NOTE: for the lazy, rushed, & efficient: this discussion can be treated as a stand-alone, as we re-cover and coalesce much of chapters 1-4 in the act of understanding chapter 5. Grounded theory for the win.
Grant & Lucas walk through the fifth chapter of the author's case for the immediate adoption of a bitcoin strategic stockpile as a national defense imperative.
Today's conversation…
What of the nature of computer programming makes it inherently susceptible to poor system security design?
How does object-oriented programming lead to systemic hacking opportunities?
Why is mutually-assured destruction the logical precedent to mutually-assured preservation? and more.
The rubber meets the road in our next discussion - Chapter 6: "Recommendations & Conclusions".
Enjoy! follow on x: the wholeframe & lucasmaddy