Deus ex Machina: Immortality via Technology
Physicist and mathematician Prof. Frank J. Tipler's Omega Point cosmology is a proof (i.e., mathematical theorem) demonstrating that sapient life (in the form of, e.g., immortal superintelligent human-mind computer-uploads and artificial intelligences) is required by the known laws of physics (viz., the Second Law of Thermodynamics, General Relativity, and Quantum Mechanics) to take control over all matter in the universe, for said life to eventually force the collapse of the universe, and for the computational resources of the universe (in terms of both processor speed and memory storage) to diverge to infinity as the universe collapses into a final singularity, termed the Omega Point. Said Omega Point cosmology is also an intrinsic component of the Feynman--DeWitt--Weinberg quantum gravity/Standard Model Theory of Everything (TOE) correctly describing and unifying all the forces in physics, of which TOE is itself mathematically forced by the aforesaid known physical laws. Prof. Tipler's Omega Point cosmology has been extensively peer-reviewed and published in a number of the world's leading physics and science journals, such as *Reports on Progress in Physics* (the leading journal of the Institute of Physics, Britain's main professional organization for physicists), *Monthly Notices of the Royal Astronomical Society* (one of the world's leading astrophysics journals), the *International Journal of Theoretical Physics* (a journal that Nobel Prize in Physics winner Richard Feynman also published in), and *Physics Letters*, among other journals. Prof. Tipler's Ph.D. is in the field of Global General Relativity, which is the field created by Profs. Stephen Hawking and Roger Penrose during the formulation of their Singularity Theorems in the 1960s. Global General Relativity is General Relativity applied on the scale of the entire universe as a whole, and is the most elite and rarefied field of physics. Tipler is also an expert in quantum field theory (i.e., Quantum Mechanics combined with special-relativistic particle physics) and computer theory. Moreover, to here point out, said Singularity Theorems are themselves completely valid proofs of God's existence in the First Cause aspect of God. The Omega Point final singularity has all the unique properties (quiddities) claimed for God in the traditional religions. For much more on Prof. Tipler's Omega Point cosmology and the details on how it uniquely conforms to, and precisely matches, the cosmology described in the New Testament, see my following article, which also addresses the societal implications of the Omega Point cosmology: * James Redford, ["The Physics of God and the Quantum Gravity Theory of Everything"](https://web.archive.org/web/20150927090439/http://theophysics.host56.com/Redford-Physics-of-God.pdf), *Social Science Research Network* (*SSRN*), Sept. 10, 2012 (orig. pub. Dec. 19, 2011), 186 pp., doi:10.2139/ssrn.1974708; also available [here](https://purl.org/redford/physics-of-god) and [here](https://sites.google.com/site/physicotheism/home/Redford-Physics-of-God.pdf). Additionally, in the below resource are different sections which contain some helpful notes and commentary by me pertaining to multimedia wherein Prof. Tipler explains the Omega Point cosmology and the Feynman--DeWitt--Weinberg quantum gravity/Standard Model TOE. * James Redford, ["Video of Profs. Frank Tipler and Lawrence Krauss's Debate at Caltech: Can Physics Prove God and Christianity?"](https://megalodon.jp/2019-0512-1524-14/godandphysics.fandom.com/wiki/Tipler-Krauss_2007_Debate), *God and Physics Wiki*, May 12, 2019 (orig. pub. Apr. 3, 2013); also available [here](https://web.archive.org/web/20190512065553/http://theophysics.freevar.com/Tipler-Krauss_2007_Debate.html) and [here](https://archive.is/V9njw). As said, Prof. Tipler's Omega Point cosmology is a mathematical theorem per the aforementioned known laws of physics, of which have been confirmed by every experiment to date. Hence, the only way to avoid the Omega Point Theorem is to reject empirical science. As Prof. Hawking wrote, "one cannot really argue with a mathematical theorem." (From p. 67 of Stephen Hawking, *The Illustrated A Brief History of Time* [New York, NY: Bantam Books, 1996; 1st ed., 1988].) Indeed, in the Feynman path integral formulation of Quantum Mechanics (i.e., sum-over-paths; sum-over-histories) a singularity is even more inevitable than in the Penrose--Hawking--Geroch Singularity Theorems, since the Singularity Theorems assume attractive gravity, whereas the Feynman sum-over-histories get arbitrarily close to infinite curvature. In other words, the multiverse has its own singularity. Further, due to Liouville's Theorem in complex analysis, it doesn't matter what form of physics one resorts to, as any physically-realistic cosmology (e.g., one capable of incorporating Quantum Mechanics, since the complex number field is intrinsic to the mathematical formulations of Quantum Mechanics) must begin at an initial singularity and end at a final singularity. (As Barrow and Tipler wrote, "Initial and final cosmological curvature singularities are required to avoid a universal action singularity." See John D. Barrow and Frank J. Tipler, "Action principles in nature", *Nature*, Vol. 331, No. 6151 [Jan. 7, 1988], pp. 31--34; see also Frank J. Tipler, "The Structure of the Classical Cosmological Singularity", in *Origin and Early History of the Universe: Proceedings of the 26th Liège International Astrophyscial Colloquium, July 1--4, 1986* [Cointe-Ougree, Belgium: Universite de Liege, Institut d'Astrophysique, 1987], pp. 339--359; "Discussion", pp. 360--361.) ⁂ Unfortunately, most modern physicists have been all too willing to abandon the laws of physics if it produces results that they're uncomfortable with, i.e., in reference to religion. It's the antagonism for religion on the part of the scientific community which greatly held up the acceptance of the Big Bang (for some 40 years), due to said scientific community's displeasure with it confirming the traditional theological position of *creatio ex nihilo*, and also because no laws of physics can apply to the singularity itself: i.e., quite literally, the singularity is supernatural, in the sense that no form of physics can apply to it, since physical values are at infinity at the singularity, and so it is not possible to perform arithmetical operations on them; and in the sense that the singularity is beyond creation, as it is not a part of spacetime, but rather is the boundary of space and time. In Prof. Stephen Hawking's book *The Grand Design* (New York, NY: Bantam Books) coauthored with physicist Dr. Leonard Mlodinow and published in 2010, Hawking uses the String Theory extension M-Theory to argue that God's existence isn't necessary, although M-Theory has no observational evidence confirming it. With String Theory and other nonempirical physics, the physics community is reverting back to the epistemological methodology of Aristotelianism, which held to physical theories based upon *a priori* philosophical ideals. One of the *a priori* ideals held by many present-day physicists is that God cannot exist, and so if rejecting the existence of God requires rejecting empirical science, then so be it. For details on this rejection of physical law by physicists if it conflicts with their distaste for religion, see Sec. 5: "The Big Bang", pp. 28--33 of my "Physics of God" article cited above. The evolutionary psychological reason for the above-described bizarre behavior of physicists rejecting physical law when it demonstrates God's existence is due to the naturally-evolved Jaynesian gods of old---i.e., the demons---seeking to distance people from genuine knowledge of God so that the demons may instead falsely present themselves as God. Among many permutations of this, it often manifests as various forms of etatism: the state becomes God. Demons are quite real, they however exist as naturally-evolved Minskian agent subset programs operating on the wet-computer of the human brain. For more on this, see my following article: * James Redford, ["Societal Sadomasochism"](https://web.archive.org/web/20211105203423/http://theophysics.freevar.com/Redford-Societal-Sadomasochism.pdf), *Internet Archive*, July 4, 2021 (orig. pub. May 29, 2018), 4 pp., ark:/13960/t2r59ws9q; also available [here](https://files.catbox.moe/muv9om.pdf) and [here](https://megalodon.jp/2021-0705-1226-07/archive.org/download/Societal-Sadomasochism/Redford-Societal-Sadomasochism.pdf).

