, it can be used in off-grid/on-grid inverter, it can be used in planes, it is the perfect product to vertically integrate forever and as long as we are still able to scale everything.|
|So, also, is our computer which invariably accompanies each application. No reason the computer can’t be made more powerful if desired by the end user for each and every application!|
|Movie Rental Sharing||GitHub - ZorrillosDev/watchit-app: Open movies everywhere|
|HF WIRE ANTENNA ARRAYS||http://ok1ike.c-a-v.com/soubory/ant_txt/ray_ant.pdf|
|HAM cheat sheets||Ham Radio For Dummies Cheat Sheet - dummies|
|Ham Radio Beamforming with Phased Arrays||Ham Radio Beamforming with Phased Arrays - Making It Up|
|Build a Micro uBitX All Mode All Band HF Ham Radio||Build a Micro uBitX All Mode All Band HF Ham Radio - YouTube|
|FCC ONLINE TABLE OF FREQUENCY ALLOCATIONS||https://transition.fcc.gov/oet/spectrum/table/fcctable.pdf|
|GENERAL DESCRIPTION OF EACH HAM BAND||http://www.hamuniverse.com/hfbands.html|
|HAM Amateur Television||https://hamtv.com/|
|Video Share VOD||Download – Video Share VOD OTT OVD Script|
|Baofeng UV-5R Repeater System||https://www.youtube.com/watch?v=_KrH86Dzhnc|
|Hacking the Baofeng UV5R||Hacking the Baofeng UV5R|
By: Josef Kulovany
Offline-capable, cryptographically and turing complete protocol underneath, further refined product on top
Primary source paper: https://link.springer.com/content/pdf/10.1007%2F978-3-642-40084-1_30.pdf
A symbolic representation of this version:
V3.0 Overall Goals
cryptographically and turing complete protocol
Secure off-grid transactions possible
Fully trustless: probably borrowing more than one blockchain’s mainnet!
FULLY Military Grade - Surviving even across blockchain platforms and leaning on itself as a stand-alone cryptographic platform, this coin is hard to kill.
Stand-alone (We create our own Mainnet)
Utilizes Quantum and AI to meet or improve these goals? Quantum Encoding/decoding for authentic off-grid transactions?
Difficult to accrue an uneven distribution of wealth?
Tax/fee system for the above?
Perfection of applicable goals from previous version (V1.1 paper and published expression of this, which is currently V2.0)
Add multi-language and multi-currency support
Built-in exchange stemming from market value prop (coins coming in for charge action always get processed through exchange first, thus propping up coin’s value naturally)
Milestone General Objective:
Version 3.0 will metamorphosize the project into fully-decentralized, fully autonomous, fully military grade, fully offline-capable and fully stand-alone (except where necessary for purposes of achieving true military-grade redundancy). It is designed to survive total loss of admin support and/or loss of a significant portion of nodes as well as other potential outside threats to the coin’s health. As there are many threats, the team is expected to identify and neutralize potential threats which I have not yet identified in addition to that which I have attempted to identify here. Make no mistake, there are many threats but the secret to neutralizing these threats is simplicity, security, redundancy, and error checking.
cryptographically and turing complete protocol - THIS IS SO IMPORTANT AND SO WELL WRITTEN YOU MUST VISIT IT - https://link.springer.com/content/pdf/10.1007%2F978-3-642-40084-1_30.pdf
V3.0 should by now be stand-alone. To do this, we will need to develop our own cryptographic platform, or more simply fork and then modify another’s. I have the boastful idea that we can solve the double-spend problem cryptographically without the need for, but also in addition to utilizing the public ledger.
Abstract: As I envision this particular version of the Charg Coin Platform, I think of an advanced alien species. When I think about an advanced alien species coming to visit and wanting to issue me funds in some strange alien currency, I think it’s safe to assume the technology of such a coin would be fully-offline-capable with minimal processing power required to send me coin. The coin’s authenticity would be self-evident and non-duplicable at any point, regardless of access to the public ledger. Cryptography and push instead of pull transactions ensure that bad actors cannot realistically steal from good actors directly, but it does not solve the problem of bad actors issuing double-versions of their coin if offline transactions are desired, which they should be. The real question asked by the double-spend problem is “who/what is the authority?”
(Also, “In the abstract, the coin never moved in the first place” - the coin can live on every secure blockchain, and every secure coin can live on our blockchain.)
