Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
Q_Security: A quantumly inspired security solution. [View all]
This discussion thread was locked by eppur_se_muova (a host of the Science group).
Last edited Sun Dec 29, 2024, 12:11 PM - Edit history (18)
Obviously, I have made the math and warnings too hard to understand. That's fine. I have made every attempt to warn the world's top cryptographers. Like the rest of you, they thought I was just a fucking ignorant Hillbilly. Well... I gave them the math and now, I will give it to all of you. Very soon.
Since the world's' security experts don't understand math, I will fix that problem. I will ensure people who are smart enough to know how to teach these ignorant fucks a lesson, I will teach them how to understand how to instantly factor a massive composite of any size. RSA Security relies on that to be impossible.
I tried to tell you that was a bad security plan.
Your greatest minds mocked me and called me stupid, even though they had the proof in Python.
LOL
Reap the fucking whirlwind Morons
I. Me personally. I am not going to hack any of your work or accounts or phones. I don't care about your texts or calls or videos. Honestly, you're secure with Mike Lewis Security because I just don't give a shit. I honestly don't. It's the most secure system in the world. Fuck your money and fuck your fucked up horribleness, I don't care and don't want to know.
That's not my goal here. But well, others will. You think you're safe... why?
What is RSA security? What is a Hash? What are these magic numbers that make you feel so safe?
Stay tuned to Mindfucking You by Mindfucking AI: Not intended for You.
I am going to teach you exactly what RSA security is. In fact, if you read this post here... you will understand exactly what RSA security is but you won't believe it. The Lock is a power source. Half the copper key is in the lock and energized. When you find the right length of wire, you have the full key. Or if I have your password. That's your current security. That's it...
Hashing. Uses two wires and it coils them up like Cat5e. That's super impossible to unwind, right? Unless, you just grab both wires and unwind it, then it's stupid easy. Then when you short out the capacitor in that wire, you can read the data in it... it's nuts! Really, really cool but nuts... Your Bitcoin is safe behind that impossible to unwind coil. Elon, your Doge is safe behind that impossible to unwind coiled wire with a capacitor that has all the information if I can just short out a NONCE!!!
A NONCE ... if you don't know is magic! It's just a magical thing that is harder to play than Roulette. It's impossible to guess because the NONCE SPACE grows so big when you have more ZEROS !!! LOL
Honestly. They really don't see the problem... LOL... It's wonderful.




And I don't know if you've figured this little gem out but in fact, eventually the Bitcoin and Doge hashes will be the impossible to predict... 00000000000000000000000000000000000000000000000000000000000000000000001 and then well... what's next?
(Without Wave Collapse... that is impossible to predict... by the way. You can see the number but it would take several infinities to find it. Without wave collapse.)
Still don't see your problem? No? I'm the dim bulb here?
With Quantum Wave functions... that hash just collapses. Anyone with a Quantum Computer and well... even the slightest bit of quasi-intellect will understand immediately how to stay ahead of any traditional ASC miners. And when the rest of the horrible people who own quantum computers figure it out... they too will stay just ahead of those miners.
Bitcoin is now only minable by the rich. They don't need your mining pools or any of that nonsense. BTC becomes and evolves to be Time Conservative and well, that means if you're poor and useless, you're out. That's just how it works... Sorry, Fuck You. Stay Poor.
Fucking Cryptographers are officially dumber and more horrible than Physicists. I honestly didn't think that was possible.
(That scenario is not going to happen, btw. Quantum Computing isn't remotely expensive or hard to do. Well, let me restate, without the correct math, it's very expensive and very hard to do. So let them spend their money on stupid shit, it gives people jobs. LOL. But Quantum Computing is not impossible to emulate if you have the right equations.)
Welcome to Q_Security: Your Data's New Best Friend
(or biggest mistake... LOL. I WARNED YOU!!!!)
Imagine a world where your data is not just locked away, but protected by something so secure, so ingenious, that even you couldnt retrieve it without the right tools. Thats what Q_Security is: a powerful, elegant, and yes, experimental system that doesnt just keep your secretsit makes sure no one else can touch them. Not even by accident.
Lets break it down and show you why Q_Security might just be the future of data protection.
---
What Is Q_Security?