What decentralized law is and it's framework.

The War on Crypto Privacy Intensifies
New regulations to make privacy harder with cryptocurrency

A team of researchers has found that it’s possible to infer the locations of users of popular instant messenger apps with an accuracy that surpasses 80% by launching a specially crafted timing attack. The trick lies in measuring the time taken for the attacker to receive the message delivery status notification on a message sent to the target. Because mobile internet networks and IM app server infrastructure have specific physical characteristics that result in standard signal pathways, these notifications have predictable delays based on the user’s position. The resulting classification accuracy based on the researchers’ experiments was: - 82% for Signal targets - 80% for Threema - 74% for those using WhatsApp

The UK House of Commons passed the controversial Public Order Bill by 276 to 231 votes. The bill aims to give police and courts more power to prevent protests and the ability to electronically monitor protesters with an ankle tag before they’ve even been tried in a court of law. While introducing the bill, former Home Secretary Priti Patel said: “What we have seen in recent years is a rise in criminal, disruptive and self-defeating guerrilla tactics, carried out by a selfish few in the name of protest. “Not only do these anti-social protests cause untold delays and misery for the law-abiding public wanting to get on with their lives, it tears police away from communities where they are needed most to prevent serious violence and neighborhood crime. “This bill backs the police to take proactive action and prevent such disruption happening in the first place. These measures stand up for the responsible majority and it is time that Parliament got behind them.” In a joint briefing, a coalition of human rights groups and other organizations criticizing the bill, warned that the bill would have a “chilling effect on our ability to stand up to power.”

SHA-3 Buffer Overflow
Over the past few months, I’ve been coordinating the disclosure of a new vulnerability that I’ve found. Today is the disclosure date, so I am excited that I can finally talk about what I’ve been working on! The vulnerability has been assigned [CVE-2022-37454](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37454) and the security advisory is available [here](https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658). The vulnerability impacts the eXtended Keccak Code Package (XKCP), which is the “official” SHA-3 implementation by its designers. It also impacts various projects that have incorporated this code, such as the Python and PHP scripting languages.

