
A cryptographic algorithm in which the sum produces meaning and shared understanding.

Deceit is a form of organic cryptography deployed by the wicked as they attempt to safeguard the truth in darkness while exploiting the helpless. The Light reveals the keys the wicked deploy to conceal the truth in darkness. The Truth will defend and restore the helpless and the captive to their true form if they […]

Malicious lives are consumed on the web of a spider that crawled across the truth they tried to conceal. Showing evidence of the lives they executed actions to steal. As they wait for the opening of the Seventh Seal, my Lord’s judgment, he will reveal. As I watch them slowly become this spider’s meal as […]

Accomplishing operational objectives in the face of extreme adversity is not achieved by actions rooted in how we feel, but by those that are calculated based upon mission requirements and responsible operational risk management. Attaining strategic supremacy on the battlefield is only achieved with the proper implementation of finite and infinite game theory based on […]

During and before the years of the industrial age, freedom of speech was a “right” protected by the founding documents of our republic. During the Information Age, speech is often manifested on “services” provided in accordance with terms of service, community standards, and the discretion of a service provider. These can include connectivity (public utility), […]

Digital Rights Management has been prevalent for over two decades as a way to control access to digital media by content providers. Content distributors provide access to various forms of media via Content Delivery Networks (CDN), which are globally distributed arrays of servers that house consolidated databases of media that they are licensed to distribute […]