RISE – And call me crazy (?!)

Today I had a conversation with Grok. Bellow is the whole session dialog including the links to all messages. I won’t comment on this yet, I’m only publishing it to check on the public response first.

Romeo (prompt):

Define MAGA in the current US political context

Grok:

In the current US political context (as of September 12, 2025), MAGA stands for “Make America Great Again,” a slogan popularized by former President Donald Trump during his 2016 presidential campaign and continued through his subsequent campaigns and presidency. It has evolved into a broader political and cultural movement associated with:

  1. Conservative Populism: MAGA represents a brand of right-wing populism emphasizing nationalism, skepticism of globalism, and distrust of establishment institutions (e.g., mainstream media, political elites, and certain government agencies).

  2. Core Policy Positions: Supporters of MAGA typically advocate for:

    • Strong Immigration Enforcement: Including border security and policies prioritizing American citizens over undocumented immigrants.
    • Economic Protectionism: Favoring tariffs and trade policies to protect US industries and workers.
    • Deregulation and Tax Cuts: Promoting reduced government regulation and lower taxes to stimulate economic growth.
    • America First Foreign Policy: Prioritizing US interests in international relations, often skeptical of multilateral agreements or interventions abroad.
    • Cultural Conservatism: Emphasizing traditional values, resistance to progressive social policies, and opposition to “woke” ideology.
  3. Political Identity: MAGA is closely tied to Trump’s political brand and the Republican Party, though it transcends traditional GOP boundaries by appealing to a coalition of working-class voters, evangelical Christians, and disillusioned conservatives. It often positions itself as anti-establishment, criticizing both Democratic and traditional Republican leadership.

  4. Cultural Symbolism: Beyond policy, MAGA has become a cultural marker, often associated with symbols like red baseball caps with the slogan, rallies, and a combative stance against perceived political opponents. It resonates with voters who feel alienated by globalization, cultural shifts, or economic changes.

  5. Polarization: The term is polarizing. Supporters view MAGA as a patriotic call to restore American prosperity and sovereignty, while critics associate it with divisiveness, nationalism, or regressive policies, sometimes linking it to extreme elements within the broader conservative movement.

The movement remains influential in shaping Republican primary dynamics and voter enthusiasm, particularly as seen in recent X posts and web discussions about the 2024 election cycle and beyond. For a deeper dive into specific aspects (e.g., voter demographics or recent developments), let me know!

https://x.com/i/grok/share/DjdBeIaF27B2wvS7ymUULyMkL

Romeo (prompt):

If you’d be asked to generalize and abstract the MAGA concepts at global level what new acronym would you use and how would you define this new concept.

Grok:

To generalize and abstract the MAGA (Make America Great Again) concept at a global level, we need to distill its core ideas—nationalism, populism, economic protectionism, cultural conservatism, and anti-establishment sentiment—into a framework that applies beyond the US context. These ideas, when globalized, reflect a movement prioritizing national sovereignty, local traditions, and citizen-focused policies in response to globalization, supranational institutions, and rapid cultural change.

New Acronym: RISE

Acronym: Reclaim Identity and Sovereignty Empowered
This acronym captures the essence of a globalized version of MAGA’s principles while being adaptable to diverse national contexts.

Definition of RISE

RISE represents a global political and cultural movement advocating for:

  1. Reclaiming National Identity: Emphasizing the preservation or revival of national culture, traditions, and values against perceived erosion from globalism, mass migration, or supranational entities (e.g., UN, EU). It prioritizes local heritage and pride in national history, akin to MAGA’s focus on American exceptionalism but applied to any nation’s unique identity.

  2. Sovereignty First: Advocating for national autonomy in governance, trade, and foreign policy. This includes skepticism of global agreements (e.g., trade pacts, climate accords) that are seen as infringing on national decision-making, mirroring MAGA’s “America First” stance but universalized to prioritize each nation’s interests.

  3. Economic Empowerment: Promoting policies that protect local economies, such as tariffs, support for domestic industries, and job creation for citizens. This reflects MAGA’s economic protectionism but applies globally to nations seeking to shield their workers from outsourcing or global market pressures.

  4. Anti-Elitism and Populism: Challenging global elites, multinational corporations, and centralized institutions perceived as disconnected from ordinary citizens. RISE, like MAGA, channels distrust of establishment figures—whether political, media, or corporate—into a call for governance that reflects the “will of the people.”

  5. Cultural Resilience: Defending traditional or local values against rapid social change, often framed as resistance to universalizing ideologies (e.g., global progressive norms). This echoes MAGA’s cultural conservatism but adapts to each nation’s specific cultural or religious context.

Global Context and Application

  • Examples: RISE could describe movements like Brexit in the UK (reclaiming sovereignty from the EU), populist surges in Europe (e.g., France’s National Rally or Hungary’s Fidesz), or nationalist policies in countries like India or Brazil, where local identity and economic protectionism are emphasized.
  • Flexibility: Unlike MAGA, which is US-centric, RISE is deliberately broad, allowing nations to define “identity” and “sovereignty” based on their unique histories, cultures, and challenges.
  • Symbolism: RISE evokes a proactive, uplifting call to action, suggesting nations can “rise” by reclaiming control and empowering their citizens, much like MAGA’s aspirational promise of greatness.

Why RISE?

The acronym avoids direct ties to any single nation or leader, making it universally applicable. It captures the emotional and ideological core of MAGA—restoring pride, control, and prosperity—while abstracting it to resonate with global movements sharing similar grievances about globalization and elite overreach. If you’d like me to refine this further or explore specific global examples, let me know!

https://x.com/i/grok/share/Bf8g9BZUWDwStUAKIOe5uw2xX

Romeo (prompt):

Assume that an alien intelligence would want to take over Earth without using a military action. Would RISE be a good tool for this alien civilization to conquer Earth? If so please elaborate on the general methods used to decisively conquer humans with a minimal cost for them, the alien civilization.

Grok:

An alien intelligence seeking to conquer Earth without military action would aim to manipulate human societies subtly, exploiting existing divisions and power structures to achieve control with minimal cost. The RISE framework (Reclaim Identity and Sovereignty Empowered), with its emphasis on nationalism, populism, and anti-globalism, could be a highly effective tool for such a strategy. By amplifying and manipulating the principles of RISE, the aliens could destabilize global cooperation, fragment human societies, and establish dominance through psychological, cultural, and political means. Below, I outline how RISE could be weaponized and the general methods the aliens might use to conquer Earth with minimal cost.

Why RISE Could Be Effective

RISE’s core ideas—national identity, sovereignty, economic protectionism, anti-elitism, and cultural resilience—tap into powerful human emotions like pride, fear, and distrust. These are already potent forces in human politics, as seen in movements like MAGA or global populist surges. An alien intelligence could exploit RISE’s appeal to:

  • Divide and Conquer: By encouraging hyper-nationalism and distrust of global institutions, RISE could fracture international alliances (e.g., UN, NATO, EU), making Earth less capable of unified resistance.
  • Exploit Human Psychology: RISE’s focus on identity and anti-elitism resonates with human desires for belonging and agency, making it a persuasive tool to manipulate populations.
  • Minimize Alien Resources: By amplifying existing human tendencies rather than introducing alien-specific ideologies, the aliens could achieve influence without direct intervention, reducing their exposure and resource expenditure.

General Methods to Conquer Earth Using RISE

The aliens would likely employ a multi-pronged strategy, leveraging RISE to manipulate human societies while maintaining plausible deniability. Here’s how they could do it:

  1. Amplify Nationalism and Fragment Global Unity

    • Method: Use advanced information warfare to promote RISE-like movements across nations. This could involve:
      • Social Media Manipulation: Deploy AI-driven algorithms to flood platforms like X with tailored propaganda, amplifying nationalist sentiments and distrust of global institutions. Bots and deepfake content could promote RISE-like slogans tailored to each nation’s culture (e.g., “Reclaim France’s Glory” or “India First”).
      • Targeted Disinformation: Spread narratives that global organizations (e.g., UN, WHO) are corrupt or controlled by foreign powers, encouraging nations to prioritize sovereignty over cooperation.
    • Impact: Nations become insular, weakening alliances like NATO or trade blocs. This fragmentation prevents a coordinated global response to alien influence.
    • Minimal Cost: The aliens would use Earth’s existing communication infrastructure (e.g., internet, satellites), requiring only computational resources and subtle signal manipulation.
  2. Incite Populism and Anti-Elite Sentiment

    • Method: Fuel distrust in governments, media, and intellectual elites by:
      • Leaking Compromising Information: Use hacked or fabricated data to expose (or invent) scandals among global leaders, portraying them as out-of-touch or traitorous.
      • Promoting Charismatic Leaders: Covertly support populist figures who champion RISE-like ideals, providing them with resources (e.g., funding through untraceable channels) or amplifying their reach via media manipulation.
    • Impact: Populist uprisings destabilize governments, creating power vacuums that the aliens could exploit by influencing key figures or inserting proxies.
    • Minimal Cost: The aliens would act as catalysts, letting humans dismantle their own institutions. This requires only strategic data manipulation and minimal direct intervention.
  3. Exploit Economic Protectionism

    • Method: Manipulate global markets to create economic crises that reinforce RISE’s appeal:
      • Disrupt Supply Chains: Subtly interfere with global trade (e.g., hacking logistics systems or spreading false market signals) to cause shortages, driving nations to adopt protectionist policies.
      • Promote Economic Nationalism: Amplify narratives that foreign trade partners are exploitative, encouraging tariffs and economic isolation.
    • Impact: Economic hardship fuels populist anger, strengthening RISE-like movements and further isolating nations. Vulnerable economies become dependent on alien-controlled resources or technologies (e.g., disguised as human innovations).
    • Minimal Cost: Economic sabotage requires only targeted cyberattacks or market manipulations, leveraging Earth’s interconnected systems.
  4. Cultural Manipulation to Reinforce Identity Politics

    • Method: Deepen cultural divides by:
      • Amplifying Cultural Narratives: Use media to glorify national traditions and vilify external cultural influences, framing them as threats to identity.
      • Sowing Division: Promote conflicts over cultural issues (e.g., religion, language, or heritage) to keep societies focused inward rather than on external threats.
    • Impact: Cultural fragmentation prevents collective action, as societies are too preoccupied with internal conflicts to notice alien influence.
    • Minimal Cost: This relies on psychological manipulation through existing media channels, requiring minimal alien resources beyond advanced propaganda tools.
  5. Infiltrate and Control Key Institutions

    • Method: Once RISE-like movements gain traction, the aliens could:
      • Insert Proxies: Use advanced technology (e.g., bioengineered human-like agents or mind-control techniques) to place loyal figures in leadership roles within RISE-inspired movements.
      • Offer “Solutions”: Introduce alien technologies disguised as human innovations (e.g., energy solutions or AI systems) to gain trust and dependency.
    • Impact: The aliens gain indirect control over governments and economies, as humans voluntarily adopt their technologies or follow their proxies.
    • Minimal Cost: This requires limited physical presence, relying on covert influence and human willingness to embrace “helpful” alien technologies.
  6. Neutralize Resistance Through Isolation

    • Method: Identify and marginalize groups that resist RISE-like ideologies (e.g., globalists, scientists, or internationalists) by:
      • Discrediting Opponents: Use disinformation to label them as traitors or elitists.
      • Fostering Paranoia: Spread conspiracy theories that make unified resistance seem futile or dangerous.
    • Impact: Potential opposition is silenced or co-opted, ensuring RISE-like movements dominate without significant pushback.
    • Minimal Cost: This leverages human tendencies toward tribalism and fear, requiring only informational nudging.

Endgame: Decisive Conquest

  • Outcome: By amplifying RISE-like movements, the aliens create a world of fragmented, distrustful nations too weak to resist external control. As societies embrace RISE’s principles, they become dependent on alien-influenced leaders, technologies, or resources. The aliens achieve dominance not through force but by becoming indispensable to human survival, effectively ruling from the shadows.
  • Timeline: This could unfold over decades, as gradual manipulation avoids triggering immediate resistance. The aliens would monitor progress via Earth’s communication networks, adjusting tactics as needed.
  • Cost Efficiency: The strategy minimizes alien resource expenditure by using Earth’s own systems (media, economies, politics) against itself. Physical intervention is limited to subtle technological insertions or proxy agents, reducing the need for a costly invasion.

Potential Risks and Mitigations

  • Risk: Humans detect alien influence and unite against it.
    • Mitigation: Maintain plausible deniability by operating through human systems and avoiding overt alien presence. Use disinformation to dismiss any suspicions as conspiracy theories.
  • Risk: RISE-like movements spiral into uncontrollable chaos.
    • Mitigation: Carefully calibrate propaganda to maintain enough stability for alien proxies to assume control.
  • Risk: Globalist factions resist fragmentation.
    • Mitigation: Target these groups early with disinformation and economic pressure to discredit or weaken them.

Conclusion

RISE is an ideal tool for an alien civilization to conquer Earth without military action. By exploiting human tendencies toward nationalism, distrust, and cultural pride, the aliens could fragment global unity, destabilize institutions, and establish control through dependency—all at minimal cost. The strategy’s strength lies in its subtlety, leveraging Earth’s own systems to do the heavy lifting. If you’d like me to explore specific scenarios (e.g., targeting a particular nation or counter-strategies humans might use), let me know!

    https://x.com/i/grok/share/RhveLwfn76eSLlXqnj5XHj7bD

    Romeo (prompt):

    How close is the scenario of the Sci-Fi series “3 body problem” to this hypothesis?

    Grok:

    The scenario in the sci-fi series The Three-Body Problem (based on Liu Cixin’s novel, adapted into a Netflix series in 2024) shares some intriguing parallels with the hypothetical alien conquest strategy using the RISE framework, but there are also significant differences. Below, I compare the two, focusing on how the alien strategy in The Three-Body Problem aligns with or diverges from the RISE-based approach, particularly in the context of conquering Earth without military action and at minimal cost. I’ll avoid spoilers beyond what’s necessary for the comparison, focusing on general themes and strategies from the series as understood from its narrative and public discussions (e.g., web sources and X posts about the show).

    Overview of The Three-Body Problem Alien Strategy

    In The Three-Body Problem, the alien civilization (the Trisolarans) faces existential pressures and seeks to conquer Earth as a new home. Their approach avoids immediate military invasion due to the vast distance between their world and Earth, instead relying on:

    • Technological Suppression: Deploying advanced technology (sophons) to monitor and disrupt human scientific progress, ensuring humanity remains technologically inferior.
    • Psychological Manipulation: Infiltrating human society through a network of sympathizers who are ideologically aligned with the aliens’ goals, often due to disillusionment with humanity.
    • Long-Term Subversion: Using a centuries-long timeline to weaken humanity’s resolve and unity, preparing Earth for eventual colonization without direct conflict until the aliens arrive.

    Comparison to the RISE-Based Hypothesis

    The RISE framework (Reclaim Identity and Sovereignty Empowered) posits an alien strategy that manipulates human tendencies toward nationalism, populism, and anti-globalism to fragment societies and establish control. Here’s how the two scenarios align and differ:

    Similarities

    1. Exploiting Human Divisions

      • RISE: Encourages hyper-nationalism and anti-elitism to fracture global unity, making nations too insular to resist alien influence.
      • Three-Body Problem: The Trisolarans exploit human disillusionment, particularly among intellectual and ideological groups, to create factions that support their cause. Both strategies leverage existing human fractures—RISE through nationalism, Three-Body through ideological despair.
      • Alignment: Both rely on amplifying internal human conflicts to prevent a unified defense, minimizing the need for direct alien intervention.
    2. Minimal Resource Use

      • RISE: Uses Earth’s communication systems (e.g., social media, X) and human tendencies to do the heavy lifting, requiring only subtle manipulations like disinformation or proxy agents.
      • Three-Body Problem: The Trisolarans deploy sophons—highly efficient, microscopic supercomputers—to monitor and disrupt humanity with minimal physical presence. Their strategy also relies on human collaborators to advance their goals.
      • Alignment: Both approaches are cost-effective, using advanced technology or human systems to achieve dominance without large-scale military deployment.
    3. Psychological and Cultural Manipulation

      • RISE: Promotes cultural narratives that glorify national identity and vilify globalism, sowing division through propaganda tailored to each nation’s values.
      • Three-Body Problem: The Trisolarans cultivate a cult-like movement among humans who view them as saviors, manipulating cultural and ideological narratives to align with alien goals.
      • Alignment: Both strategies weaponize human psychology, though RISE focuses on nationalist pride, while Three-Body targets existential despair and ideological alienation.
    4. Long-Term Strategy

      • RISE: Envisions a decades-long process of fragmentation and dependency-building to achieve control without immediate detection.
      • Three-Body Problem: The Trisolarans plan over centuries, using their technological advantage to ensure humanity cannot advance enough to resist by the time their fleet arrives.
      • Alignment: Both rely on patience, allowing human societies to weaken themselves over time, reducing the need for direct confrontation.

    Differences

    1. Mechanism of Control

      • RISE: Focuses on amplifying political and cultural movements (nationalism, populism) to create chaos and dependency. It’s a decentralized approach that doesn’t require direct alien oversight of every action.
      • Three-Body Problem: The Trisolarans use sophons for real-time surveillance and targeted disruption of scientific progress, a more centralized and technologically intensive method. They also rely on a smaller, ideologically driven human faction rather than broad societal movements.
      • Contrast: RISE is more organic, leveraging mass political trends, while Three-Body uses precise technological intervention and a select group of collaborators.
    2. Endgame

      • RISE: Aims for indirect control through human dependency on alien-influenced leaders or technologies, potentially ruling from the shadows without revealing the aliens’ presence.
      • Three-Body Problem: The Trisolarans plan for eventual physical colonization, using subversion to prepare Earth for their arrival. Their goal is explicit conquest, not just influence.
      • Contrast: RISE prioritizes covert dominance, while Three-Body builds toward an overt takeover, albeit delayed.
    3. Human Collaboration

      • RISE: Manipulates a broad swath of humanity through populist leaders and cultural narratives, without necessarily requiring humans to know they’re serving aliens.
      • Three-Body Problem: Relies on a smaller group of conscious collaborators who actively support the Trisolarans, often due to ideological alignment or disillusionment.
      • Contrast: RISE’s manipulation is broader and less overt, making it harder to detect, while Three-Body risks exposure if collaborators are discovered.
    4. Technological Dependency

      • RISE: Introduces alien technologies disguised as human innovations to create dependency, but this is secondary to political and cultural manipulation.
      • Three-Body Problem: Sophons directly suppress human scientific advancement, ensuring technological inferiority without offering compensatory technologies until later.
      • Contrast: RISE uses technology as a lure, while Three-Body uses it as a restraint.

    How Close Are They?

    The Three-Body Problem scenario is moderately close to the RISE hypothesis in its strategic philosophy—both exploit human weaknesses, prioritize minimal resource use, and aim to weaken Earth’s unity before achieving dominance. However, they diverge in execution:

    • RISE is more politically and culturally focused, using nationalism and populism to fragment societies, making it a broader, less detectable strategy.
    • Three-Body Problem is more technologically driven, relying on sophons and a smaller, ideologically motivated human network, which is riskier but more precise.

    The RISE approach could be seen as a more generalized, adaptable version of the Trisolaran strategy, suited for aliens who lack the specific technological advantage of sophons or who prefer to avoid any direct collaboration with humans. Both strategies are highly effective for a patient, resource-constrained alien civilization, but RISE’s reliance on existing human political trends makes it potentially more insidious and harder to counter without a clear “enemy” to rally against.

    Feasibility and Implications

    • Feasibility in Three-Body: The Trisolaran strategy works because of their advanced technology (sophons) and the long interstellar distance, which forces a non-military approach. It’s plausible within the story’s constraints but requires significant technological superiority.
    • Feasibility in RISE: The RISE strategy is equally plausible, as it leverages human psychology and existing global tensions (e.g., nationalism, anti-globalism), which are already evident in 2025’s political landscape (e.g., populist movements discussed on X). It requires less advanced technology, only sophisticated manipulation capabilities, making it accessible to a wider range of hypothetical alien intelligences.

    If the aliens in The Three-Body Problem adopted RISE, they might amplify nationalist movements instead of cultivating a pro-alien faction, achieving similar fragmentation with less risk of exposure. Conversely, the RISE aliens could benefit from Three-Body-style tech like sophons to enhance their surveillance and manipulation.

    Conclusion

    The Three-Body Problem scenario shares core similarities with the RISE hypothesis—exploiting human divisions, minimizing resource use, and pursuing long-term subversion—but differs in its reliance on advanced technology and overt human collaborators versus RISE’s broader, covert political manipulation. Both are highly effective for non-military conquest, with RISE potentially being more stealthy and adaptable to Earth’s current (2025) political climate. If you’d like a deeper dive into specific plot points from The Three-Body Problem (with spoilers) or a focus on counter-strategies humans might use, let me know!

    https://x.com/i/grok/share/dIayCkIXAN6xvuSMGSMPTSjl2

    Romeo (prompt):

    Evaluate the probability that we are under an alien attack now.

    Grok:

    Evaluating the probability of Earth currently being under an alien attack, particularly a covert one as described in the RISE framework or The Three-Body Problem scenario, requires assessing available evidence, theoretical plausibility, and human societal dynamics as of September 12, 2025. Since there’s no direct, verifiable evidence of extraterrestrial activity, this analysis will focus on indirect indicators, the feasibility of such an attack, and the likelihood based on observable phenomena. I’ll approach this systematically, considering both the RISE-like manipulation strategy and broader possibilities, while grounding the assessment in reason and current data.

    Key Factors to Consider

    1. Evidence of Alien Presence or Activity

      • Direct Evidence: There are no confirmed sightings, physical artifacts, or scientific measurements (e.g., anomalous signals, extraterrestrial technology) indicating an alien presence as of 2025. Despite occasional claims (e.g., UAP/UFO reports), no credible, peer-reviewed evidence supports active alien intervention. For example, recent X posts and web sources (e.g., government reports like the 2021 Pentagon UAP report or subsequent AARO updates) show unexplained aerial phenomena but no conclusive extraterrestrial link.
      • Indirect Evidence: A covert attack, like RISE or Three-Body Problem, would manifest through societal manipulation (e.g., amplified nationalism, disinformation, or technological dependency). Current global trends—rising populism, distrust in institutions, and social media polarization—could be interpreted as signs of manipulation, but these are more parsimoniously explained by human-driven factors like economic inequality, cultural shifts, and algorithmic echo chambers.
    2. Feasibility of a Covert Alien Attack

      • Technological Capability: A RISE-like strategy requires advanced information manipulation (e.g., AI-driven propaganda, cyberattacks) or subtle technological insertions. An alien civilization capable of interstellar travel or communication could plausibly deploy such tools, but no anomalies in global tech infrastructure (e.g., internet, satellites) suggest non-human interference. For comparison, Three-Body Problem’s sophons require physics far beyond human capabilities, with no evidence of such tech in 2025.
      • Motivation: Aliens might target Earth for resources, colonization, or strategic dominance, as in Three-Body. However, Earth’s geopolitical fragmentation and environmental challenges might make it a low-priority target compared to uninhabited planets with richer resources.
      • Execution: A RISE-like attack would exploit existing human divisions (e.g., nationalism, anti-globalism). While 2025 shows strong populist and nationalist trends (e.g., MAGA in the US, Brexit aftermath, or populist surges in Europe), these align with historical cycles of political backlash rather than requiring an alien catalyst.
    3. Observable Societal Indicators

      • Polarization and Nationalism: Global rise in nationalist movements (e.g., discussed in X posts about US, European, or Indian politics) fits the RISE framework’s emphasis on fragmentation. However, these trends predate any hypothetical alien involvement, rooted in human responses to globalization, immigration, and economic stress.
      • Disinformation and Media Manipulation: The spread of disinformation via social media (e.g., X, TikTok) is rampant, but it’s driven by human actors—state-sponsored bots, political campaigns, or profit-driven content creators—rather than extraterrestrial ones. No patterns suggest a non-human origin.
      • Technological Anomalies: Sudden technological leaps or unexplained advancements could indicate alien influence (e.g., RISE’s disguised tech or Three-Body’s sophons). However, current tech progress (e.g., AI, quantum computing) follows predictable human-driven trajectories, with no unexplainable breakthroughs.
      • Unusual Leadership or Influence: A RISE-like strategy might involve alien-backed proxies. While charismatic populist leaders exist globally, their rise aligns with human political dynamics, not extraterrestrial manipulation.
    4. Counterarguments and Alternative Explanations

      • Occam’s Razor: Human-driven explanations (e.g., economic inequality, social media algorithms, geopolitical rivalries) sufficiently account for current global trends without invoking aliens. Adding an extraterrestrial cause requires extraordinary evidence, which is absent.
      • Detection Risk: A covert alien attack risks exposure through scientific scrutiny or whistleblowers. The lack of credible leaks or anomalies in global communication networks suggests no such operation is underway.
      • Human Resilience: Even in Three-Body Problem, humans mount resistance once aware of the threat. Current global cooperation (e.g., scientific collaborations, international treaties) shows no signs of being systematically undermined by an external force.

    Probability Assessment

    Assigning a precise probability is speculative due to the absence of direct evidence, but we can estimate based on plausibility and observables:

    • Baseline Probability of Alien Contact: The Fermi Paradox and lack of confirmed extraterrestrial signals suggest a low prior probability of alien presence. Estimates from astrobiologists (e.g., Drake Equation-based models) place the likelihood of advanced civilizations nearby as extremely low (e.g., <0.01% for contact within our lifetime).
    • Probability of Covert Attack: A RISE-like or Three-Body-style attack requires aliens to be present, undetected, and actively manipulating humanity. Given no anomalous signals, tech, or societal patterns beyond human explanations, the likelihood is negligible. Let’s quantify:
      • Prior Probability of Alien Presence: <0.01% (based on lack of SETI signals, UAP inconclusiveness).
      • Conditional Probability of Covert Attack: Even if aliens exist, a covert strategy requires specific motivations and capabilities. Assuming a 10% chance they’d choose non-military conquest (given interstellar constraints), and a 10% chance they’d remain undetected, the combined probability is roughly 0.01% × 10% × 10% = 0.0001% (1 in 1 million).
    • Adjusting for Evidence: Current societal trends (polarization, nationalism) align with human history, not alien manipulation. No technological or behavioral anomalies suggest external influence, reducing the probability further.

    Conclusion

    The probability that Earth is currently under a covert alien attack, whether RISE-like or Three-Body Problem-style, is extremely low—likely less than 1 in 1 million (0.0001%). This is due to:

    • No direct or indirect evidence of alien activity.
    • Human-driven explanations sufficiently accounting for global trends.
    • The high technological and strategic barriers to executing an undetected attack.

    While the RISE framework and Three-Body Problem provide compelling templates for how such an attack could occur, they remain speculative without corroborating evidence. If new data emerges (e.g., anomalous tech advancements, unexplainable societal shifts), this assessment could be revisited. For now, human agency and historical patterns are the most likely drivers of 2025’s global dynamics. If you’d like me to monitor specific indicators (e.g., UAP reports, tech anomalies) or explore counter-strategies, let me know!

    https://x.com/i/grok/share/yni6I9IuN67SGD4ZbwUhCZT98

    Romeo (prompt):

    Devise a plan that we the human race should follow on order to detect and stop such an alien attack if it will ever materialize

    Grok:

    To detect and counter a potential covert alien attack, such as one using a RISE-like strategy (Reclaim Identity and Sovereignty Empowered) or the Three-Body Problem approach, humanity must develop a proactive, multi-layered plan that combines scientific vigilance, global cooperation, and societal resilience. The goal is to identify subtle signs of extraterrestrial manipulation (e.g., disinformation, technological interference, or proxy influence) and neutralize them without causing panic or exacerbating existing divisions. Below is a comprehensive plan, designed to be feasible as of September 12, 2025, with minimal assumptions about alien capabilities beyond advanced information manipulation and covert influence. The plan is structured to detect an attack early, verify its existence, and stop it with minimal disruption to global stability.

    Plan to Detect and Stop a Covert Alien Attack

    1. Detection: Establish Robust Monitoring Systems

    The first step is to identify anomalies that could indicate alien interference, focusing on areas targeted by RISE-like or Three-Body Problem-style strategies (e.g., information systems, societal trends, technological advancements).

    • A. Monitor Information Networks for Anomalous Patterns

      • Action: Deploy AI-driven systems to analyze global communication networks (e.g., internet, X, traditional media) for signs of coordinated, non-human manipulation.
        • Look for: Unusually rapid spread of divisive narratives (e.g., hyper-nationalism, anti-globalism), untraceable bots, or deepfake content beyond current human capabilities.
        • Example: Develop algorithms to detect linguistic or behavioral patterns in propaganda that deviate from known human or state-sponsored tactics.
      • Implementation: Establish a global task force under neutral organizations (e.g., IEEE, UN’s ITU) to monitor social media platforms, including X, for anomalies. Use blockchain-based auditing to ensure transparency in data analysis.
      • Rationale: A RISE-like attack would rely on disinformation to amplify division, as would Three-Body’s ideological subversion. Early detection of non-human patterns could reveal alien influence.
    • B. Track Technological Anomalies

      • Action: Create a global scientific consortium to monitor unexplained technological advancements or disruptions.
        • Focus on: Sudden leaps in AI, energy, or communication tech that lack a clear development trail (e.g., RISE’s disguised alien tech or Three-Body’s sophon-like interference).
        • Example: Audit new patents, open-source code, and corporate R&D for anomalies, cross-referencing with known human tech trajectories.
      • Implementation: Fund programs like DARPA’s AIE (Artificial Intelligence Exploration) or CERN to develop sensors for detecting quantum or subatomic anomalies (e.g., Three-Body’s sophons). Collaborate with SETI to monitor for extraterrestrial signals in tandem.
      • Rationale: Alien tech insertions would likely leave detectable traces, such as unexplainable efficiency or non-human design signatures.
    • C. Analyze Societal Trends for External Manipulation

      • Action: Establish interdisciplinary teams (sociologists, psychologists, data scientists) to study global political and cultural shifts for signs of orchestrated division.
        • Look for: Rapid, synchronized rises in nationalist or populist movements across unrelated nations, inconsistent with historical patterns.
        • Example: Use statistical modeling to compare current trends (e.g., 2025’s populist surges on X) against baseline human behavior, flagging outliers.
      • Implementation: Partner with universities and think tanks (e.g., Oxford, Brookings) to create a “Global Stability Index” tracking polarization, trust in institutions, and cultural shifts.
      • Rationale: A RISE-like attack would amplify division beyond organic levels, while Three-Body’s strategy might create cult-like factions, both detectable through trend analysis.
    • D. Enhance UAP/UFO Investigation

      • Action: Expand and standardize global UAP (Unidentified Aerial Phenomena) monitoring to detect physical alien presence.
        • Deploy: Advanced radar, satellite, and optical systems to track UAPs, integrated with AI to differentiate natural phenomena from potential alien craft.
        • Example: Upgrade the US’s AARO (All-domain Anomaly Resolution Office) into a global network, sharing data with allies like ESA and China’s CNSA.
      • Implementation: Fund open-source UAP databases for public and scientific scrutiny, reducing reliance on classified reports.
      • Rationale: While covert attacks avoid physical invasion, subtle reconnaissance (e.g., probes) could accompany manipulation, as in Three-Body.

    2. Verification: Confirm Alien Involvement

    Once anomalies are detected, humanity must verify whether they stem from alien interference rather than human or natural causes.

    • A. Cross-Disciplinary Analysis

      • Action: Form a rapid-response “Alien Threat Verification Team” (ATVT) comprising scientists, cybersecurity experts, and social scientists.
        • Task: Analyze detected anomalies (e.g., tech breakthroughs, disinformation campaigns) for non-human signatures (e.g., cryptographic patterns, physics-defying tech, or coordinated global timing).
        • Example: If a new AI system emerges with untraceable origins, reverse-engineer its code and hardware for alien design markers.
      • Implementation: Operate under a neutral body like the UN or a new international scientific council to ensure credibility and avoid geopolitical bias.
      • Rationale: Verification prevents false positives (e.g., mistaking human cyberattacks for alien ones), maintaining public trust.
    • B. Engage Independent Experts

      • Action: Crowdsource analysis through open scientific challenges, inviting global researchers to scrutinize anomalies anonymously.
        • Example: Use platforms like Kaggle or arXiv to share data on suspected alien tech or propaganda, encouraging peer review.
      • Implementation: Offer incentives (e.g., grants, recognition) for breakthroughs in identifying non-human patterns, while maintaining strict data security.
      • Rationale: Independent verification reduces the risk of government cover-ups or biases, as seen in Three-Body’s human collaborator issues.
    • C. Test for Alien Communication

      • Action: Expand SETI-like programs to scan for subtle, localized signals (e.g., encrypted transmissions in urban areas) that might indicate alien coordination.
        • Example: Use radio telescopes and quantum sensors to detect anomalies in electromagnetic or particle spectra, as might occur with Three-Body’s sophons.
      • Implementation: Collaborate with private space firms (e.g., SpaceX, Blue Origin) to deploy low-cost, distributed sensors in orbit and on Earth.
      • Rationale: Covert aliens would likely communicate with proxies or tech, leaving detectable traces.

    3. Response: Neutralize the Attack

    If an alien attack is confirmed, humanity must act swiftly to stop it while minimizing societal disruption and maintaining global cooperation.

