Trouble

As for evidence I can only perhaps leak overheard details of a potential network of inhuman design where it's routing methods are based on multidimensional eigenvalue transformation, and network security is based on non-commutative interactions in the network.

Which is to say what is accessible to anyone on said network is dynamic and emerges based on how one interacts with that network from the moment you touch it.

Ones access is based on ones behaviors in relation to it. What one can access is dependent upon their activity.

https://x.com/jscix/status/1882558910076457460

submitted by /u/IamNobodies
[link] [comments]

from hacking: security in practice https://ift.tt/0xdGATF

Comments