Crypto Updates

Global POW System Could Make Hacking ‘Too Expensive To Execute’: Bitcoin’s Model As A Blueprint

Veteran Trader Peter Brandt Asks Macro Guru If Bitcoin Bull Has Finally Awoken From Deep Slumber

Tracing the evolution of cyber warfare reveals a transition from abstract notions to concrete challenges, reshaping the intersection of global security and technological advancements.

The Rand Corporation published an early report on cyber warfare in 1993, defining it as “knowledge-related conflict at the military level.”

Before the February 2022 invasion, Russia used cyberattacks to target critical energy infrastructure in Ukraine. In the past 50 years, cyber warfare has gone from the stuff of science fiction to a fact of life, with risks more or less evident to the average citizen. 

The acceleration of available technology, including the November 2022 launch of Open AI’s ChatGPT and the mainstreaming of AI, has raised more questions – and anxieties – than it has answered. We have yet to find an encryption standard that is impervious to attack.

Maj. Jason Lowery, U.S. Space Force engineer, and MIT fellow, recently posted an open letter to the Department of Innovation of the U.S. Department of Defense (DoD) proposing a different kind of protection from cyberattacks – instead of going smaller and more efficient, what about macrochip computing?

To put the hypothetical differently – if hacking the DoD costs $5,000 per keystroke, who would have the resources to try?

POW Networks As A Military Offset
Lowery considers Proof-of-Work (POW) networks like Bitcoin (CRYPTO: BTC) an “offset,” which the military defines as using leading-edge technology to counterbalance potentially superior numbers by an enemy. In this case, Lowery recommended using a POW network as an “offset strategy for the 21st century” – one that has been under-appreciated by the defense department because of its close association with cryptocurrency

“Although commonly associated with cryptocurrency, the Bitcoin protocol could alternately be described as the most operationally successful use of what early engineers called a reusable proof of work… cybersecurity protocol (for) securing financial information from systematic exploitation and abuse.”

Lowery wrote that for over 80 years, software engineers have sought to protect data with increasingly sophisticated encoded logic. However, no level of encryption makes a cybersecurity system immune to systematic exploitation. He proposes using a POW…

Click Here to Read the Full Original Article at Cryptocurrencies Feed…