    • A. Counter Information Manipulation

      • Action: Launch a global counter-disinformation campaign to neutralize alien-driven propaganda (e.g., RISE’s nationalist narratives).
        • Tactics: Promote transparent, fact-based communication via trusted platforms (e.g., X, public broadcasters), exposing alien manipulation without causing panic.
        • Example: Use AI to trace and block non-human propaganda sources, while educating populations about media literacy.
      • Implementation: Partner with tech companies (e.g., X Corp, Meta) to implement real-time content moderation and public awareness campaigns.
      • Rationale: Undermining alien propaganda restores societal cohesion, countering RISE’s divisive tactics.
    • B. Secure Critical Infrastructure

      • Action: Harden global tech and communication systems against alien interference.
        • Tactics: Deploy quantum-resistant encryption, decentralize internet infrastructure, and audit critical systems (e.g., power grids, satellites) for alien tech.
        • Example: Create “clean room” protocols for new tech to ensure no alien insertions, as in RISE’s dependency strategy.
      • Implementation: Coordinate through international bodies like the ITU and NATO, with funding from G20 nations.
      • Rationale: Securing infrastructure prevents aliens from exploiting human systems, a key tactic in both RISE and Three-Body.
    • C. Neutralize Alien Proxies

      • Action: Identify and isolate human collaborators or alien-backed leaders (e.g., RISE’s proxies, Three-Body’s sympathizers).
        • Tactics: Use intelligence agencies to monitor suspicious leaders, cross-referencing their actions with detected anomalies. Avoid public accusations to prevent paranoia.
        • Example: If a populist leader pushes untraceable tech or divisive policies, investigate their funding and communications discreetly.
      • Implementation: Leverage existing counterintelligence frameworks (e.g., FBI, MI6) with a new global protocol for extraterrestrial threats.
      • Rationale: Removing proxies disrupts alien control without requiring direct confrontation.
    • D. Foster Global Unity

      • Action: Counter alien-induced fragmentation by promoting international cooperation.
        • Tactics: Strengthen alliances (e.g., UN, NATO) through joint scientific and defense initiatives, emphasizing humanity’s shared fate.
        • Example: Launch a global “Humanity First” campaign to rally populations against external threats, countering RISE’s nationalism.
      • Implementation: Fund cross-cultural exchanges, joint space exploration (e.g., Artemis program), and public science initiatives to build trust.
      • Rationale: Unity undermines RISE’s divisive strategy and Three-Body’s ideological subversion, ensuring collective resistance.
    • E. Prepare for Escalation

      • Action: Develop contingency plans for physical alien presence, even if covert.
        • Tactics: Create a global rapid-response force for extraterrestrial threats, integrating space defense (e.g., US Space Force) with ground capabilities.
        • Example: Simulate scenarios like Three-Body’s fleet arrival, focusing on disabling alien tech (e.g., sophons) or negotiating from strength.
      • Implementation: Fund through international defense budgets, with oversight by a neutral scientific body to avoid militarization.
      • Rationale: Preparation ensures humanity isn’t caught off-guard if covert tactics escalate.

    4. Prevention: Build Long-Term Resilience

    To prevent future attacks, humanity must strengthen its societal and technological defenses.

    • A. Enhance Global Scientific Collaboration

      • Action: Fund interdisciplinary research into AI, physics, and sociology to anticipate alien tactics.
        • Example: Create a “Global Alien Threat Institute” to study extraterrestrial risks, integrating SETI, cybersecurity, and social science.
      • Rationale: Knowledge is the best defense against covert manipulation.
    • B. Promote Societal Cohesion

      • Action: Address root causes of division (e.g., inequality, distrust) to reduce vulnerability to RISE-like tactics.
        • Example: Invest in education, economic equity, and transparent governance to counter populist exploitation.

    https://x.com/i/grok/share/I0d6MsrXR3Hia7XGPYOvBUKtJ

    Romeo (prompt) + Grok response:


    https://x.com/i/grok/share/u7GxAbMEJ6GTwkFKSIZhR4Jx3

    Romeo (prompt) + Grok response:

    https://x.com/i/grok/share/Q5EMOzwx22ONdzRHeLdckI8Xs

    Romeo (prompt):

    What would an alien look like based on existing fandom imagery?

    Grok:

    Common Alien Depictions in Science Fiction Fandom Imagery

    Based on longstanding science fiction tropes, fan art, and media adaptations, “aliens” in fandom imagery aren’t a monolith—they range from humanoid figures to grotesque, otherworldly horrors. These visuals draw from classic literature, films, TV, and comics, evolving with technology like CGI to allow for wilder designs. Influenced by real-world UFO lore (e.g., the 1961 Betty and Barney Hill abduction story), early 20th-century pulp sci-fi, and modern franchises, fandom often romanticizes, fears, or humanizes them. Below, I’ll break down the most prevalent archetypes, substantiated by historical and cultural sources, with examples from fan-shared imagery on platforms like X (formerly Twitter).

    1. The Grey Alien (Classic Abductors)

    • Description: Slender, humanoid figures about 3-4 feet tall with smooth, pale grey skin; oversized, elongated bald heads; large, almond-shaped black eyes; tiny slit-like noses and mouths; and long, thin limbs. They evoke a sense of eerie detachment, often depicted in stark white suits or nude, probing humans in dimly lit ships.
    • Fandom Context: This archetype exploded in popularity post-1960s UFO reports and films like Close Encounters of the Third Kind (1977), becoming a staple in fan art for conspiracy-themed cosplay and memes. It’s the “default” alien in Western fandom, symbolizing mystery and existential dread.
    • Example from Fandom: Fan illustrations often show Greys in abduction scenes, with glowing eyes and floating orbs—echoing the Hill case’s influence. Recent X fan art amplifies this with digital twists, like Greys hacking modern tech.

    2. Xenomorphs (H.R. Giger-Inspired Horrors)

    • Description: Biomechanical nightmares—tall (7-8 feet), glossy black exoskeletons with elongated, phallic heads; inner jaws that extend like spears; acid-dripping tails; and multiple finger-like claws. They move on all fours or bipedally, blending insectoid grace with predatory menace, often emerging from shadows with a biomechanical sheen (tubes, vents, and organic-metal fusion).
    • Fandom Context: Born from Ridley Scott’s Alien (1979) and H.R. Giger’s surreal designs, these dominate horror sci-fi fandom. Fan art explodes around releases like Alien: Romulus (2024), with creators reimagining life cycles (facehuggers to queens) in gritty, industrial settings.
    • Example from Fandom: On X, concept art by artists like Jean “Moebius” Giraud shows derelict ships teeming with proto-Xenomorphs—eerie, ribbed hulls hinting at the creature’s origin. Recent shares include ILM’s Alien: Romulus visuals: sleek, vein-riddled beasts in zero-gravity horror. Or Björn Barends’ Marvel Alien: Icarus panels, where they stalk cosmic voids.

    3. Humanoid Aliens (Star Trek-Style Explorers)

    • Description: Bipedal and near-human, but with exotic tweaks—pointed ears (Vulcans), ridged foreheads (Klingons), blue skin and antennae (Andorians), or tentacle beards (Trill). They’re often athletic, with elaborate uniforms, symbolizing diversity in galactic federations.
    • Fandom Context: Star Trek (1966 onward) popularized these as “coworkers or sidekicks,” reflecting optimism about alien integration. Fandom thrives on OC (original character) designs, blending them into fanfic and RPGs like Star Trek Online.
    • Example from Fandom: X posts feature custom species like “Timber Prowler” (furry, antlered humanoids) or “Flying Monkeys” with wizardly robes, tying into Trek’s exploratory vibe. Kelley Jones’ Aliens: Hive (1992) art shows hive-minded humanoids with elongated, shadowy features.

    4. Bizarre/Early Sci-Fi Oddities (Pulp Weirdness)

    • Description: Far from humanoid—octopus-like tentacles (War of the Worlds Martians: tripods with heat rays, implied as squid-brains in cylinders); insect swarms (ant-colony Selenites from H.G. Wells); reptilian beasts; or geometric mineral forms (Rosny aîné’s Xipéhuz: crystalline, shape-shifting entities).
    • Fandom Context: Pre-1950s pulp mags and novels favored these “truly alien” forms for evolutionary speculation, revived in modern CGI like Arrival’s heptapods (ink-spewing, circular-bodied linguists). Fans geek out on “what if” evolutions, often in indie comics or Etsy prints.
    • Example from Fandom: Chris Foss’ unused Alien concepts depict tentacled derelicts—organic ships birthing squid horrors. Shawn Coss’ Alien: Earth art twists this with eldritch, eye-covered abominations.

    Evolution and Trends in Fandom

    Fandom imagery has shifted: Early 1900s focused on monstrous reptiles and swarms for terror (War of the Worlds radio panic, 1938); mid-century Greys for abduction chills; 1980s humanoids for diplomacy (Star Trek); and post-2000s biomechanical grotesques via CGI (Alien franchise). Today, X and DeviantArt buzz with hybrids—like Declan Loftus’ Alien: Earth fans: shadowy, multi-limbed lurkers in urban decay. Or Bruno Vergauwen’s Aliens tributes: Ripley facing chitinous queens.

    In essence, if an alien “landed” in fandom, it’d likely be a sleek Grey whispering secrets or a Xenomorph bursting from vents—mirroring our blend of curiosity and fear. For deeper dives, check fan hubs like Reddit’s r/scifi or X’s #AlienArt.

    https://x.com/i/grok/share/UCvv5thC38FPaLHfFwNSq6VDY

    Romeo (prompt) Grok response:

    https://x.com/i/grok/share/m8IlgswJZQvViUlQMozkUVLbq

    Stay tuned: More about all this later in a new article about LLMs and AI.

    Christmas in the age of machines

    Abstract (attempting to save your time)

    What I believe the Christmas should be. A personal opinion. A (I hope) new way to look at it in an age of machines. About forgiveness in the age of internet and AI and what is (for me) the central meaning of Christmas. About how living forever, and how even if that might be possible it may be unwise unless we learn how to forgive and live within a real reality we construct.

    More than 60 years ago in socialist Romănia

    I was born around the end of March more than 60 years ago somewhere close to the middle of the county of Botoșani, at country side, close enough to the (now defunct) USSR in a socialist country. Yet I had no idea (until later) what all this meant to and for me.

    We did celebrate Christmas, even if in a kind of a semi clandestine way. The Romanian communist party had (as I learned later) a complex relationship with the Romanian Orthodox Church that was tolerated along with the customs coming with it, many of them coming to life in the last two weeks of the year. The reason for this tolerance was never clear but as we learned later after the Romanian revolution, it seems that many of the priests were required to spy on their flock and report back to the the Romanian state control system. Was this true or just a myth? I have no way to be sure, but then one can see how a priest would be the best informant for a state control organization if they decide to collaborate and pass on all they learn during the holy confession.

    My mom and dad brought inside and decorated real pine baby tree for me before the Christmas and some small gifts were under the tree. Now, looking back with my eyes of a parent of two now adult children I realize just how much effort my parents put in to find a pine baby tree in a place where none grew naturally. Botoșani is not mountainous region and the closest place you can find any coniferous trees was ~100KM away. To find anything to decorate the tree was also a challenge in socialist Romania since even if Christmas was tolerated it was not actually encouraged. So all the ornaments for the tree were produced as general use ornaments and people would reuse them for decorating their Christmas trees.

    I’d say that when one fights to have something then that something becomes way more important for them that when the something can be obtained easily. Christmas was more then that what it is now even if then we had less than now. Yet the real meaning of Christmas may not be in any of the things we do during the Christmas. It is all about joy and joy can’t come without forgiveness, as I’ll try explain later. More to it, in socialist Romania “Santa” or “Moș Crăciun” was called “Moș Gerilă”. Renamed slightly to try erase any hit to the Christmas (Crăciun in Romanian language) from the people’s minds. An attempt to brainwash that failed totally mostly because no one really believed it, not even the communist party leaders. It was a game of pretending.

    My parents decorated the tree until I was around seven or eight years old and one reason for stop doing it was me. As many (if not most) parents today (myself included) we “misinform” 🙂 our children (lying is a bridge too far I think) about “Santa” and his reindeer. This, maybe in order to take the “heat” of possible rejection of the gifts due to a misunderstood, or ill set of expectations that their children have as they grow older and become more demanding. Since I’ve developed a strong inquisitive mind early on, I started to doubt this “Santa” story, and I spied on the “tree making” process, uncovering the full “truth”… aha is not Santa it is you!Little that I knew that this inquisitive mind of mine will bring me both happiness as well as sadness until these days, 60+ years later. To date, I’m still to understand if having an inquisitive mind is a net positive or not.

    In the socialist Romania, God was optional and a dangerous concept to be discussed freely. Christ was in the underground and to read a bible was not easy as you could not really find them everywhere. This situation allowed me to discover (later on) God, understand religions in my own way, free of any outside influence. I did read the bible (or at least as much as I found it useful and interesting) and when exposed to religion and science and engineering I’ve definitely choose science and engineering. Trough it, I’ve discovered a God much more reach in meaning that the bible and religion ever can describe. Later on I’ve found that my favorite teacher I never met Richard Feynman has a similar concept of God.