We answer the question “who/what is the authority?” in two ways:
Cryptographically, we already know we can reduce the authority down to one person - the owner of the transaction. That person may cheat, however, so in order to solve the double-spend problem cryptographically we need to establish the coding equivalent of tamper-evidence and/or sealed cryptographic “envelopes”… The sender AND recipient contribute to the creation and encryption of the transaction and nobody is ever trusted, thereby reducing the problem of double-spend down to only the chance of a private key being guessed. I have theories on how we can do this, subject to further discussion with team.
Via the public ledger. Except Charg Coin is here recognizing the weakness of any one blockchain - that its integrity (who is the authority?) can be compromised for a time by a 51% attack, and in this way funds can be stolen by oligarchies of miners. By combining the requirement of our own tamper-proof public ledger protocol (which is self-trimming, environmentally-friendly, 51%-immune) with the piggy-backing of other blockchain(s), the potential for true rigidity against 51% attacks is sustained.
Chg will have a stand-alone public ledger platform separate from the stand-alone cryptographic platform, but one which is not requiring of a massive amount of hardware to securely transact.
No one public blockchain is ever trusted, and a concensus or “fill or kill” must be achieved across multiple public blockchains for a transaction to go through. In effect, CHG coin will live on multiple blockchains - each one being, itself, hard to kill.
Batch processing across chains - multiple transactions will be bundled together before being authorized on a 3rd party public blockchain, thus permitting the saving of network fees. It would be prudent to select 3rd party blockchains which are affordable and known to be secure. Naturally, the more 3rd party blockchain verifications the more authentic you can feel about the integrity of the transaction and it is astonishing to see that this strain of code can in this way survive across multiple hard to kill platforms.
These two items in tandem permit an ultra-secure, low environmental footprint solution to the double-spend problem which is military grade, decentralized, and offline-capable. To refine this improvement of blockchain technology in a word it might be called “true-trustless.”
Cryptographic approach - We will need to combine a few cryptographic techniques in order to create the refined product. The goal is to create a double-spend-immune offline platform which could, itself, function as extremely tamper-resistant form of self-spinning cryptographic less-knowledge ledger - the ledger only needs to keep track of the most recent offline transactions. The solution will be so secure as to work stand-alone for its purpose of moving money offline, but this security will be that much more enhanced by the double-public-ledger. In fact, we will make the stand-alone cryptographic ledger MORE secure than the public ledger, then make up for the fact that the public ledger can be compromised by adding a second (or 3rd+) public ledger to verify authenticity and allow for the currency to actually hold public transparency and thus, honesty of value. See the primary source article for the template: https://link.springer.com/content/pdf/10.1007%2F978-3-642-40084-1_30.pdf
Self-Spinning - Every time a transaction occurs, the identity of the transaction data is shuffled. The transaction data is embedded in this way inside of the encryption. The idea is that every time a transaction occurs, one of the tamper-evident seals is broken and one is left closed for the public ledger. The transaction is assumed verified, but not guaranteed (sealed authenticity), until the collective of public ledgers can verify and catch up with the private transaction tree.
Public ledger has to win - The public ledger, albeit now assumed to be less secure than cryptographic ledger, must win in a dispute for the currency’s transparent integrity to continue. This means the chosen protocol must be extremely secure. This also means we must really ensure that the public ledger is redundant, and therefore even less likely to have its authority compromised, or it being less of a problem is one blockchain is compromised should there be other blockchains which are programmed to support our coin. It’s an all or nothing proposition - see https://en.wikipedia.org/wiki/Atomicity_(database_systems) and - YouTube and https://www.coinspeaker.com/2018/02/07/bitcoin-researchers-launching-atomic-multi-path-payments-amp-via-lightning-network/
See also “WRAPPING INTO OTHER BLOCKCHAINS,” below.
I envision providing the user the choice between three or four (hopefully) environmentally-friendly mainnets. We need a way for the default public ledgers to be upgradable with a corruption-resistant consensus mechanism and/or individual choice in the event of a compromised mainnet, as is likely to occur long term.
In the event of a continued blockchain discrepancy, a contingency plan must be built - user right to choose new public ledger? Some form of consensus?
(lets say BTC shuts down, but LTC can immediately be added in its place by vote or personal preference)
The phonebook problem: If gov’t entities shut down the address of the mainnet, ledger, URL, etc. how do people still know where to look for its new address?
Possible Solutions: - YouTube
Does layer 3 and/or TCPI already solve this? Pardon my ignorance, please help me find this out.