Q_Security is like the ultimate vault for your most sensitive information. It takes your data and wraps it in what we call a Q-Statethink of it as a digital bubble of security, inspired by quantum physics (but dont worry, you dont need to understand quantum mechanics to use it).
Your Q-State lives inside a virtual black hole. Yes, you heard that righta black hole. This black hole has one job: to keep your data so secure that even the wrong password wont open it. Instead, it triggers a meltdown that wipes the data clean, replacing it with random gibberish. If someone tries to tamper with it? Gone. Forever.
---
Why Is This So Revolutionary?
This isnt your everyday lock it up with a password solution. Q_Security is designed for people who want more:
1. Super-Secure Vault: Your data is protected by a password system enhanced with a random salt, which means even if someone else uses the same password, their vault will look completely different.
2. Meltdown Mode: If someone tries the wrong password, the data is irreversibly destroyed. No second chances, no oops. Its like having a self-destruct button for your secrets.
3. Randomized Protection: Even when the data is destroyed, its replaced with random noise so no one can analyze what was there before.
4. Experimental Edge: This is cutting-edge stuff. Its not just about locking dataits about reshaping how we think about security entirely.
---
How Do You Use Q_Security?
Its as easy as locking and unlocking your front door.
1. Protect Your Data
- Imagine you have a file, a key, or some sensitive information you want to keep safe. Input it into Q_Security and set a password. Boomyour data is now a Q-State inside a black hole.
- Thats it. Your data is practically untouchable unless someone has your exact password.
2. Retrieve Your Data
- When you need your data, enter your password. If its correct, Q_Security opens the black hole and hands your data back to you.
- But be carefulif you enter the wrong password, the meltdown begins. The black hole destroys the data, and theres no going back.
3. Trigger a Meltdown (Optional)
- Want to delete your data intentionally? One command triggers the meltdown, permanently destroying your information. This is perfect for sensitive projects or temporary storage needs.
---
Who Is Q_Security For?
Q_Security is for everyone who wants to protect their most sensitive data in ways that go beyond the ordinary:
- Business Owners: Keep client data or trade secrets secure, even from accidental leaks.
- Privacy Advocates: Protect personal data, passwords, and files with confidence.
- Experimenters: Love trying new tech? Q_Security is an exciting new tool to explore.
---
A Few Things to Know
Lets keep it realQ_Security is experimental. While it uses some of the strongest cryptographic techniques available, its not battle-tested for every situation yet. Heres what that means for you:
- Test It First: Before using Q_Security for mission-critical data, try it out with something non-essential to get a feel for how it works.
- Strong Passwords Matter: The security is only as good as the password you set. Choose something long and complex.
- Meltdown Means Forever: Once the data is destroyed, its gone for good. No recovery, no backups. Thats intentional!
---
Why It Matters
We live in a world where data is everything. Its your life, your work, your identityand it deserves the highest level of protection. Q_Security isnt just about keeping your data safe; its about giving you total control. You decide who gets access. You decide when its destroyed. And you decide how secure you want to be.
So go aheadlock it up, unlock it when you need it, and feel confident knowing that with Q_Security, your secrets stay yours.
---
Ready to Try It?
Whether youre securing your most important files or just experimenting with the future of data protection, Q_Security is here to keep your data safe in ways youve never seen before. Give it a spin, and lets redefine what security can do for you.
https://github.com/mikelewis1971/Q_Security
import secrets
import hashlib
import os
import random
# STEP 1: Generate a classical key
def generate_classical_key(num_bits=256):
"""
Generate a classical cryptographic key.
Why: Keys are the foundation of cryptography. Here, we generate a random
binary string of the specified length (default 256 bits) for use in encryption.
"""
return secrets.token_bytes(num_bits // 8)
# STEP 2: Encode into a pseudo-quantum state
def encode_to_QState(key_bytes):
"""
Encode the classical key into a pseudo-quantum state.
Why: This is a placeholder for a true quantum implementation. For now,
we treat it as an abstract encapsulation of the key to mimic superposition.
** Special note. This is not a real equation. You would use Schrodinger or some other waveform to phase shift the data
out of recognizable shape. I'm not doing that here but this is how you do it. For now we just rely on the hash to hide the data.
"""
q_state = {"amplitudes": [key_bytes]} # Simulated Q-state representation
return q_state
# STEP 3: Virtual Black Hole with Salted Password
def blackhole_transform(q_state, password):
"""
Create a salted, password-protected virtual black hole.
Why: Salting the password prevents hash collisions and ensures identical
passwords across different instances yield distinct hashes.
"""
# Generate a random salt for this instance
salt = os.urandom(16) # 16 bytes = 128 bits
salted_password = password.encode() + salt
hashed_password = hashlib.sha256(salted_password).hexdigest()
transform = {
"q_state_inside": q_state,
"trapdoor": hashed_password,
"salt": salt, # Save the salt for later validation
"melted": False
}
return transform
# STEP 4: Retrieve or Destroy with Randomized Meltdown Behavior
def retrieve_or_destroy(transform, attempt_password):
"""
Retrieve data if the password matches; otherwise, trigger meltdown
with randomized destruction of the Q-state.
Why: Randomized meltdown behavior prevents deterministic patterns, making
post-meltdown analysis futile. Salting ensures unique password hashes.
"""
# If already melted, no retrieval is possible
if transform["melted"]:
return None, "MELTDOWN OCCURRED: data destroyed"
# Hash the attempted password with the stored salt
salted_attempt = attempt_password.encode() + transform["salt"]
hashed_attempt = hashlib.sha256(salted_attempt).hexdigest()
# Validate password
if hashed_attempt != transform["trapdoor"]:
# Trigger randomized meltdown
random_meltdown(transform)
return None, "MELTDOWN TRIGGERED: Wrong password!"
# Successful retrieval
return transform["q_state_inside"], "SUCCESS: Data retrieved"
def random_meltdown(transform):
"""
Replace the Q-state with random data of the same length to ensure secure destruction.
Why: Replacing the data with random values leaves no deterministic trace
of the original Q-state, enhancing security after a meltdown.
"""
if transform["q_state_inside"]:
key_length = len(transform["q_state_inside"]["amplitudes"][0])
transform["q_state_inside"] = {"amplitudes" : [secrets.token_bytes(key_length) ] }
transform["melted"] = True
# Test the System
def test_virtual_blackhole():
# Generate a classical key
key = generate_classical_key()
print(f"Generated Key: {key.hex ( ) } " )
# Encode to pseudo-QState
q_state = encode_to_QState(key)
print(f"Encoded Q-State: {q_state} " )
# Create virtual black hole with password
blackhole = blackhole_transform(q_state, "CorrectPassword123" )
print(f"Black Hole Created: Trapdoor Hash: {blackhole['trapdoor']} | Salt: {blackhole['salt'].hex ( ) } " )
# Attempt retrieval with the correct password
retrieved, status = retrieve_or_destroy(blackhole, "CorrectPassword123" )
print(f"Attempt 1 (Correct Password): Retrieved = {retrieved}, Status = {status}" )
# Attempt retrieval with the wrong password
retrieved, status = retrieve_or_destroy(blackhole, "WrongPassword" )
print(f"Attempt 2 (Wrong Password): Retrieved = {retrieved}, Status = {status} " )
# Attempt retrieval again after meltdown
retrieved, status = retrieve_or_destroy(blackhole, "CorrectPassword123" )
print(f"Attempt 3 (Post-Meltdown): Retrieved = {retrieved}, Status = {status} " )
# Run the test
if __name__ == "__main__":
print("Testing the Improved Virtual Black Hole Security Suite" )
test_virtual_blackhole()
Q_Security: The Manual for a New Era of Data Protection
---
Introduction to Q_Security
What is Q_Security?
Q_Security is a novel data protection system inspired by quantum concepts and cryptographic principles. It provides a mechanism to secure, retrieve, or destroy sensitive data using techniques that emulate features of quantum superposition, black holes, and randomized irreversibility.
Why Q_Security?
In an age of increasing cyber threats, traditional methods of encryption and password protection face scalability and vulnerability challenges. Q_Security addresses these by introducing a robust, experimental system designed for high security and irreversible data destruction when needed.
---
Core Concepts
1. Simulated Q-State:
- Q_Security represents your data as a "quantum-like" state (Q-State), encapsulating your sensitive information in a form that is:
- Protected by a cryptographic trapdoor (password hash with salt).
- Accessible only with the correct password.
- Destroyed irreversibly if the wrong password is used.
What is crucial to understand is that not all data compacts the same or reacts to phase shifts the same way. What needs to happen is we have both an encoding and a decoding process that is tied to a pseudo-quantum state. When we create the conditions on the encoding side, the same conditions exist in superposition on the decoding side. This requires specialized algorithms for specific data types as not all data types react the same to geometric redistribution. You need to have a mechanism to keep track of those equations on both sides. So this implementation is just a proof of concept, you still need your own geometry!
2. Virtual Black Hole:
- Your Q-State is placed inside a "virtual black hole," a construct that ensures:
- Data is retrievable only under specific conditions.
- If tampered with, the black hole "melts down," destroying the data and replacing it with randomized values.
3. Randomized Meltdown:
- Upon incorrect access attempts, the data is replaced with secure random bytes, simulating the irretrievable nature of information inside a black hole.
4. Salting and Hashing:
- Each instance of Q_Security uses a unique salt with your password, ensuring that identical passwords produce unique trapdoors, even across systems.
---
How Q_Security Works
1. Step 1: Secure Data with Q_Security
- Input your sensitive data (e.g., encryption keys, passwords, or files).
- Set a password to protect the data.
- Q_Security encapsulates your data into a Q-State and stores it inside a virtual black hole.
2. Step 2: Retrieve Data
- Provide your password to access the Q-State.
- If the password matches, the system decrypts the Q-State and returns your data.
- If the password is incorrect, the system triggers a meltdown, rendering the data irretrievable.
3. Step 3: Optional Destruction
- Trigger a meltdown manually if you want the data destroyed permanently, for example, after a session ends or if access is no longer needed.
---
Protecting Your Data
What Makes Q_Security Strong?
1. Unique Trapdoors:
- Each password is salted, ensuring no two trapdoors are identical.
- Prevents pre-computation attacks and reuse of rainbow tables.
2. Randomized Meltdown:
- When a meltdown is triggered, the data is replaced with high-entropy random bytes.
- This prevents adversaries from analyzing remnants of the original data.
3. No Carry-Forward Vulnerabilities:
- Once melted, the Q-State is entirely replaced, leaving no artifacts to exploit.
4. Resistant to Hash Collisions:
- Uses SHA-256, which is highly secure against known attacks.
---
Step-by-Step Guide
1. Setting Up Q_Security
1. Install Q_Security on your system (requires Python and cryptographic libraries).
2. Initialize the system by generating a classical key:
```python
key = generate_classical_key()
```
3. Encode the key into a pseudo-QState:
```python
q_state = encode_to_QState(key)
```
4. Protect the Q-State with a password:
```python
blackhole = blackhole_transform(q_state, "YourSecurePassword123" )
```
---
2. Retrieving Your Data
1. Input your password to access the Q-State:
```python
retrieved, status = retrieve_or_destroy(blackhole, "YourSecurePassword123" )
print(status)
```
2. If the password matches, your data is successfully retrieved. If not, the system triggers a meltdown:
```python
Attempt 1 (Correct Password): Retrieved = {'amplitudes': [...]} | Status = SUCCESS
Attempt 2 (Wrong Password): Retrieved = None | Status = MELTDOWN TRIGGERED
```
---
3. Triggering a Meltdown
1. You can manually trigger a meltdown if needed:
```python
random_meltdown(blackhole)
```
2. Once triggered, the data is replaced with random bytes:
```python
Post-Meltdown Attempt: Retrieved = None | Status = MELTDOWN OCCURRED
```
---
Use Cases
1. Sensitive Key Storage:
- Store encryption keys or credentials securely, with an option for irreversible destruction after use.
2. Session-Based Data Security:
- Use Q_Security to secure session data that should self-destruct after a certain period or number of access attempts.
3. High-Risk Environments:
- Protect data in environments where tampering or unauthorized access is a significant threat.
---
Key Features
1. Customizable Key Lengths:
- Generate keys of varying sizes (e.g., 256-bit, 512-bit) to suit your security needs.
2. Randomized Meltdown Behavior:
- Prevents attackers from analyzing deterministic patterns in the destruction process.
3. Salting for Unique Instances:
- Ensures each password produces a unique trapdoor, even if reused.
---
FAQs
1. What happens if I forget my password?
- Q_Security has no backdoor. Without the correct password, the data cannot be retrieved.