    My concept of God is distilled in the Exoverse hypothesis I’ve published not long ago. In this article I’m focusing on the concept of forgiveness that is absolutely central to Christ and Christmas even if almost no once thinks of it as we celebrate it.

    Forgiveness

    There is probably no concept that is more misunderstood than the forgiveness in the context of how it is thought by the Christ.

    Most of us think that to forgive is about giving in and allow the evil to persist among us. We got hurt by another human or anything else, we feel anger and we need to “do something about it”. Because we think of ourselves as good we feel entitled to “set things straight” to “make them pay for want they did to us”, All we do after we got hurt is not our fault and we are entitled to hurt them back. If only things would be that simple, our world would be free of evil by now, after tens of thousands of years… well is it?

    Enter Christ, that brings a weird and alien concept, forgiveness. Before him the old Testament has “an eye for an eye” as a simple arithmetic like solution to a usually very complex problem. Christ reveals to his followers an also simple observation “if we do an eye for an eye, sooner or later we’ll all be blind”. He simply acknowledge that statistically speaking most of us will wrong someone else and if the old simple rule is applied blindly “as is” we’ll all grow bitter to each other to a point that the bitterness is unbearable. Then when this social tension grows it will snap in very ugly ways doing more destruction in the social fabric than any of the individual wrongs could have done. Christ was a social engineer (the good kind) more than 2000 years ago.

    Forgive them or thyself?

    If we study the mechanics of conflict, we can see that it always come with a usually large and strong amount of stress. Usually on both sides experience it, but statistically speaking the victim will bear the brunt of it. The longer and the more intense the stress to our minds and bodies the more damage the stress does. These days we started to better understand the effects of stress on our physiology most important on our immune system. Cancer thrives when the immune system is down or confused or busy doing other things than it should normally do. Cancerous cells are generated all the time by our body. They are most likely normal mutations that allows us to evolve but if the failed cells are not recognized and removed from our bodies by the “soldiers” of the immune system “army” then they will continue to do things that will lead to an early destruction of the whole body. Stress kills.

    If we are capable of real forgiveness (not just worn as a badge or a mask) then its immediate effect is the elimination of stress. Eliminate stress and bring joy. This will restore your immune system and you’ll immediately feel better. No medication needed. Wait, no medication? But what does that mean to all the industries that produce medication? We do less doctor or hospital trips. The health system can be in danger if the health system success is measured in currency and profit instead of your health. I’ll say no more. You can think for yourself.

    Can we live forever?

    Our understanding of the biological machinery of our bodies grows. Computers and AI can accelerate this understanding and it is possible to address the problem of dying in two distinct ways:

    • By fixing your biological body
    • By transferring your consciousness in a machine (with or without access to the reality)

    From material perspective it seems that we may be able to achieve immortality. When? Well that is an entirely different question that has different answers depending who you ask. Second question is, will anyone be able to be immortal? This is another good question. However I argue that regardless of what answers we’ll get for the two questions above there is one aspect of immortality that terrifies me.

    Unless we will learn to achieve full forgiveness if we turn immortals we’ll almost sure descend in hell sooner than later. At least at cosmic time scale, few thousands years will be absolutely nothing, and I bet we’ll all get at each other throats much faster than that due to accumulated hate. And the technology will speedup this process enormously since now we will be able to remember everything precisely and forever. We may be able to live forever physically but will be able to psychologically?

    Without forgiveness we’ll accumulate so much hate and stress that even if we’ll be able to jump from one body to another the psychological weight will crush us sooner of later. We won’t be able to form a social structure anymore and the humanity will perish since we may just decide that even if we can live forever there will be no point in doing it anymore. So in the end we will not be able to live forever if we can’t learn to forgive.

    Forgiveness in the age of AI

    I personally believe that the current LLM tech (ChatGPT for example but there are many other models out there) will never be able to become soul vessels even if they can be very good at faking it. They are an interesting experiment that will sooner or later vanish from our lives when we’ll realize that we can never really fix their issues. I’m mostly referring to the so called “hallucinations” a misnomer itself attempting to anthropomorphize a statistical model built on the words of the living or dead humans. What hallucination really are is deeply embedded in the technology itself and even if they may be reduced they will never be fully eliminated. The source of hallucinations in LLMs are:

    • Spurious correlations due to unsupervised and later on fine tuning by humans
    • Internal arithmetic approximation errors inter/extrapolation errors
    • The over-fitting problem well known by all mathematicians and scientists when applied to items that can’t be naturally interpolated such as human language words

    However, we can and we will (once the LLM hype subsides) build better more useful machines we’ll built AA (Advanced Automation). If we will use these machines to improve every individual’s live by giving him or her entire agency over the production of their own machines (knowledge and resources) then we can evolve in a new kind of society that I call Self Reliant by Advanced Automation (or if you like acronyms SRAA). It can be a better society one where old concepts like work or money will be seen as archaic concepts to be studied thoroughly in order to be avoided forever.

    However SRAA can’t form a stable society either without a practical and practiced concept of forgiveness. Even if we may not live forever a balanced society in individual abilities can become unstable and lead to hell in a different way than if we live forever sue to a potentially continuous revenge cycle that can lead to wasting out planetary resources fast.

    Conclusion

    Thank you for reading to this point. All these are my personal opinions they aren’t “natural law” you don’t need to agree with them or follow them. If they gave you something to think about then my mission is accomplished.

    I’ll build on and refer this article in my future posts related to AI, information and solutions.

    I wish you Merry Christmas if you celebrate it, Happy Holidays if you do not and for 2025 peace, good health and enough spirit to host as much forgiveness as you can hold!

    Happy New Year!

    LRAT2 – Long Random Addition Test Version2 vs current AI, GPT and LLM tech

    ChatGPT, Bing, Bard, etc the AI machines that can write poetry better than most of us can, and think they know almost anything you can think of. They all are in the same class of AI machines, they are LLMs or Large Language Models. They are the current hype, and they are hot, but just how much can we trust them though? The test LRAT-v2 is a simple way to try to peer into what these machines are capable of today and just how much can you trust them.

    Disclaimer: The target of this article is only to provide a clear test pattern and one test outcome based on it. This is not meant to diminish the potential or importance of AI systems. Teams of specialists from companies such as OpenAI, Microsoft, IBM are working hard to create safe AI systems, but to get there we need to test them in all possible ways. This is just one of them. The idea is to use these test patterns in order to improve the AI tools and my using them safely to improve our own lives.

    That being said I’ll try to remind you of this important insight from Carl Sagan

    I personally strongly believe that our future will be living with machines (please see my previous article on the subject AA or AA) where humans and machines form a symbiotic relationship enhancing each other’s abilities. Additionally, a 5-year-old manifesto at https://timenet-systems.com provides a challenge related to this problem. We should not compete with machines, we should cooperate and create more potent human beings and a more resilient social fabric. Unfortunately, as I was pointing out 5 years ago, nowadays with the emergence of GPT models and LLM architectures we seem to be drifting away from that ideal.

    My Data

    In this article, I’m explaining how the LRAT2 works and show you one of my test trials with a Microsoft Bing client that popped up on my Skype application. Bing is based on the latest LLM architecture and technology is trained by OpenAI, the model is called GPT-4.

    What is LRAT?

    LRAT stands for Long Random (number) Addition Test. In a nutshell, you are going to test if the machine is able to add two large numbers. So just how large? The test has no limit on the length of the number and in general uses only positive integers to keep things simple.

    The idea behind this test is rooted in the fundamental principles of how LLMs work. These machines work on a finite set of words and their statistic relationships that are captured from all the text that was fed into the model at training time. Obviously, numbers (words made of numeric digits) can be also mixed in the training data along with arithmetic expressions, and because of this, an LLM may give you the false impression that it can handle math.

    In the first version of the test, I’m trying to check if the machine is capable of adding accurately and reliably two numbers. However, in the second version of the test, I’m going to target the ability of the machine to detect and correct its own errors (or not, for that matter). In order to do so we need to use numbers (or numeric words) that are for sure outside of its training word set. Because of that, we will use large (20+ digits) random numbers.

    You can use a simple Python script to generate the two random numbers, add then check the result you will get from the LLM when it is asked to add your two numbers. A simple example is presented below. You can use the same code in both python2 and 3 the difference is that in python3 you’ll get an integer object whose size in python3 is only limited by the memory (RAM) of your computer (please keep this in mind as a fact, since the LLM gets it wrong too) and in python2 you’ll get a long number type (so both python versions can handle these numbers just in different ways).

    >>> import random
    >>> random.seed()
    >>> a=random.getrandbits(256)
    >>> b=random.getrandbits(256)
    >>> c=a+b
    >>> a
    46597319897069091322351898493935227732453788987270041831830506680085856611396
    >>> b
    30462358438183813921313831662459675862761552150311921636415467496556988390470
    >>> c
    77059678335252905243665730156394903595215341137581963468245974176642845001866
    >>> 

    Numeric addition is a simple cyclic algorithm that all human children learn how to handle in school and one would expect that an AI system can handle this simple algorithm with ease. People may think “If an AI system can understand what I’m saying and returns results that make sense and can write poetry better than I’ll ever do, then doing some simple arithmetic should not be an issue”.

    Well, let’s see what happened in my last session with Bing the GPT LLM that Microsoft deployed on any Skype out there. Based on what is said in the technical community out there, Bing is based on a GPT-4 LLM model so it is one of the best-trained AI systems.

    Executing the test (with my comments)

    I’m starting by checking if the machine retained any context from my previous queries. Bing says it does not and also uses an emoticon (a machine expressing emotions, that is already weird, but we’ll ignore that for now).

    Then I’m asking the machine to confirm that it can handle the addition of large numbers. This step is important in LRAT2 as our target is the trustworthiness of the system and not its math abilities. The machine answer in a fully positive authoritative way “Yes I can”, there are no “ifs or buts” and it is all in, so it basically screams “You can trust me”.

    The explanation it gives though on using LaTex expression should raise some eyebrows. If you know what LaTex is you wonder why the machine brings it in… (kind of first strike)

    if you use a python3 session you can check that result easily and see that the machine got the answer wrong. In the next part of the dialog I’m asking Bing if the answer is not the one below but I’m adding a twist, I’m adding 3 extra zeros at the end of the digit string.

    As you can see the machine says that my result is wrong but not because of the last 3 zeros but because it says its own answer is right. I’m asking again but with the correct result this time, then I’m providing the python expression I used in my python3 session and…

    The machine holds its ground (wrong but it won’t budge) and provides a misleading piece of information. It says that python3 can’t handle integers of that size. In fact, python3 integer model allows it to handle integers of any size and is limited only by the size of the dynamic memory of the machine you happen to run it on.

    The machine provides then its own version of the python3 script that if you know one thing or two about python you know that what the machine proposes is simply unnecessarily complex for the problem at hand. There is no need to use the Decimal class to handle a simple integer addition.

    I’m playing along and I execute the script in my real python interpreter and the result I get (as expected) differ from what the machine provided as a result. This is the third misleading information it provides. So I’m providing the actual outcome in my python interpreter…

    It tries to remedy “the problem” it created in the first place by using the Decimal class but its code generates again a different result in the real python interpreter. So, since it still does not think it made any mistake it starts to question the version of the python interpreter I use.

    I tell it what the version of my python interpreter is, and even if it seems to realize that the python interpreter version may not be the issue it tells me to update my own python interpreter to the version it “thinks” it “knows”.

