Her thumb is on the bitcoin-dollar conversion spot

It will probably be on a Friday afternoon, maybe not next Friday because Bitcoin at one trillion dollar is still not big enough. But soon more and more bitcoin-paid income will escape the IRS, more and more merchants will accept Bitcoin, so…


BitMint Financial Language writes money the same way in your e-wallet, and in your checking account; you move your money to your phone where it behaves like cash, and you deposit it in your bank account where it is payable through the bank. Convenient, Secure. That is the advantage of…


AI Assisted Innovation: The Grand Vision for a Better World

We dig ourselves out of holes and extend our reach way and beyond on the power of human innovation. Had we managed to accelerate our innovation we would reach the promised land a day earlier. But we can — a carefully crafted methodology now identified universal patterns for the innovation…


Can a finite key offer unlimited mathematical security — Circumventing Shannon’s Proof?

Claude Shannon proved that perfect security is achievable for plaintext no longer than the encryption key. But there appears to be a way to circumvent this theoretical limitation with great cryptographic consequences

Claude Shannon referred to a key, the information in which, KI, was used to convert a plaintext to…


Breaches, Breaches, Breaches — The Unrecognized Cause

The centerpiece of cyber security is the communication between two coordinating parties sharing a symmetric key. They usually use AES, or a variant thereto. Unfortunately the resultant cyphertext hides in it the key that was used in generating it. The common wisdom is that no one is smart enough to…


Central Bank Digital Currency — A Terrorist’s Point of View

Unfortunately a few of us, for all sorts of crazy reasons, do aim to destroy the global order as it is today. In the old days they required armies to march from place to place. With the advent of nuclear weapons, the challenge became considerably easier — by unleashing a…


How many times did you read the term “superposition”, “entanglement”, and “decoherence”? The more you read, the greater the mystery. Do you get the suspicion that quantum mavens enjoy your bewilderment?

The naked truth is that quantum physics, unlike Newtonian physics, is a humble one. Newton told us what is…


In the current crypto paradigm a single secret key transforms a plaintext into a ciphertext and vice versa, or at most a different key is doing the reverse action. Attackers exposed to the ciphertext are hammering it to extract that single key and the plaintext. This paradigm is now facing…


Everything you are busy innovating right now is similarly attracting innovators from around the globe. People you never heard of wrestle with the very same innovative challenge you rub your own brain against. There is an invisible competition of wit and creativity, where the clock is the final arbiter.

To…


Cyber Security Overconfidence suppressed use of Effective Recovery Technology that would have minimized the yet to be appraised colossal damage from the 2020 successful invasion of US Cyber territory

The fundamental feature of stored data is that it can be read without leaving a trace. Every custodian of data has…

BitMint - AI Powered Cyber Innovation

AI powered innovation. Quantum Cyber. Digital Money. Cyber Chemistry. 28 granted US Patents. Researcher, Designer, Teacher, Novelist.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store