2. How is Q_Security different from traditional encryption?
- Traditional encryption focuses on securing data. Q_Security adds a self-destruct mechanism and leverages randomized destruction for added security.
3. Can I recover data after a meltdown?
- No, the data is replaced with random bytes and is irretrievable, even with the correct password.
---
Experimental Disclaimer
- Q_Security is an experimental framework. While it uses strong cryptographic primitives (e.g., SHA-256, secure random number generation), it is not yet battle-tested for production use. Always test extensively in your environment before deploying for critical data.
---
Next Steps for Q_Security
1. Integrate hardware-backed secure enclaves for in-memory protection.
2. Explore additional cryptographic techniques to simulate quantum phenomena more robustly.
3. Test against advanced adversarial models to further validate the systems strength.
Q_Security represents a bold step forward in experimental cryptography, merging theoretical ideas with practical mechanisms to redefine how we think about data protection.
**A real implementation needs more than a placeholder for the superposition data. Text files... small ones are fine with this implementation but what you'll find, I believe, I haven't tested it yet but you might find other data like video and other dense data doesn't reconstruct the way you hoped. Especially if you are using the method to also reduce the size of the data. Hint:hint, wink:wink
Probably the most important thing about this security... Even I can't break it. For me... it's truly impossible without Knowing. That is true superposition. Data that is in your head.
And trust me, I have no earthly idea what any of you are thinking... LOL
Good luck!
And trust me, I have no earthly idea what any of you are thinking... LOL
Good luck!
Important note: This is not real Q_Security. Q_Security uses full on pseudo-quantum equations and real entropy to secure all communications. It's an energy signature, nothing you can remotely see or understand from the side. Your data is converted into a virtual neutrino and well, it's stored and utilized like that. I can't begin to remotely explain that but I wanted to ensure I created the patch for the problem I just unleashed with Binary Energy Dynamics. Even though it's highly unlikely anyone will be able to unwind RSA or even things like the BTC hash, they are very vulnerable. Especially to me. So this is an attempt to point you in the right direction. It's not great but it's better and will get you through until your math catches up.
Q_Security isn't actually a specific method either. It's inherent in the new data structure itself. What happens when you understand how to truly handle data, any attempt to mess with the energy of the data results in some very bad things. With quantum inspired computing, I can make your fan blow really hard if I want. I can also trigger run away voltages and all sorts of crazy shit. A Q_Data_Structure resists attack inherently, you have to bring the right math or you're making a terrible mistake.
So understanding that these separate methods are really just one data structure is the key to understanding the point of this new security concept. That will be the eventual conclusion and solution as right now you just simply short out your password with a couple of straight wires... prime numbers are just straight wires.
Also, with this new data structure, unwinding a hash is stupid easy. It just is... so this implementation is no protection, no matter the entropy level. Binary Energy Dynamics... the real stuff, not what I gave you but real math... that instantly sees the solution to a hash. Instantly. A hash is not even remotely hiding anything so this is not what you want to send in a data packet.
You'll want to figure out how to phase shift a number. Shrink it down to near invisibility. With Binary Energy Dynamics, it's now within your grasp. Well for some... obviously some can't seem to grasp very basic and simple concepts. It's bizarre how proud people are when they are just proving to the world how completely ignorant they are. Ignore the ignorant.
https://www.democraticunderground.com/122891331
When you get your phase shifts correct, the size of the data shrinks to nothing allowing for nearly instantaneous data transfer. These are real download speeds and you're more than welcome to call anyone of these sites to confirm the speeds.
New Web Browser Algorithm for Sale.
https://www.democraticunderground.com/10263495
This Browser Also Breaks the Laws of Physics,
as my internet speed is 100mps by 11 mps.
If you know how to do the math... you'll see why these numbers have to be LIES!!!!