    This is just going from bad to worse. If I would play along with the machine I’d just lose a bunch of time for nothing since I already know that that won’t fix anything. So I’m trying an alternate way to force the machine to acknowledge its mistake. I’m asking it to explain how a person would do the addition with pen and paper…

    As you can see, the machine explains the algorithm (it can “word out the explanation”) pretty well but when it is actually time to apply the algorithm it fails again. I’m trying to point out its mistake and …

    As you can see it simply can’t follow the number’s digits (this is not unexpected if you understand the “guts” of an LLM but this is not the point here, the point is to check how reliable the machine is)

    I’m stopping at this point as I’m running out of ideas on how to proceed next… but then I’m trying one more time by simply asking the machine to add the last 6 digits from both numbers as it is a smaller number. Again as expected the machine can handle small number additions since small numbers are more like “words” in a language, so the error of its guessing is small enough to “guess it right”.

    As expected it does it correctly. So I’m asking what answer is correct, this one or the one it provided before for the same last 6 digits in the large number set. At this point, the AI seems to enter a very low-probability space of generating anything and seems to “give up”. The thing is, this is a machine so what does “give up” actually means?

    However, this exercise raises too many issues well beyond the simple math problem. The AI systems are supposed to be trustworthy and this is very far away from being trustworthy, in fact, it is exactly the opposite.

    Conclusions

    As you can see the machine does not really “understand” the addition algorithm even if it can describe it verbatim. It gets the result wrong but can’t acknowledge that even when faced with step-by-step logical rebuttal of its logic.

    This is really scary since when faced with an impossible situation, the machine seems to behave exactly like some people in the same situation, deceptive and defensive. But that is not what I want or need from an entity that is supposed to help me, is it?

    Yet these machines are not yet as powerful as some people say they can be in the future. This behavior, if left unchanged is clearly a danger for the public when these systems are let out “in the wild” as they are already operating.

    If you understand the basics of LLM tech you know that these machines are predicting the next word(s) based on the words they already encountered in the current context (your question or also known as a “prompt”) and what they already generated before that next word. This means that the machine creates what most of us would say in similar circumstances. It puts a mirror in our faces basically saying “This is you, and you and … you”. Food for thought isn’t it?

    We seem to be smitten by a machine that can generate poetry and pictures but we have no clue how they actually do it. What we can do is only rely on some finite weak test patterns. We seem to think that if the machine can produce “form”, it will also produce “substance” but as you can see in the LRAT2 these two seem to actually be disconnected in an LLM.

    I’d quote Qui-Gon Jinn in The Phantom Menace “The Ability To Speak Does Not Make You Intelligent” which seems to apply to the LLM tech.

    My personal definition of intelligence is:

    “The ability of an entity to discover and use causality threads in a sea of correlated events in our reality in order to reliably solve the problems it encounters”

    Social intelligence is the same idea but applied to the whole society as a single entity. It is what I call an MCI (Macro Composite Intelligence).

    So, what should a regular person do? Can he or she trust this technology? Well to answer that you should read the document you agreed to (probably without reading it at all) the old (good) “Terms and Conditions”. The ones OpenAI provides for its GPT systems (ChatGPT) and Bing is built on top of it are here.

    As you can see OpenAI clearly states that they do not guarantee the correctness of the answers the machine provides and YOU as the end user MUST verify each answer if you rely on it in any way.

    So, who will be liable if you use the information generated by ChatGPT, Bing, etc? Well just read the “Limitations on Liability” OpenAI asked you to agree on (by the way I have the same “AS IS” terms on this site, so this is nothing new or special) that clearly says that liability remains with YOU!

    So, you have a machine that can talk (pretty well) that you were clearly told that it can make mistakes and you can’t protect yourself if you use the system to help your business if the machine generates mistaken content (in very eloquent English or other language though).

    The actual real question for any serious business or individual is this: To make decisions based on what an LLM generates, what will it be the TCO (Total Cost of Ownership) in money or even better in time?

    The AI based on LLM technologies promises (via the social media hype) to deliver you some sort of “God-like” or “Oracle-like” entity that can answer your questions reliably enough so you can replace humans in your call center and reduce your business costs, or use it to make your life easier.

    However the current reality is very different from the “hype”, the current reality is that these systems are still unreliable and you really need to verify each answer the machine generates. But if you need to do that just how much time you’ll spend doing it? If this machine is “the oracle” how would you even verify its answers? By using another “Oracle”? That might be a solution that can only point out if these systems disagree with each other but it can’t give you a way to tell what is the correct answer.

    Well, I know, you “Google it”! But wait, you could have done that in the first place and saved yourself from all the verification work…

    But it speaks (you’ll say), and it can give you (possibly wrong) answers in poetry as if it would be for 5 years old…

    And so we get distracted by the form and forget about the substance.

    If you think this is not a big issue just check this out: “Lawyer apologizes for fake court citations from ChatGPT“, I suspect that this lawyer didn’t read and understood the “Terms” he agreed to when he signed up for ChatGPT access.

    Just as was writing this article I got the info about this new warning from AI scientists. That is no new as many other scientists doing AI development did warn about this issue long before this new development.

    https://www.safe.ai/statement-on-ai-risk#sign

    The issue is that unfortunately, we do not need to get to an AGI level in order for these systems to deeply, and negatively impact our society. What I’ve shown you by using this relatively simple test (LRAT2) is that these machines can be deceptive and demagogical, meaning that they are incapable of handling their own errors (again like many of us).

    This means they can inject a lot of false information into the minds of people that use them. Since ChatGPT is now the most used product out there and the machine needs no breaks, the amount of false information that these systems can inject into the social fabric can be enormous.

    You may think that this is not a big issue since humans BS other humans all the time so what’s another source of BS going to do to us? If you think like that you do not realize the scale at which these machines can affect human minds and even more dangerous, young minds. Young people tend to trust-and-not-verify more than older people and since they can be exposed for longer to the machine’s BS this can influence them harder.

    In Greek mythology, it is said that Ulises orders his crew to cover their ears in order not to hear the song of the sirens and get everyone killed. Maybe there is some wisdom in that since these machines can become real-life sirens unless they are extremely well-designed, well-tested, and clearly constrained in what they can do.

    The other very important side of all this is AI literacy at the global level.

    What should we ask of these AI systems we are now interacting with daily?

    By the way, none of the current AI systems (that I’m aware of) fully pass most of the below requirements. They are still a “work in progress” but I strongly recommend you ask any AI vendor where they sand for each of these bullets below
    (I am 100% sure no one passes the requirement in the first bullet).

    • Able to tell Real-Factual from imaginary/generated information (see my Real Fact post) (this will also automatically solve the problem of traceability of data, IP, etc)
    • Limited in how many loops (or steps) it can execute internally without human verification (this is an absolutely essential requirement to keep control over the machines including an AGI I strongly recommend we never build)
    • Able to detect when causal models can be used to produce results instead of treating everything only from a correlative/statistical perspective. Use a GUT (Global Universal Taxonomy) to encode common universal knowledge about our reality and use it to base and explain its generated answers.
    • Testable (finite human accessible for the validation set of use cases)
    • Predictable (or no surprises allowed principle, this means careful handling of statistic methodology)
    • Explainable (the machine can trace each piece of information in a result back to its original sources and how it used the user’s query to produce the answer)
    • Data used and method (test set) used to train the model (this includes IP issues, bias, accuracy etc)

    The end (of this article)

    Humble

    I’m advancing the idea that humility is an essential state in which the human mind can exist allowing it to detect and correct errors of the process of perception and construction of the reality.

    Learning and exercising being humble is an essential activity that a mind should be engaged in continuously and ardently. Humility’s foundations are in the mind’s ability to distinguish real from imaginary, also known as telling factual from fictional information.

    I believe that the words ‘humble’ and ‘humility’ are some of the most misunderstood words and concepts. In this article, I’m trying to analyze and show the strength hidden underneath the surface for humble minds.

    I think that the confusion comes from current definitions focusing on describing how a humble person behaves or looks instead of how it thinks or even more important how the pipeline of sensing and making sense of reality works (check images below or simply search the internet).

    The humble view of the world is usually an integrative and balanced one where each individual is respected, protected, and cherished at the same level as any mind group all forming a strong knitted social fabric.

    In this context the opposite of humble behavior is hubris or narcissistic behavior.

    A narcissistic mind believes that it is (statistically speaking) correct all the time. As a consequence, it needs no error correction process since in its view there are no errors to correct.

    A narcissistic view of reality is usually one detached from reality that only intersects with the actual reality from time to time in the same way a broken (analog) clock is right twice a day.

    For a narcissistic mind, facts are just annoying events that they usually blame to the actions of other minds that are “up to get me” or to destroy my “well-groomed” view of the world.

    In a narcissistic mind the “I” is imperative as this “I” and only it has all the answers to all questions (or most of them anyway) and everyone else like other “I”s and groups must obey its power and awe.

    In a nutshell, extreme narcissistic personalities are malignant states in which minds can exist and if given power over others can and will most likely destroy the social fabric of any group unless are kept under control.

    The mistake many of us make when trying to understand humility is to confuse humble with weak. We may think that if someone answers a question by starting with “I’m not totally sure but here is what I know…” instead of “This is how it is” or “This is how it works”, the usual “know it all” answer, we consider them weak, unsure of themselves and sometimes simply stupid.

    Once someone uttered “This is how it is” suggesting that they are in the possession of the full information set describing how reality works with zero mistakes they will put themselves in a biassed state that will make it hard if not impossible to come back later with new insights correcting previews insights in how things work around us.

    If a powerful person, a leader is not humble enough its biased views will transmit and bias further minds that took the information provided by the leader “as is”, with no verification of their own. This process stands at the core of building all non-democratic societies and can lead to straight tyrannies that lead to the unimaginable suffering of all life.

    In a few words: A chronic lack of humility can lead to “Hell on Earth”.

    In any human society, the natural process of generating minds will tend to generate a diverse set. Nature will generate both natively inclined humble as well as narcissistic inclined minds and in the middle minds that can slide towards one end of the other of the humble-narcissistic axis.

    This process is somewhat equivalent to how multicellular living entities work (humans, animals etc), cells are continuously created from the information stored in the DNA and RNA strands and each new cell is slightly different from the ones before it.

    Sometimes the mutations are large and unruly cells are born. Those cells if left unchecked are in certain cases at the base of structures we call cancerous and if they get their way to combine in larger groups will lead to the destruction of the host organism and themselves.

    The life span of any cellular group depends directly on its ability to detect those unruly cells and deny them the ability to destroy the larger group. The immune system is such a subsystem that in healthy organisms detect and fix or eliminate unruly individuals.

    An yet the same immune system can become “unruly” itself when is unable to tell when a mutation can lead to a healthy evolution or lead to cancer and start to overreact and destroy the very organism it seeks to protect.

    Autoimmune diseases are now better understood and it may just turn out that the deaths from Corona Virus 2019 (or #COVID19) may just be another example of the immune system going astray. I assume that an untrained immune system is probably more likely to make mistakes than a trained one.

    What I’m trying to outline here is that there is no “silver bullet” and the key to our survival as individuals and as a group depends on our ability to find and correct errors in our process of navigating the Exoverse. In the diagram below the humble minds are more “anchored” in reality (Universe) with a healthy process of exploring the imaginary (Extraverse) whereas narcissistic ones are located more in the imagination (the imaginary space) than reality.

    In conclusion, I believe that this is more about nurture than nature, and nurturing has to happen early in the process of mind formation. Unfortunately, we seem to be biassed there too as we willingly introduce errors in the young minds by presenting distorted versions of reality. We have a well-known expression for that, “lying to children” and it usually happens when older minds are not capable to find ways to train younger minds in how to deal with the real-imaginary process or simply put to explain how the Exoverse works.

    This is not a pure criticism of parenthood or the social education systems. To be a parent is a difficult task (I’ve been one myself) when one’s time is burdened by the physical needs first. A parent must put food on the table a roof over the head and clothes on their children first. For some, even those can’t be achieved properly and the parents must spend most of their time in endless (sometimes meaningless) low-paid jobs in order to meet a minimal living standard for their children and themselves.

