Tuesday, May 29, 2018

Protocols in the cache

U assume that only a finite set of immediate addressed instructions be allowed in a proper protocol. The instruction set is unable to access kernel space, in the cache.  This can be proven prior to, and the protocol code uniquely checksummed.  A cain of valid protocols collectively secure to fill the cache.

Secret kets are unreadable, except by proven kernel protocols, generally to generate and validate public keys. Notary service called at check point. Now a good swap net can do a near perfect job of at least key management. Telegram does not need full cache control.

You can see that just the simplest of the Intel instruction set opens a dynamically active trading bot over the whole escrow net at thousands of trade per trader per second.

No comments: