ovlrdlegion,
firstly i do not blame you for your skepticism. great claims require great evidence, and until you have verified my computational claims, you have no such evidence. frankly, i had hoped the multiplication would have been easy to verify. given the amount of physics discussions that john titor had with members of the board, i naively assumed that many someones would have easy access to arbitrary-precision software of the type used by mathematicians that requires no programming knowledge. i had not anticipated that such software would be available only to academics or would otherwise be difficult to obtain. until such time as you can verify my factorization of a 500 digit number, i have in effect given you no proof at all, and my promises of proof are just words written with pitchfork on the water. I have confidence that someone will step forward to verify it in time, and when that happens, i imagine the skepticism will tend to evaporate.
fortunately, i do not need to convince everyone and i do not need to be believed by everyone. a few will do, and several individuals have already contacted me to offer their assistance. so ironically, despite the main tool of my attempt to complete my portion of this project having so far failed to achieve results(my access to 500-digit factorization), nonetheless, i seem to be making progress and expect to have success within several weeks. that my expensive qcomputer bits did not contribute to this is of course a source of embarassment for me among my colleagues.
i find it hard to understand your confidence that i have access to your future posts. if you were having a telephone conversation with someone from the year 1970 would you know what they were about to say before they said it? how could you? hindsight is not the same as omniscience. and while i grant you there is, physically, a way we could obtain that information if it were overwhelmingly important, it would require an enormous expenditure of time and energy. would the united states recreate and entire apollo mission merely to convince skeptics that they had landed on the moon. (i exaggerate of course, the delayed choice event wouldnt as hard as putting a man on the moon something that hasn't been done in sixty some years.)
>Why dont you provide us with the GPS co-ordinates of where you are accessing the web ?
>You say you are inserting your device into a segment of cable...exactly where are you doing this...?
i would never ever give out the location of the relay. the project has taken elaborate steps to ensure that its location is hidden and impossible to trace. i would not even give out what region of the country the relay is in. to do so might well mean all our deaths. there is a very high probability that titor or someone like him might be monitoring our communications, and the government obviously would not approve of our activities.
also, it would not be possible for you to construct a better relay. the bottleneck lies in the entanglement, not in the embedding fiber.
cpEndeavor1,
i am impressed with your tracking abilities. we were fortunate to be able to make use of the tor network. i will tell you that is it not the only level of security used to obscure the transmit location, but it provided an added layer of security. in answer to your question, there is no single IPv4 address that the relay holds. it can and does use any ip address that is guaranteed to have to transmit through the embedding fiber. since our usable bandwidth is so miniscule compared to that of the overall fiber, it is inconceivable that we could be noticed that way. incidentally, the ip masquerading abilities of an embedded fiber relay is the primary reason that method won out over the alternative-- creating a relay that accesses the numerous 802.11 broadcasts available. A wireless relay would have been significantly simpler to insert, but a good deal less secure.
as to how a 1998 machine manages all this, i did not mean to give the impression in my earlier post that the only computers involved are pre-war. the thought of having to run the whole project without a contemporary machine is an interesting idea-- i think it could actually be possible except for the insertion mechanics. fortunately however, we do have a modern machine that runs that actual networking, encryptions, error corrections, transmission analysis, and download queueing. My 1998 machine is one of a fleet that is used for end-to-end-- it views the incoming data and initiates the outgoing requests. it, in fact, has no idea that there is a relay at all, and just thinks its on a very narrow lan connection.
this system is used for several reasons-- one is that we have guaranteed compatability, so that's one thing we don't have to worry about. two, i've touched on this before but even though they are old, they are fully-programmable computers. I can't just walk in to a store and buy a programmable computer, anymore than you could walk into a store and buy a cruise missile or a CJD prion sample. The two modern military grade computers used in the project were illegally acquired. And then of course, there's the computer that factored the 500 digit number-- no one on our team even knows where that one physically is. it was harder to get than the microsingularity. i'm something of a celebrity for being awarded the 'use' of it around here, and the object of more than a few laughs for its failure to help contribute to my mission.