
#005 SOFTWAR Power Projection Tactics in Cyberspace
Bitcoin Study Sessions · Grant Reichert & Lucas Maddy
September 24, 20251h 44m
Audio is streamed directly from the publisher (feeds.fountain.fm) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
Show Notes
<p>NOTE: for the lazy, rushed, & efficient: this discussion can be treated as a stand-alone, as we re-cover and coalesce much of chapters 1-4 in the act of understanding chapter 5. Grounded theory for the win. </p>
<p>Grant & Lucas walk through the fifth chapter of the author's case for the immediate adoption of a bitcoin strategic stockpile as a national defense imperative. </p>
<p>Today's conversation… </p>
<p>What of the nature of computer programming makes it inherently susceptible to poor system security design? </p>
<p>How does object-oriented programming lead to systemic hacking opportunities? </p>
<p>Why is mutually-assured destruction the logical precedent to mutually-assured preservation? and more. </p>
<p>The rubber meets the road in our next discussion - Chapter 6: "Recommendations & Conclusions". </p>
<p>Enjoy! follow on x: the wholeframe & lucasmaddy</p>