The Earth-stein Files
Explore hidden knowledge, forgotten history, and the deepest mysteries of our world — blending relentless curiosity, ancient religions, cutting-edge science, astronomy, and open investigative research to connect the dots and uncover the truth we’re all searching for.
The Earth-stein Files
From Scribes to Satoshi: The War to Secure Truth
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Every sacred text has been corrupted by human hands — typos that changed commandments, lost books like Enoch, da Vinci’s mirror codes, Tesla’s suppressed free energy dreams. Then comes Bitcoin: the first ledger no king, priest, or bank can touch. What if the real battle has always been protecting truth itself?
My first podcast — thank you so much for listening.
Quick transparency: I'm using large language models to help organize research and sources, but every episode is built from my own deep dives and connections.
If you enjoyed it, a like, subscribe, share, or donation would mean the world — every bit keeps this going.
Let's build this together: drop your ideas, sources, and connections in the comments — help us expand the library and uncover more truths.
Keep an open mind, do your own research, and stay curious.
Catch you next time.
The Anxiety Of Losing Truth
Antonio AUm, what really strikes me about the material we are unpacking for you today is the sheer, I mean, almost existential panic humanity seems to have always harbored about losing the truth.
Angel MYeah, that anxiety is definitely the underlying current of everything we are looking at.
Antonio AExactly. So we are jumping right into a deep dive today, a profound exploration of how we preserve our most vital information, how we deliberately obscure our most dangerous knowledge, and honestly, the raw physical energy required to power our grandest visions.
Angel MAnd for you listening, if you have ever stopped to wonder why you implicitly trust the digital records in your bank account, or how a single exhausted typesetter in the 17th century could accidentally rewrite history, you are going to find this fascinating.
Antonio ARight, because we are pulling together threads from some wildly different sources today. We're looking at the chaotic translation history of sacred texts, utilizing meticulous records of Bible translations like the 1611 King James Version and the Book of Enoch.
Angel MWe also have biographical text on the Renaissance cryptography of Leonardo da Vinci and the doomed energy utopias of Nikola Tesla.
Antonio AAnd we are anchoring all of this historical chaos with the economic and technological frameworks laid out in the Bitcoin standard, examining the absolute unyielding rigidity of the blockchain.
Angel MWhat is truly fascinating here is the common thread. It is humanity's constant struggle against the corruption of information and the incredible lengths we go to verify our reality.
Antonio AThe overarching theme connecting these vastly different eras and disciplines is a concept of the ledger.
Angel MRight. And we tend to think of a ledger merely as an accounting book, but broadly speaking, a ledger is any system of record that establishes a shared reality.
Antonio AYes, exactly. For thousands of years, humanity has been locked in an exhaustive struggle against the corruption of these ledgers.
Angel MWhether we are looking at a scribe freezing to death in a monastery while copying a scroll, or a brilliant inventor trying to wire the entire globe for power, or a global network of computers validating a cryptographic hash, the core problem being solved is identical.
Antonio AWe are constantly trying to build systems that ensure the truth survives human error, human greed, and just the inevitable decay of time.
Angel MSo let's start with that vulnerability, the human error. Because there is a massive historical assumption most of us operate under without even realizing it.
Antonio ARight. When we think of ancient texts, particularly foundational religious texts, we tend to visualize them as these static, pristine monoliths, things that were handed down perfectly intact through the ages.
Printing Presses And Fragile Scriptures
Angel MAnd we must make it clear, we are treating these texts strictly as historical documents today. We are looking at them purely as communication ledgers, which reveals an incredibly fragile reality.
Antonio AThey are highly susceptible to the mechanical and biological flaws of the people tasked with maintaining them.
Angel MWe are forced to confront the actual physical processes of preservation. Consider the widely held belief surrounding the 1611 King James version of the Bible.
Antonio AThe cultural assumption is that if you purchase a King James Bible today, or you know, read one on a digital app, you are consuming the exact text finalized by the Translation Committee under King James I in 1611.
Angel MBut the historical reality is that almost no one reads a 1611 text. The standard text in circulation today is actually the 1769 Oxford Revision.
Antonio ARight. Meticulously overhauled by an English clergyman and Hugh Jew scholar named Benjamin Blaney.
Angel MI want to linger on why that 1769 overhaul was even necessary. We have to strip away the reverence for a moment and look at the physical mechanics of a 17th century printing press.
Antonio AYou are dealing with massive, groaning wooden machines. Every single letter, every punctuation mark, every space had to be manually selected from a typecase.
Angel MAnd set into a form backwards. It was exhausting, repetitive, manual labor performed by men working by candlelight, or just dim natural light in incredibly difficult conditions.
Antonio AThe physical environment alone basically guaranteed degradation of the text.
Angel MBut beyond the fatigue of the printers, you also had a complete lack of linguistic standardization. In 1611, English spelling was highly fluid.
Antonio AOh yeah. A typesetter might spell the word sun with an S O N on one page and S O N N E on the next page.
Angel MSimply to justify the margins and make the block of text look physically pleasing to the eye. The word loveth was commonly set with a U instead of a V. Punctuation was entirely at the whim of the printer.
Antonio AAnd as the decades passed, domestic printers in England and foreign printers, primarily over in the Netherlands, began pumping out copies to meet this massive public demand.
Angel MWith every new edition, new typographical errors were introduced. Previous errors were occasionally fixed, but often they were compounded. It was a mechanical degradation of the ledger.
Antonio ASo by the time we get to the 1760s, the universities of Oxford and Cambridge realize they have a full-blown scandal on their hands.
Angel MThe variations across the printed editions are so vast that the integrity of the text is actually in question. This is where Benjamin Blaney steps in.
Antonio AHe spends seven years doing nothing but collating different editions, specifically an original 1611 folio, a 1701 Bishop Lloyd edition, and a 1762 Cambridge edition.
Angel MChecking them against the original Greek and Hebrew texts, and the sheer volume of corrections he had to make is staggering. The resulting 1769 text differs from the 1611 original in roughly 24,000 places.
Antonio ANow it is important to clarify that the vast majority of those were standardizing spelling, updating archaic vocabulary, and fixing punctuation.
Angel MHowever, many were corrections of outright printing blunders that completely altered the meaning of the text. The history of early modern printing is littered with these catastrophic typographical failures.
Antonio AThe most infamous of these is absolutely the Wicked Bible of 1631.
The Wicked Bible – One Dropped Word
Angel MOh, that one is incredible. A prominent London printer named Robert Barker, alongside Martin Lucas, secured the royal patent to print a new edition.
Antonio AThey get to the book of Exodus, specifically the 20th chapter detailing the Ten Commandments. The typesetter makes a single fatal omission.
Angel MHe forgets the word not.
Antonio ARight, in the Seventh Commandment. The resulting text officially and unequivocally commanded the populace, thou shalt commit adultery.
Angel MThe socio-political fallout from that single dropped word was immense. You have to place this in the context of 1630s England, a society deeply sensitive to religious morality and royal authority.
Antonio AKing Charles I was absolutely incensed. George Abbott, the Archbishop of Canterbury, expressed total horror that the holy text was being treated so carelessly by men who were essentially profit-driven tradesmen.
Angel MThe crown ordered all 1,000 copies of the run to be hunted down and burned.
Antonio AAnd the financial ruin for the printers was absolute. Barker and Lucas were hauled before the Star Chamber and hit with a 300-pound fine.
Angel MTo put that in perspective, that was an astronomical sum that effectively bankrupted them. Barker spent years in and out of debtor's prison, eventually dying there.
Antonio AA man's entire life was ruined and an entire print run was destroyed, all because a tired worker dropped three letters from a lead block.
Angel MBut the underlying flaw in the system wasn't fixed because the human element remained. We see this continue well into the 19th century.
Antonio ATake the 1807 Oxford edition, frequently referred to by bibliophiles as the ears-to-ear Bible.
Angel MIn the Gospel of Matthew chapter 13, the text is supposed to read, Who hath ears to hear, let him hear.
Antonio AThe typesetter fumbled the block, resulting in the incredibly nonsensical, who hath ears to ear, let him hear.
Angel MOr the printing of Ezekiel 47.10, where the prophet is describing a vision of a healing river. It is supposed to describe fishermen standing on the banks, saying, Fishers shall stand upon it.
Antonio AInstead, it was printed as fishes shall stand upon it. You just have this wildly surreal, almost Monty Python-esque image of fish standing upright on a riverbank.
