Listen

Description

NOTE: for the lazy, rushed, & efficient: this discussion can be treated as a stand-alone, as we re-cover and coalesce much of chapters 1-4 in the act of understanding chapter 5. Grounded theory for the win.

Grant & Lucas walk through the fifth chapter of the author's case for the immediate adoption of a bitcoin strategic stockpile as a national defense imperative.

Today's conversation…

What of the nature of computer programming makes it inherently susceptible to poor system security design?

How does object-oriented programming lead to systemic hacking opportunities?

Why is mutually-assured destruction the logical precedent to mutually-assured preservation? and more.

The rubber meets the road in our next discussion - Chapter 6: "Recommendations & Conclusions".

Enjoy! follow on x: the wholeframe & lucasmaddy