This article makes good points to consider when we think about blockchain. Blockchain can absolutely succeed if we can evaluate it objectively and keep the purpose of it in mind. The author is dead wrong when he says it's ok for governments to come in and regulate it. The whole point of this new system is to reclaim what's ours; but our job certainly isn't finished in building the blockchain that will subvert the current system.

The US Constitution: The 18th Century Patriot Act
Though lauded as a check on the federal government, the Constitution is actually what gives it power. Hamilton's Federalists insighted a frenzy similar to that around the Patriot Act with intentions of building a strong federal government that would even elect the governors of each state and veto their laws. Though the resulting government had much less power, can we truly arrive at solution to our problems without examining the Constitution in earnest and even questioning if a federal government is necessary at all?

The Unconstitutionallity of The Bank Secrecy Act
Ever since 1970, the federal government has had it's hands on your financial data. It should leave well enough alone.

CT-001: Threat modeling demystified
This is the first report in the new Cypherpunk Transmission series.

Privacy & Security Resources
- Guides - Android - Desktop - Tor and VPNs - General - Fingerprinting Articles - Fingerprinting Tests

Cryptocurrency Resources for Sovereignty
- Cypherpunk, Agorist, and No-KYC Philosophy - NoKYC Guides - Crypto Services Directories - P2P Exchanges - P2P Crypto Marketplaces and Freelancing - Automated Exchanges - Crypto VPS & Domain Services - Crypto VPN Services - Crypto Credit Cards - Crypto Gift Cards - Crypto eSim Providers - Crypto SMS Providers

If you do not make yourself equal to God, you cannot apprehend God; for like is known by like
>“If you do not make yourself equal to God, you cannot apprehend God; for like is known by like. >Leap clear of all that is corporeal, and make yourself grown to a like expanse with that greatness which is beyond all measure; rise above all time and become eternal; then you will apprehend God. Think that for you too nothing is impossible; deem that you too are immortal, and that you are able to grasp all things in your thought, to know every craft and science; find your home in the haunts of every living creature; make yourself higher than all heights and lower than all depths; bring together in yourself all opposites of quality, heat and cold, dryness and fluidity; think that you are everywhere at once, on land, at sea, in heaven; think that you are not yet begotten, that you are in the womb, that you are young, that you are old, that you have died, that you are in the world beyond the grave; grasp in your thought all of this at once, all times and places, all substances and qualities and magnitudes together; then you can apprehend God. >But if you shut up your soul in your body, and abase yourself, and say “I know nothing, I can do nothing; I am afraid of earth and sea, I cannot mount to heaven; I know not what I was, nor what I shall be,” then what have you to do with God?” *Hermes Trismegistus - Hermetica: The Greek Corpus Hermeticum and the Latin Asclepius in a New English Translation, with Notes and Introduction*

Classic Logic course from Hillsdale College for FREE
Hillsdale College has a lot of online courses, and I've been taking one on Mathematics and Logic which uses Euclid's Elements and builds from there. Great for studying logic

Slides/transcript: https://agorism.blog/anarkio/survival-outside-the-state

There is no such thing as secure email. Email is an inherently insecure protocol, conceived at a time when security was an afterthought. There are fundamental flaws with email that cannot be mitigated by slapping encryption on top.

Trojan, an unidentifiable mechanism that helps you bypass GFW. Trojan features multiple protocols over TLS to avoid both active/passive detections and ISP QoS limitations. Trojan is not a fixed program or protocol. It's an idea, an idea that imitating the most common service, to an extent that it behaves identically, could help you get across the Great FireWall permanently, without being identified ever. We are the GreatER Fire; we ship Trojan Horses.

A brief and informal analysis of F-Droid security
F-Droid is a popular alternative app repository for Android, especially known for its main repository dedicated to free and open-source software. F-Droid is often recommended among security and privacy enthusiasts, but how does it stack up against Play Store in practice? This write-up will attempt to emphasize major security issues with F-Droid that you should consider.

Not all Linux distributions are created equal. When choosing a Linux distribution, there are several things you need to keep in mind. Table of Contents Release Cycle Traditional and Atomic updates Arch-based Distributions Kicksecure “Security-focused” Distributions Linux-libre Kernel and “Libre” Distributions Wayland Recommended Distributions Fedora Workstation Fedora Silverblue & Kinoite openSUSE Tumbleweed and MicroOS Whonix

There is a lot of misinformation being promoted in various privacy circles about Tor. This article will examine some facts about Tor and assess whether it is the infallible privacy tool it’s made out to be by some. There is a growing chorus of people who blindly recommend Tor to anyone looking for online anonymity. This recommendation often ignores mountains of evidence suggesting that Tor is not the “privacy tool” it’s made out to be. No privacy tool is above criticism or scrutiny, and each has pros and cons. Unfortunately, Tor has garnered a cult-like following in recent years among people who pretend it’s infallible. Honest criticism of Tor is often met with accusations of “FUD” and ad-hominem attacks, so as not to disrupt the collective Groupthink.