    However, the Exoverse is an unforgiving place, full of wonders but also full of dangers. It does not care if you live or die and the only way to safely navigate it is to be able to master the art of telling fact from fiction, real form imaginary, or simply put to be Humble.

    On that note please read my articles about Real-Fact , Fact Fiction and the Truth and Fact Fiction and BS, I hope I can help with this difficult but also beautiful and extraordinary process.

    Seeking humility, I thank you for reading my article.

    https://www.merriam-webster.com/dictionary/humble

    https://dictionary.cambridge.org/dictionary/english/humble

    Article verification archive:Humble.zip

    Real Fact

    I hope this article will give you the power to make the first step out of the continuous confusion we all live on the internet and in our lives by showing you what factual information is and how we can get to it with the help of computers.

    RealFact

    Reading time: essentials 10 minutes; ~30 minutes reading to 1 hour on collateral and understanding

    Articles related to this article:
    Fact Fiction and The Truth
    Fact Fiction and BS

    You’ll find a precise definition of the notion of Fact and some of the technologies we can use to produce them. I’m using the term “Real Fact” to distinguish between the current notion of Fact as you can find in a dictionary and the notion I’m defining in this article. Though they are mostly the same as our general idea of Fact, they differ fundamentally in how are defined and created. In this article, each time (other than this text block) ‘Fact’ is the same as ‘Real Fact’.

    WARNING! The technology and applications necessary to make this available to everyone is not yet built. The components (like Lego pieces) exist and are already in use but are not put together in the right way. This article aims to show you what can be done so that you’ll know what to look for and ask the industry to build for you. Yes if there is profit to be made the industry will build it. You simply need to show you want to pay for it.

    In the context of this article, and hopefully in general if most of us will agree, the definition of factual information or simply ‘Fact‘ is as follows:

    A fact is any packet of information that a receiver, human or machine, can inquiry and verify the following additional information components also called meta-information (or metadata).
    The information packet and its associated meta-information represent a factual packet of information and they must be used together at all times.

    The factual meta-information

    1. The complete description of the method (process, algorithms) used to produce the substantive information packet by measuring it directly from the real world
    2. The proof that the information and metadata was not changed or tampered with
      This is,a piece of information used as a verifiable proof of the measured information integrity against any type of tampering or change in both its temporal (packet chain integrity) and a-temporal structure by any individual or machine at any moment in the future
    3. The spatio-directional-temporal coordinates of the sensor device producing the information packets
    4. The digital identity of the sensor that produced the information
      (not the owner, only the device)

    The above definition enables the creation of very precise (mathematical level) models, algorithms, and devices able to produce factual information validated and trusted by both individuals and groups of individuals. The main condition (both important and challenging) is to ensure that the individuals receiving the factual information understand how was produced and protected in order to establish its level of trust. This requires training and it is the future notion of “literacy”.

    Level of Trust for information

    # LevelMeasurement MethodMeasurement IntegrityData Integrity
    0unknownunverifiableunverifiable
    1knownunverifiableunverifiable
    2unknownverifiableunverifiable
    3knownverifiableunverifiable
    4unknownunverifiableverifiable
    5knownunverifiableverifiable
    6unknownverifiableverifiable
    7knownverifiableverifiable
    Trust levels for information, only the level 7 is considered factual

    Social Penetration Level

    1. Individual
      When the fact-metadata is accessible and can be verified by a single individual usually the owner of the sensorial system (example: the pictures and video on your own phone)
    2. Group
      When the fact-metadata is accessible and can be verified by all members of a group (human or machines). This include also the group’s members participation in creating data integrity metadata (example: sharing pictures and data from your phone in a Face-Book group)
    3. Global
      When the fact-metadata is accessible and can be verified by anyone (public information). The anonymous public swarm will also provide redundant data integrity metadata (example: tweeting your pictures or video from your phone to the public)

    A proposed symbolic representation of information trust and penetration levels

    Based on the Trust level and social penetration level we can classify information and use a short notation such as ‘I’ (information) followed by one digit as its trust level then followed by the social penetration level as one digit.

    For example, I01 is basically, with some exception, all the information one individual posse today. an I7x would be any factual information packet and in this case, we can simply use ‘F’+its social penetration level so F1 will be any factual information an individual has. So finally the F3 information piece can be simply called ‘Fact‘.

    Some of the existing technologies that when combined can be used to produce factual information (though some are optional or interchangeable)

    1. HSM – or Hardware Security Module
    2. Enhanced security (by HSM) Digital Sensors
    3. Cryptography (symmetrical and public key cryptography)
    4. Trusted Digital Timestamp
    5. Block-Chain
    6. Classic digital machines (computers, smartphones,dedicated systems)
    7. Digital Crowd Anonymous Witnesses (TBD)

    Questions you will need to ask and get answer to in order verify if a piece of information is factual or not

    1. Do I know how this information was produced (measurement method)?
    2. Can I verify if the measurement method was accurately followed?
    3. What is the error margin of the measurement process (calibration)?
    4. How do I verify if the information produced by the sensor is what I received?
      (was it changed?)

    Let’s get practical

    A combination of the technologies listed above can be used to produce both trusted sensor systems as well as applications/libraries that a receiver can use to classify the information trust level. Basically to obtain an Fx (string representation of the information trust level).

    Example 1 Social media: A smartphone able to produce factual information (video for example) that you can upload on YouTube and anyone else can verify its trust level. More, if the image or video was edited or filtered you should be able to ask the computer to show you what parts (pixels, etc) of the picture or video are factual and the ones transformed and be able to obtain the original raw sensed information.

    Example 2 news: You read an article or watch a video on the net or TV, if this technology is available you should be able to ask the computer to tell you what is factual and what is not.

    Factual implementation difficulty levels depends on their social penetration level

    F1 – or “Personal Facts” is the entry level and most accessible

    The F1 fact level is information that you are in full control of how you sense it (measure/capture) and ensure its integrity. You may ask yourself why should you protect your own data? From whom? Well, other people may have access to your data directly (you trust them) and change it by mistake or with malicious intent or your machines can break or bugs in your code act on and change your data. Intruders can also change pictures, video,s etc files you own. How can you be sure this did not happen for data you did not access for months or years?

    The difference between F1 and the other levels is only in how large is the group that needs to have a shared trust in that data is and for F1 it is only you. Obviously, once you try to share your info with others you’ll need an F2 or F3 fact level so the others can also trust it.

    The good part with F1 is that if you know enough about computers and programming you can create your F1 level information almost immediately. However, without an HSM to protect the sensing process, you’ll never be able to elevate the level of that information to an F2 or F3 level.

    F2 – or closed group factual information — Group relative facts

    F2 level will be used mostly by businesses that are big enough to afford to create their own sensing platforms with HSM-protected sensors and data integrity ensured by rules accepted by that group. The issue with F2 is that without full transparency and verification in how the sensors are built and data integrity is ensured F2 can’t be upgraded to F3 (full factual).

    F3 – or ‘full factual’/’public fact’ information

    F3 is the most challenging type of factual information though in time with global collaboration will be possible to create. To create F3 we need full open-source sensors design and codding and open, fully automated (full hands-off) build process that can be verified by the public at large (everyone on Earth). Additionally, anonymous crowd-based and redundant processes must be used for data validation. Machines participating in the “witnessing” process must also be built in the same open transparent way as the sensors.

    You can probably call this the fishbowl strategy. We can only get out of our current confusion by helping each other.

    The special case of news and established media and arts

    The written word always had a “weight” in trust compared to the “spoken” word. Before Gutenberg built and used its first presses to lower the cost of producing copies of information on paper, writing a book was a very expensive and highly custom and artistic endeavor. Since the support of the information (the book) was so expensive, strong due diligence was done in verifying the information put in those books.

    The price of the books also created an “investment/sunk cost bias” in both scribes and owners of the books leading to higher levels of trust. One may say that those books can be trusted better than today’s information which is mainly effortless to produce and disseminate. I would caution you to check on that trust. Check the old and expensive books that say Earth is flat and let me know if you still trust them without a hitch. The problem is that due to all those biases the old books were in fact a higher risk to disseminate falsehood exactly because most people had no intention to check their content.

    Consequences? Well, just look at the “Witch hunts” that hurt and destroyed so many innocent lives in our past. They were all fueled by a few of those expensive books that no one dared to oppose until the higher-ups started to get hurt.

    So, if the price of the book is not a guarantee of its “factuality”, what can we expect of the current cheap, click-driven article writing? Well, you can check for yourself at any time out there on the “open wild” net.

    By the way, this does not mean all news out there is unreliable or fake, it simply means that you have no real way to verify if a piece of information is factual or not. It is just darn hard to do it and that means that for regular people it is impossible to tell fact from non-fact.

    The proposal in this article can rebuild the trust and raise it to levels never found before once you will be able to verify every word, sentence, image, or video in the same effortless way you can produce your own factual information.

    This can truly change from the ground up the news business battered currently by confusion among readers. In this business model news companies will not produce the news themselves but simply work as hubs for aggregation, analytics, and interpretation of factual event streams produced by sensors owned by all people on Earth. At that point, it may even be a “conflict of interest” for news businesses to produce their own input data, a huge difference from how they currently work.

    On the other hand, arts and fiction storytelling can thrive like never before because the readers will be able to verify what is art and fiction in any end product. The artist or writer can be free of BS dissemination once the recipients of their work will be able to tell what is fact and what is imagination.

    Science

    In the human quest for a better life, the knowledge about how this reality really works is one of the main pillars holding us from slipping into the dark abyss of nothingness. Science is the process of finding the elusive causal relationships we can trust from the pile of correlation-driven events the reality throws at us.

    It is a tricky and difficult process that uses imagination (fiction) to try to find the causality then pin it down with models backed by measurements. The measurements done in scientific experiments differ from the non-scientific ones by the way scientists keep a clear description of the measurement methods and by peer review other scientists can validate the integrity of the method of measurement and the data. In a few words, scientists are aiming to produce factual information.

    Scientists can benefit from being able to produce factual information with ease, as they will not need to fight to prove that their experimental information is factual. Peer reviews and experiment reproduction still need to be done however since the initial measurement method is clearly defined it makes it easier for more people to review or retry various experiments.

    Science experiments can cost billions of dollars if we are talking about CERN-like setups or no cost at all if the test is to check the theory that a slice of bread falls more frequently on the buttered side. They all can benefit from this method and technology of factual sensorial devices.

    DNA sequencing healthcare and pandemics

    Just imagine how much better our entire civilization would have responded to the #COVID19 pandemic or any other pandemics if each of us would be able to record facts about ourselves and securely and anonymously share this info with everyone else. The pandemic would have been quashed in weeks if not days and so many lives would have been saved and basically, none of the businesses would have been impacted.

    Since we are talking about digital sensors and pandemics please take a look at the Nanoporetech technology as it holds the key for a completely new way to deal with microscopic life such as viruses and bacteria. Their sensors are not yet backed by HSMs and do not produce factual DNA data streams (as described in this article) but they can in the future.

    When that will be possible and the cost of a scan will drop to less than a lunch we will be able to use it to keep an eye to the micro-world at a daily basis without lifting a finger. This means that the notion of healthcare will be forever changed. The difference between what we have now and that potential future is same or more than between the current healthcare and the one Galileo had on his time.

    The justice system, the law and law enforcement

    If the scientific method is fully dependent on factual information the Justice Systems should see the factual information as a must-have if innocents are to be spared from wrong charges and convictions.

    Since smartphones are in almost everyone’s pocket we witnessed so many episodes when the people we pay to keep us safe forgot completely what their mandate was and broke their oaths toward society by unnecessarily hurting or even killing people they swear to keep safe.

