Category: CSW

MetaNet Identity

Strategic Technologies & Global Power Shifts through China’s Investments in AI and Space Exploration

Abstract This paper examines the strategic implications of China’s investments in artificial intelligence (AI) and space exploration, arguing that these are not merely enhancements of technological prowess but deliberate maneuvers aimed at reshaping global power dynamics and the frameworks of international governance. As posited by the central thesis, these investments serve dual purposes: augmenting China’s…
Read more

The Welfare State and the Infrastructure State… A Tale of Two Futures

Government intervention in the form of welfare programs often begins with good intentions: providing a safety net for the vulnerable, reducing poverty, and promoting equality. However, these programs are inherently flawed in their assumptions about human nature and economics. Over time, they create a class of dependents who become reliant on the state, rather than…
Read more

The Necessity of Identity in Signing

In order to sign any document, whether in a physical or digital form, the concept of identity is indispensable. The very act of signing signifies that an identifiable entity stands behind the action, either as an individual or organisation, and that this entity takes responsibility for the content to which the signature is appended. Without…
Read more

Sybil Attacks, Full Nodes, and BTC Core: A Predicate-Based Game Theoretic and Mathematical Analysis

Introduction: The False Narrative of Full Nodes and Consensus in Bitcoin BTC Core has propagated the misleading narrative that full nodes contribute to the consensus mechanism of Bitcoin, creating the false impression that these nodes have influence over the network’s governance. This belief stems from the misconception that full nodes “vote” on the rules of…
Read more

The Fallacy of the Full Node in BTC

The debate surrounding the role of full nodes in BTC often rests on flawed assumptions and misunderstandings. Proponents of full nodes argue that they are essential for decentralisation and the security of the network, but this position fails to engage with the actual mechanics of Bitcoin as outlined in its original design. The functions of…
Read more

The Fallacies of Personal Incredulity and Ad Hominem in Criticisms of My Work

Introduction: In a recent tweet, a user (@FrankRundatz) commented on the ongoing discussions surrounding my work and dismissed my technical explanations as mere “technobabble.” This is a common tactic employed by critics who, rather than engaging with the specific points I make, resort to vague accusations and personal attacks. The tweet is a clear example…
Read more