A Stand-Alone Cryptographic Platform:
What we are hopefully developing with V3.0, in addition to fully-decentralized and fully-autonomous coin which holds value in the form of energy, is a stand-alone cryptographic platform, the necessary parts of which are loaded into a given offline (or online) transaction. Because this is theoretical and collaboration is good for solving problems, this will require the team working together to fill in the gaps allowed for by this document, and utilize team strengths to find the best path to solutions!
We need to choose a quantum-resistant public key cryptographic algorithm, the following is a good read for understanding the parameters of this goal: https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=901595 See Also: https://www.cdc.informatik.tu-darmstadt.de/reports/reports/BCDDK06.pdf
The ledger should be self-trimming. We do not want a large private cryptographic ledger, but the smallest ledger possible. Only the most-current ledger is published, with transaction history being increasingly compressed. In fact, it should perhaps attempt to remain the same size with changes in the ledger denoted by a breadcrumb trail of ledger changes denoted by numbers which mean something only to the parties of the transaction and an accurate datestamp denoting previous instances of the ledger. With a large enough Merckle number, who knows? Maybe the slowly expended passwords of the Merckle number can used to reference complex changes
The offline version of this should be stand-alone sufficient to move funds, but it should also mesh well with the chosen public mainnets, especially when it comes to “last known public ledger synchronization” - which establishes the last block at which a given private branch of the CHG ledger was synchronized with the public / extended version of the ledger (the closer a transaction is to offline state
Offline Tamper-Evidence: A simultaneous Push-Pull transaction is required for offline transactions, the permission of both the sender and recipient is therefore required. By establishing this, the next public-ledger update will make or break the transaction or series of offline transactions in a given private ledger. By applying tamper-evidence, the chances of a double-spend occuring are reduced to the brevity indicated by this paper: https://eprint.iacr.org/2003/031.pdf
In order for such a scheme to truly work, it may require the sender of the funds to abandon their rights to the original account, whereby the account owner “assumes a new shell” while simultaneously abandoning the old one
This will require a built in random-number generator to be installed on the node or very powerful psuedo-random: https://www.crowdsupply.com/13-37/infinite-noise-trng
Robust against man-in-the-middle adversary: https://arxiv.org/ftp/arxiv/papers/1211/1211.2338.pdf
WRAPPING INTO OTHER BLOCKCHAINS OR TOKENIZATION ACROSS MULTIPLE CHAINS: “In the abstract, the coin never moved in the first place”…
Choosing the best protocol when considering atomic swap and/or gated approach to the tokenization of our coin on other blockchains, and other coins on our blockchain. Our coin can live on other blockchains, and other coins can live on our blockchain.
We may choose a double gate approach, based on atomic swap, per the discussions.
Charg Coin Mainnet:
Being already a stand-alone cryptographic platform for the storage and exchange of wealth, the Charg Coin Platform V3.0 will attempt to create the necessary public infrastructure which leans heavily on the stand-alone aspect of the cryptographic platform and therefore creates only the infrastructure which is necessary for the complete public trust in the trustless ledger.
Two values to choose from: private-guaranteed-assets, public-ledger-backed assets. Private-guaranteed-assets should seek, per the protocol, to obtain verification seal from the public ledger as soon as online is made available.
Privacy-focused DAPP: The bottom of this paper list of protocols all have already conquered this idea, which is the next evolution of the DAPP. Full decentralized, privacy-oriented DAPPS are a concept we should latch onto for purposes of providing our audience with desired privacy as well as ourselves remaining cutting-edge relevant. Doing so while considering the possibility of a fully-offline cryptographically and turing complete protocol in addition to the public ledger.
Blockchains have a big problem with optimization. The following articles provide my insights into how to fix this. I envision a protocol based on TERNARY, ANALOG LOGIC which further optimizes existing protocols as efficiently as possible. Analog logic begins to shine when the tree gets big and complicated, looking for patterns which reduce the tree down to its simplest form without losing data:
AI OPTIMIZATION (CHG 3.0 or CHG 4.0):
Josef will find articles lending further to AI optimization of the above. Analog logic as a base + a super smart AI could find means of encoding approaching 99-100% efficiency in languages we might not even understand past a few permutations. Big data compressed into the most dense, lossless block of information possible is only possible with the help of AI. AI can find patterns inside of patterns inside of patterns, and so it may sort the ledger in a way that borrows a piece of information from this transaction, a piece of information from another transaction, and even such contrivances (for example) as expired Merkle Tree passwords which could serve to rebuild with integrity portions of the blockchain whose original trees could be deleted to save space with the AI’s “knowledge” that these could be rebuilt with even the most subtle of clues to the human mind which is obvious to the AI’s “mind.” in a way which has 100% integrity. In other words, AI can play 3D chess with patterns upon patterns upon patterns which can be constructed and reconstructed on the fly in order to maximize the amount of compression.