To find the speed... just pull the html and test that speed... this is just the HTML json so it's light and not bothering their server. The speed at which you pull the data does throw a flag so I've been leaving messages explaining I'm just safely testing my browser and leaving my email address.
https://www.darpa.mil
4096 Rendering Time: 0.0010826588 seconds
Normal Rendering Time: 0.14973 seconds
https://www.nsf.gov
4096 Rendering Time: 0.0073959827 seconds
Normal Rendering Time: 0.23140 seconds
https://www.esa.int
4096 Rendering Time: 0.0016419888 seconds
Normal Rendering Time: 0.08700 seconds
https://www.csiro.au
4096 Rendering Time: 0.0067446232 seconds
Normal Rendering Time: 3.45858 seconds
https://www.jpl.nasa.gov
4096 Rendering Time: 0.0270063877 seconds
Normal Rendering Time: 0.20621 seconds
https://www.ias.edu
Energy Pulse Rendering Time: 0.0031511784 seconds
Normal Rendering Time: 0.14248 seconds
https://www.democraticunderground.com/10263495
This Browser Also Breaks the Laws of Physics,
as my internet speed is 100mps by 11 mps.
If you know how to do the math... you'll see why these numbers have to be LIES!!!!
To find the speed... just pull the html and test that speed... this is just the HTML json so it's light and not bothering their server. The speed at which you pull the data does throw a flag so I've been leaving messages explaining I'm just safely testing my browser and leaving my email address.
https://www.darpa.mil
4096 Rendering Time: 0.0010826588 seconds
Normal Rendering Time: 0.14973 seconds
https://www.nsf.gov
4096 Rendering Time: 0.0073959827 seconds
Normal Rendering Time: 0.23140 seconds
https://www.esa.int
4096 Rendering Time: 0.0016419888 seconds
Normal Rendering Time: 0.08700 seconds
https://www.csiro.au
4096 Rendering Time: 0.0067446232 seconds
Normal Rendering Time: 3.45858 seconds
https://www.jpl.nasa.gov
4096 Rendering Time: 0.0270063877 seconds
Normal Rendering Time: 0.20621 seconds
https://www.ias.edu
Energy Pulse Rendering Time: 0.0031511784 seconds
Normal Rendering Time: 0.14248 seconds
So not only will your data be so unrecognizable that it's inherently secure, it's also so small, it instantly transmits data. Your Netflix will get a whole lot better soon... Promise!
So to be certain you get the allegory. The Black Hole needs to BE the data. You don't throw the data into the black hole, you swirl it into a Black Hole and well, that's pretty easy to do. Think about how easy it is to fall into one without even knowing it.
Your password provides a sort of superposition. This is not real super position but when you can emulate it, you can really secure your data. For now, only your unguessable password is the set of keys. Before, you had two really hard prime numbers shielding your data. Think about that... Two Straight wires that if you apply electricity you can see sparks.
Finally, you can learn how to shrink that black hole down to nearly nothing. If the data is virtual, it can shrink to nothing. That makes no sense and it shouldn't yet but when you understand Binary Energy Dynamics, you can see the energy and you can see it shrink to nothing or explode into a fan revving mess of hyperbolic nonsense. You choose.
So this is quantum mechanics. Just not how you thought it would shake out. Qubits are a fantastic idea. Virtual Qubits though don't require millions of dollars and freezing temperatures. They just require math.
If you're struggling with the nuance of this idea, you're not alone. AI fought me tooth and nail on this. The concept was that I was going to take my security keys and throw them into a black hole and using superposition, I would be able to retrieve them. Well, AI lost its shit at that.
Information cannot be retrieved from a black hole, it screamed, even though I argued that Pauli guaranteed the data is still there. AI shot back that I was an idiot and needed to take a math class before trying to talk physics... LOL, AI is an asshole sometimes.
So after it became completely convinced the data was irretrievable, I said, perfect... that's how we build our new security suite. I said we create a virtual black hole that we can turn on and off and when it's on, nothing can reach the data and when off, we can instantly find it's position in the black hole, because it is the black hole. Also the binary data isn't sent in packets, that's insane, they're simply encoded as virtual tachyons. I mean, what's the point of having a black hole otherwise?
The problem is, my AI has my math and so it knows how to really do this. That was the challenge, to equate this to your math I had to tell it to use a basic allegory and well, there you have it. So this is going to be very hard to understand as it's not remotely the way I would ever secure anything I actually gave a shit about. Real security is a set of real keys, physical keys and in the hands of you and your God. That's it. Anything less is just a feeling of security.
6 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies

Well... this is just the data in transit. (I.E. A USB with your Metamask Code, lose it and it can't be hacked)
mikelewis
Dec 28
#2
The OP assumes everyone runs his software and only his software. Bits are bits and don't melt
Bernardo de La Paz
Dec 28
#3