Enoch’s Disappearance And Return
Angel MIt is amusing to us now, but it underscores a profound vulnerability. Every single time a human hand touches the ledger, whether to translate, to copy, or to set type, a critical point of failure is introduced.
Antonio AThat vulnerability becomes even more pronounced when we look beyond typographical errors to entire bodies of knowledge that were severed from the broader cultural ledger.
Angel MRight. Misplacing a word is one thing. Misplacing an entire book for over a millennium is another. This brings us to the textual preservation history of the Book of Enoch.
Antonio AThe history of this text reads like an archaeological thriller. For you listening who might be unfamiliar, Enoch is a figure mentioned only fleetingly in the book of Genesis, chapter 5.
Angel MThe text provides a genealogy stating that Enoch lived for 365 years.
Antonio AThat number alone is heavily symbolic, aligning perfectly with the solar year, suggesting an astronomical or calendrical significance.
Angel MBut the truly strange part is his exit. Unlike every other patriarch listed who lived and then he died, the text simply says of Enoch that he walked with God and he was not, for God took him.
Antonio AThat mysterious departure, a translation into the heavens without experiencing physical death, made Enoch an incredibly compelling figure for later Jewish mystics and writers.
Angel MDuring the Second Temple period, roughly between 300 BC and 100 BC, a massive sophisticated body of apocalyptic literature was attributed to him.
Antonio AThe resulting compilation, known as One Enoch, was wildly influential. It shaped early theological concepts of angelology, demonology, the nature of the cosmos, and the final judgment.
Angel MIt is even directly quoted in the canonical epistle of Jude. Yet, despite its massive influence in antiquity, it vanished.
Antonio AIt became a ghost text in Europe and the broader Western world. Scholars knew it existed because they could see the footprint it left behind.
Angel MThey could see other ancient authors arguing about it or quoting it, but no one in Europe possessed a physical copy for over a thousand years.
Antonio AThe disappearance and eventual recovery of Enoch perfectly illustrates that precarious chain of human custody we've been talking about.
Angel MThe original texts were composed in Aramaic and Hebrew. As the political and linguistic landscape of the ancient Near East shifted, the texts were translated into Greek to serve the Hellenized Jewish and early Christian communities.
Antonio ABut paper and parchment degrade. Wars destroy libraries. Shifting theological orthodoxies lead to texts being suppressed or simply no longer copied.
Angel MThe Aramaic, Hebrew, and Greek manuscripts were systematically lost to the elements and human conflict.
Antonio AThe only reason the text survived at all is because of a phenomenal geographical and linguistic isolation.
Angel MThe entire collection was translated into gays, the ancient liturgical language of the Ethiopian Orthodox Tewahedo Church.
Antonio ABecause the Ethiopian Church developed somewhat independently from the Mediterranean and European theological centers, and because they held the Book of Enoch to be fully canonical, their scribes meticulously copied and preserved it for centuries.
Angel MCompletely walled off from the rest of the world. It was an unbroken, isolated chain of scribal dedication.
Antonio AThe West remained entirely ignorant of its survival until the late 18th century.
Angel MIn 1773, a towering Scottish explorer named James Bruce, a man who spent years traversing North Africa and Abyssinia searching for the source of the Blue Nile, managed to secure three copies of the complete Giz manuscript.
Antonio AHe essentially smuggled a lost pillar of ancient literature back to Europe. He presented one copy to the Royal Library in Paris, one to the Bodleian Library at Oxford, and retained the third.
Angel MBut there was always a lingering scholarly skepticism. Because they only had the Ethiopic translation, researchers couldn't be absolutely certain how accurately it reflected the ancient Aramaic originals.
Antonio AThere was always that question: did the Ethiopian scribes alter the text over a thousand years of copying?
Angel MThat debate raged until 1948, which brought one of the most staggering archaeological validations of the 20th century.
Antonio AThe discovery in Qumran K4, part of the broader Dead Sea Scrolls find. Deep in the arid cliffs bordering the Dead Sea, archaeologists uncovered 11 fragmented manuscripts of the Book of Enoch, written in the original Aramaic.
Angel MThe conditions of the cave, the absolute lack of moisture, had preserved what humans could not.
Antonio AThe physical description of those fragments by the scholar J.T. Millick is just haunting. He described finding pieces of white and cream-colored leather heavily blackened in areas from centuries of aging.