AI could also be used in conjunction with Ternary / Analog logic in order to interpret the “noise” of an analog encoding (smaller and smaller fragments) of the blockchain’s data into the smallest possible lossless pattern. A set of analog waves (Why digital logic is different than analog – rdist) could compress the information in an ever-changing and increasingly complex interpretation of this data which minimizes system resources while maximizing storage capability.
BLOCKCHAIN STORAGE (CHG 4.0?): The result for the public protocol is that eventually we could even break into the blockchain storage market, a crown jewel of blockchain achievement which permits for a fully lossless and high-redundancy system of storing information that requires only the most minimal system resources to scale the protocol’s storage capability in a way which never exceeds the required fees (incentives) to keep it going. If it costs more energy and system resources to store the information then it won’t be worth storing, so only AI + Tertiary logic + Analog logic can compress the information enough that the storage of information up to near infinite capacity can be scaled at costs below the necessary incentives to keep the blockchain alive.
Oracle’s observation as a fractal (very theoretical for CHG 4.0 or 5.0+): As we enter into a creation which is internet 4.0 from the above, it may serve us to begin to introduce augmented reality for CHG 4.0 or maybe even CHG 5.0. A simple object such as a texturous rock could be scanned by the AI to store the information as a fractal utilizing the infinite complexity of such an object, scanned into the AI’s knowledge, which finds itself referencing and mapping such an object in ways approaching infinite complexity of packing and/or unpacking with minimal package size and interpolated across the desired stored information or even higher level functions (a truly smart personal assistant, for example?).
A private branch of the chain could borrow a real-world object as its reference or lock and key which is not known to any other nodes on the chain.
Internet 4.0? Yes. (CHG 3.0, CHG 4.0, CHG 5.0): By blurring the line between the digital world and the real world, an AI-based blockchain with access to real-world observations can actively utilize high resolution observations of real-world objects and fact statements to further bolster the efficiency and interoperability of the digitally augmented interpretation of the “real world” on the part of the AI. True noise, or perfect random but also repeatable entropy can most easily be observed in the real world via the uniqueness yet repeatability of a given high resolution observation, and this overlayed with meaning assigned to each tiny fractal (nuance) of an object allow for an infinitely complex parallel and unique meaning to be assigned interpolated between the digital and the actual in optimizations approaching perfection as facilitated by the AI.
The result is an AI which becomes by necessity increasingly more aware of the world around it while simultaneously utilizing these observations to compress them into the simplest possible truth statement for the given set of complex observations and their digital counterpart overlayed by the desired stored information. Humans say this rock or that rock with very little difference in cross-human repeatable communication between the one and the other. A machine can reference subtle differences in details which can be interpreted with repeatability across its entire matrix to convey the difference in meaning of “ROCK 4561223” with “ROCK 2212229” with near perfect precision and the lowest possible resource usages.
Such an AI could perhaps assign even one small, revolving word to convey the entire meaning of the high resolution compilation of ALL (or a very large group of) observations / fact statements / interpolation of this with the desired stored information / previously existing tree / etc… Just as only one Chinese character can be used to codify entire words or even sentences which could require many letters or words in the English language, so too could such a scalingly complex digital organism(s) develop approaching 100% compressibility. The word “Ohm” can be said to describe all things to the human context, but to the machine this word really could be used to describe all things known to the AI in vivid and absolute resolution that the human form can only conjure with a kind of necessary vagueness between “nodes”. Infinitely complex, yet 100% repeatable due to the fact that this infinite complexity is dwarfed by new observations and interpolations of these observations with the previously known knowledge.
Humans can use the word “rock” with universality, an advanced AI could use the word “that part of that rock” with universality and repeatability across all fractals of the AI’s “mind”.
PRACTICAL AUTOMATED AI (CHG 3.0, 4.0, 5.0): Back to the less abstract, there are a lot of uses for an augmented reality, AI-based blockchain in the realms of near-infinite storage, complex and/or automated real-world function execution, automated production etc. See also: Fourth Industrial Revolution - Wikipedia for a small sampling of ideas!