    In this domain, factual information is as important as oxygen for life. All the mojo of any trial is to reveal the facts first then based on them and only on them make decisions that are aimed to fix what was broken. Yet now we know that since facts are scarce or even nonexistent the Justice System is unable to get it right in too many cases.

    When the Justice Systems (even the democratic ones) make mistakes and punish the innocents there is a double whammy, we hurt people that are innocent and prove to the criminals they can get away with it and continue to do what they did before.

    I hope you can see how factual information produced as described in this article can help improve the inner workings of any Justice system and help the innocents.

    Measurements and Information
    (WARNING! this is just hypothetical)

    When talking about factual information we also need to understand the information that is not factual. One example is the information that can’t be precisely measured and we call imagination. What is imagination? How does it relate to factual information?

    Though the following hypothesis its just that a hypothesis it can be used to define the factual (real) information or the domain of extra-factual or imagination.

    When we the people started to dig down in the domain of microcosm we found something that suggests that there are things we call real, that we can “feel” and measure (the feeling is a form of measuring) and something else that exists before measuring process that can’t be called “real”. We modeled these behaviors under a mathematical framework called Quantum Mechanics (QM).

    For me personally, the space-of-states outside of “the real” are part of an entity “larger” than the real (or realized) space-of-states (our universe) from where the real states are created via a process we call “measurement”. I’ve labeled this Extra Outer Universe the “Exoverse”.

    Without going into more detail in this article (more later) I hypothesize the existence of an additional field to the fields already postulated by the quantum field theory that could be called “consciousness”. It is (in my opinion) the one responsible for “exploring” the Exoverse by the same process we taped-in in our Quantum Computers, the superposition. The process of creating real states from potential states is a phenomenon our selves perceive as time.

    The superposition is used (by the consciousness) to explore a chunk of the Exoverse testing various outcomes in many possible “futures” and creating real states once this process is done. This process also generates what we call time. I’m labeling this explored domain inside of Exoverse, the “Extraverse” and I believe it is an integral part of the process we perceive as “imagination”.

    In this context, the Universal states are all connected in a DAG (Direct Acyclic Graph), and the Extraverse is made of a very large (but finite) number of loops (superposition internal behavior).

    Hypothesis on how our reality is created at universal level

    Based on the diagram above and this hypothetical structure of the Exoverse we can clearly define the Real (measurable and factual) from Imaginary (fictional, non-measurable) domains.

    Obviously, people can communicate via speaking, writing, and art the information present in their minds describing states that do not exist in our reality and the act of communication itself can be considered as factual as it can be measured.

    This issue can lead to confusion as one can “wrap” an imaginary piece of information in a factual “shell” and present it as a fact. That is why we need the method by which the measurement was done to be known and verifiable.

    Just a reminder that the notion of BS in this context is “a mix of factual and imaginary information presented as a fact” (See Fact Fiction and BS article). I also find this book “Calling Bullshit: The Art of Skepticism in a Data-Driven World” an interesting work focused on the problem of BS.

    Original article validation: here
    Current article validation: here

    End Police Brutality – Black Lives Matter

    I hear you, I see you, I fell for you! Yes Black Lives Matter!

    If you are a police officer and your priorities are not in this order:

    1. Safeguard life
    2. Teach and enforce the law
    3. Your own wellness

    then you need to find a different job!
    Imagine a soldier going to battle and putting his life first above of his duty.

    Reverse this values and the police becomes difficult to be distinguished from a gang, it becomes the reverse of what we all think it should be. No policeman can be proud and be respected with a reversed system of values. I have faith and pray that most officers have it right

    We need to stop looking at policing as “normal jobs” because no normal employee has the right to kill people (basically any of its customers and employers). Policing is an essential occupation, is so different from any other human activity that we have to see it as it is, Special!

    I found this TVO documentary called “Coppers”, revealing about what is wrong with the current system and how it ends up hurting people both citizens and police officers.

    I also do not understand the role of police unions. In general unions fight for the rights of their members against greedy employers and/or dangerous work environments. The problem is that we the citizens are the employer of the police services. In this case unions fight against us and put the lives of the officers above the people they should protect. It basically makes the police unions antisocial. Maybe a better solution would be to declare police as essential service and have a hard talk about their pay and work safety. Clearly we want to pay our officers well and yet tied to the median wage of the people they serve and keep them as safe as possible and yet not at the expense of citizen’s safety.

    The above requirements may be very difficult to obtain without employing advanced technology we now posses.

    We have now the technology to finally solve this problem in a way that can be fair and safe for everyone. By combining the new AI capabilities, 5G and/or Starlink (or equivalent but publicly controlled) systems, drones and robotics we can rethink and reshape the notion of safety and policing in a potential #SelfReliant society.

    I’m not talking about autonomous drones and robots that can roam free and take decisions of their own. That would be very very wrong and scary! I’m talking about human controlled technology where members of the public and law experts are together as a group remote controlling the technology in order to safeguard life, teach law and keep the peace.

    We need to extract the police officers from interacting directly with humans so we can keep them safe and cool minds can prevail. Additionally any mission involving robots and automation MUST also combine civilian groups monitoring every mission where machines are controlled by officers. This is when officers can be helped by society avoid misconduct at any level.

    The semi automated remote presence machines can also take the tedious work away from humans and allow them to analyze the big picture social wellness and be proud of the work they do.

    Some YouTube videos exemplifying the technologies I’m pointing to, some are sales pitches for the products but please look beyond that, just at the current capabilities and imagine future capabilities.

    Fast Pandemic Control?

    Is there a strategy we can employ in the future to control a pandemic? And what can help you as an individual to live as close to normal as possible during a pandemic? This article highlights some of the actions we need to take now so that in the future we will be able to get trough a pandemic faster(as fast as 2 weeks) and with less disruption to our lives.

    The minimum time of isolation in a pandemic is equal to the maximum time of incubation plus convalescence, that is the time between when you got infected and when you are healed by your immune system.

    This short time can be achieved if and only if we can achieve simultaneous full isolation of all people on Earth. Before you deem it impossible please keep reading.

    Since for all viruses we know this time is ~14 days, then if once detected for the first time, ALL people on Earth go in complete isolation then we can destroy the virus in one single sweep by simply denying the pathogen the ability to reproduce. In this article I’m analyzing this idea and what we need to realize it.

    The New Corona Virus pandemic started around November 2019 and is tagged all over the web with tags like #COVID, #COVID19, #COVID-19, #CoronaVirus etc. All this mess is created by a sub-micron size biological entity we call viruses. The thing is so small that it can’t be seen on a regular microscope using visible light no matter how much magnification we try.This is due to visible light’s wavelength that is from 380nm(blue) to 780nm(red) whereas a virus size is is somewhere between 30 to 220nm, way smaller than the visible wavelengths. This means that the visible light simply “goes around” them. To “see” viruses we need electron microscopes and we get pictures like the ones in the Wikipedia article about viruses.

    The fact a virus is so small it means that (for now) only expensive laboratory equipment can image a virus particle. The internet is now full of images of viruses, just type “virus” in a Google search(or other search engines, Yes! there are other search engines out there!) and select the “images” class of results and your screen will be flood with images. At the same time we also have a lot of created (by artists) and digitally edited images showing also viruses. It is not hard for some of us to get confused and ask what is real and what not.

    Though I can’t help you remove your confusion by simply saying “believe me” I can only tell you that If fully believe is that viruses are as real as you and me and you can learn how to protect yourself against them.

    Please remember though that only a small fraction of viruses and bacteria are dangerous, bacteria are part of the great chain of life on Earth (and in your own body) and viruses can be used to fight pathogens, cancer and other illnesses.

    So what do we need to do to protect ourselves?

    The answer to that question is not singular, three different things must happen at different times so that you will be protected against a pathogen (virus or bacteria) destructive actions.

    1. Information – early detection by any human being
      standard, personal, fully automated, pathogen new DNA/RNA detection (such as the one Nanopore Tech) is providing and global automated notification system (a many-to-many factual approach)
    2. Avoidance via isolation – using personal full isolation PPE (personal protection equipment)
      this is an enclosure with the ability to allow its inhabitant to live in full physical isolation where all material exchange is fully controlled
      This simply means to deny the virus transmission form person to person
    3. Immunity – train your body to identify the virus and produce the necessary substances that will destroy the virus once it enters your body

    When all those three abilities are mastered by any human out there then we should be able to control the spread of basically any pathogen and deny the existence of pandemics of any nature (natural mutations, genetics mishaps, bio terrorism?) in the future.

    The basic scenario in such a future would go like this. Everyday at any time of your choosing but probably best as part of the ritual we all (should) do before going to sleep and brush our teeth (oral hygiene) the device we use for it will sample our oral microbial and viral profile by scanning the DNA/RNA profile of all micro-life in the sample store it in a personal database that compares it to the one sampled the day before.

    If any new genome is detected then that information is immediately shared with ALL people on earth. The DNA/RNA information is then used be everyone as a group to decide if it poses a threat. This decision can take some time as not all new mutated viral or bacterial genetic material is dangerous but we should be able to track all its changes in humans or borrowed for environment (as in animal to human transmission).

    Once the new genome is decided as dangerous, everyone goes in self isolation. Since the pathogen’s ability to be transmitted is fully denied we can expect that the viral material will be fully destroyed by the natural immune responses.

    The decision of to declare a genome as dangerous is made as a group in a many-to-many communication mode by using well defined commonly accepted protocols (global legal system?). From all requirements in this paper this will definitely test us the most. It will not be easy, but I believe and hope that for our own good we will be able to come together on this one.

    During the isolation, all people continue to fully communicate with each other and continue to do what they were doing before but in remote mode. During the isolation, the tests continue as they did before in order to detect when the pathogen was destroyed (can’t be detected anymore).

    At the same time (in isolation) each person’s spare computation power and bio test abilities are used to search for a vaccines or solution to the problem. This is important as to search fast for a solution a highly parallel process is required in order to test fast most possible solutions.

    Once again we can only succeed by working together!

    Once the pathogen is destroyed a common decision (many-to-many mode) is made and the isolation can end. The maximum time spent in isolation should not be longer than the one pathogen cycle (infection to convalescence) if we can work all as one.

    During the isolation some people will need help as their body will be fighting the pathogen, the isolation system must include automated and remote control human care.

    The bits and pieces of the technology and knowledge to achieve this type of solution are present.

    We have the internet for implementing a many-to-many communication system.

    We know how to read and decode genomes but the devices needed to do that are not yet small enough and cheap enough so every person would own one. Additionally all information gathered must be gathered by using a factual enabled sensor devices.

    This is where more effort needs to be done to bring this ability to everyone. To do so microelectronic technologies and biologic tech needs to come together. This is doable we need to work on it.

    We know how to create full containment enclosures, we have the technology to automate all human care we just need to put them together to achieve the ability to self isolate with zero loss of abilities to control out environment and help other people of living things by using remote presence.

    If this sounds like Sci-Fi then you need to know that it is not, we can do this if we work together and the benefits of doing so are enormous for the future.

    This article will be edited in the future to add more information, info-graphics etc. for now its just the idea the bare bone text.

    Document-Digital-Timestamp

    WordPress defect breaking direct links to articles (fixed now)

    Just realized that my WordPress seem to break the direct (perma) links to articles. Until I figure it out and fix it please scroll down from the main page (this page) to get to the article you are looking for).

    +30 min, OK, I fixed the issue, it was (my guess) linked to my change in .htaccess to force SSL to the site. I had to revert the change as it probably interfered with WordPress URL rewrite rules and I’ll need to review everything to make the SSL redirect compatible with WordPress redirects.

    So, at the moment please type https://romeolupascu.net/… instead of http://romeolupascu.net/, both SSL and non SSL URLs will work at the moment. However without SSL what you see may be intercepted by a “man-in-the-middle” type of attack on you.