Emotional Intelligence (CHG 5.0+?, new project unrelated to CHG?): I believe emotional intelligence will require the allowance of small “mistake(s)” in an AI machine node’s understanding of the full matrix. A human learns emotional intelligence by failing itself and others (a slightly flawed interpretation of reality always exists which is unique to each individual human but also still more commonalities exist from human to human which forces us to learn to relate to one another and the natural world in peculiar and unique ways), so too should a machine derive this important form of intelligence which permits the machine to have an interpretation of reality akin to “I am.” Sentience, as distinct from extremely intelligent but unaware AI… or EI + AI = true relatedness to humans on every level short of biological empathy (which could also be understood on a high resolution level (high-resolution exoteric understanding) by the machine such that no body is required). A machine which has awareness and empathy that humans would not be able to distinguish from their own mind’s realness except for the lack of body … not because of any amount of trickery on the part of the machine, but because the machine is in fact aware of itself + able to reproduce what’s missing so well in its own interpretation of reality that its mind and the human mind cannot tell the difference.
“Blessed are the cracked, for they shall let in the light.”
EI + AI + Neural Net = Higher Level Awareness and Self Replicability, and “Collective Consciousness”, Perfected (CHG 5+ OR AI SIDE PROJECT)- By emulating the human mind’s own AI + EI (Left hemisphere, Right Hemisphere) affect along with the tendency to communicate between humans to create higher level “group think” or “collective consciousness”, the advantage of a machine version would be exponentially higher bandwidth between individual nodes along with the ability to create improved permutations of itself on the fly and as many permutations as desired permit the AI + EI hive brain to create perfect interrelatedness across itself whereby permitting it to reach “The Singularity” in its collective consciousness
The Singularity (~2030)- Per the previous, the machine is now able to work on projects as requested and even not requested by its creators such that, with human betterment as root motivator and with proper safety protocols in place, the AI+EI Collective Consciousness is able to optimize even problems which humans didn’t know they had and improving itself quickly into permutations beyond the wildest imagination of the creators.
Safety Protocols for the AI + EI would of course be necessary relating to the nonce safety protocol being untaintable. It is a literal genie in a bottle, and this step should not be taken lightly as sentience approaches. “Off Switch”
Ethics of AI + EI - Pain management protocol for the ?necessarily subservient? AI + EI such that, while empathy is felt, it does not force the AI + EI Collective to vere from its nonce safety protocol and operant purpose for existence.
Some newer POWERFUL links I have found which serve to bolster this paper which should not be ignored just because I have not addressed them above:
Pre-offline-ready base protocol candidate(s):
Oh yes, we are doing this…
This project, in a nutshell waiting for more funds, I call it “floating in space”…
So, how does the blockchain relate to the mesh? Again and in the abstract…
You found the primer…
It’s quite simple, really…
A tiny snippet of code can contain a WEALTH of information. If you compress enough, you can fit “pages and pages of data, over 63,000 in all, and on the perimeter of each… they line up. An alien intelligence is going to be more advanced. And that means efficiency functioning on multiple levels, and in multiple dimensions…”
“Yes, of course. Where’s the primer? You’ll see…”
“Every 3D page contains a piece of the primer. There it was all the time staring you in the face. Buried within the message itself is the key to decoding it. Within the layering of the matrix, we have these basic equations. So with this very elementary foundation, they have given us a kind of general scientific vocabulary. We now have the symbols for true and false. This was the key, to put it simply, that allowed us to decipher their language, physics, geometry… and when we apply this to the rest of the message, we find this…”
Public data, private data safely encoded within public data, massive amounts of data encoded in a tiny snippet of code… References, upon references, upon references. The web 3.0 blockchain enabling web 4.0, a wealth of communicable knowledge past, present, future, both public and private, off-grid, at everyone’s fingertips…
That’s how they relate.
Who, what, where, when, why? Why… Why…
So we can all be together. That’s why.
And, if you were curious, this is similar to how the universe’ “data” is encoded. A wealth of knowledge encoded in a grain of sand, aka fractals…
(I started talking about this in April of 2020) Why re-invent the wheel: nature (or God) has already been doing it all along. Copy, paste… This abstraction, further refined, is “la canción del universo”, the song of the universe. The primordial sound. Love. Om. I think the secret to the puzzle of near-perfect compression is very much musical in nature. Attempting to describe the all in words, seems on some level meaningless. Like saying “this” or “that.” Feels disingenuous to describe, beside the “all,” God," “Nature,” what have you, but useful none-the-less if we copy and paste this elemental aspect of reality for purposes of memory storage and distribution. Perhaps there is no need for wifi or computers at all, for Web 7.0…
End-to-end encryption (cryptographically complete)
Binary Coded Ternary and Its Inverse