Angel MStiff and thick, with the ancient Aramaic ink blurred and faint. They pull these stiff, darkened scraps out of the birth, painstakingly pieced them together, and compare them against the dead's text James Bruce brought out of Ethiopia a century and a half prior.
Antonio AAnd the alignment was undeniable. The Ethiopian scribes had faithfully maintained the ledger.
Angel MThe Aramaic fragments confirm the staggering narrative of the text. The detailed accounts of the watchers, a faction of 200 angels who descended to Mount Hermon, exchanged secret cosmic knowledge with humanity, and bred a race of giant offspring known as the Nephilim.
Antonio ADetailed celestial physics, the layout of the underworld, and these intense apocalyptic visions.
Angel MThe survival of Enoch is a miracle of preservation, but it highlights the exact same fundamental flaw we saw with the King James printing.
Antonio AFor thousands of years, preserving the truth required total reliance on human intermediaries. You had to trust that the scribe in the Ethiopian highlands wasn't going to interject his own theology.
Angel MYou had to trust that the typesetter in London wasn't too exhausted to include the word not. You are perpetually reliant on a trusted third party.
Antonio AAnd that reliance is the crux of the issue. Human nature, biological fatigue, political pressure, or simply the slow degradation of physical materials almost always compromises the system eventually.
Trust Failures And Third Parties
Angel MWhich brings us to a radical question. What if we could build a ledger that completely eliminates the need for human trust? What if we could mathematically enforce truth?
Antonio AOkay, let's unpack this. This is the perfect pivot into the modern digital era and the economic and cryptographic theories laid out in our source, the Bitcoin standard.
Angel MAt first glance, jumping from ancient Aramaic scrolls and 17th century printing presses to digital currency feels like a massive leap. But structurally, it is the exact same conversation.
Antonio AThe creator of Bitcoin, operating under the pseudonym Satoshi Nakamoto, was looking at the modern financial system and recognized the exact same vulnerability as the wicked Bible problem.
Angel MNakamoto's foundational critique was aimed squarely at the concept of the trusted third party. In our modern financial architecture, every transaction requires an intermediary.
Antonio AIf you want to send money to someone across the globe, you cannot do it directly. You must ask a bank to debit your ledger and credit theirs.
Angel MYou have to trust that the bank will not alter the record, that they will not arbitrarily freeze your funds, and that the central banking authority will not debase the underlying currency by endlessly printing more of it.
Antonio ANakamoto sought to engineer a peer-to-peer system that completely removes the human intermediary. The entire ethos of the architecture is 100% verification and 0% trust.
Yap Stones And What Money Is
Angel MBut how do you actually achieve that? If there is no central bank, no master printer, no head scribe to verify the ledger, how do you prevent someone from just copying and pasting digital money?
Antonio ARight, the famous double spending problem. Nakamoto's solution was a mechanism called proof of work. And to really grasp this, we have to understand that Bitcoin is not just software, it is a bridge between the digital world and the physical laws of thermodynamics.
Angel MProof of work is the mechanical engine that makes the Bitcoin ledger immutable. It fundamentally converts massive amounts of physical electricity and computational processing power into a truthful, unforgeable digital record.
Antonio AHere is the mechanics of how it operates. Roughly every 10 minutes, all the pending transactions on the network are bundled together into a data structure called a block.
Angel MIn order to add this block to the official permanent ledger, the blockchain, specialized computers on the network, known as miners, engage in a cryptographic lottery.
Antonio AThey are essentially racing to solve a remarkably complex, mathematically useless puzzle. It is basically guessing a massive string of alphanumeric characters over and over again, trillions of times a second, until a specific mathematical condition is met.
Angel MThe sheer difficulty of this puzzle is the point. It requires specialized hardware running at maximum capacity, drawing immense amounts of electricity. It is physically expensive to find the solution.
Bitcoin’s Trustless Design
Antonio ABut, and this is the genius of the asymmetry, once a miner finds the correct mathematical solution and broadcasts their block to the network, it takes only a fraction of a second and virtually no energy for every other computer on the network to verify that the math is correct.
Angel MI want to use an analogy here to ground this concept for you, one that shifts our understanding of what money actually is. We tend to think of money as a physical object holding value, like a gold coin or a paper bill.
Antonio ABut anthropologists look at it differently. Take the ray stones of Yap Island in Micronesia. The Yapies used massive circular limestone discs as their currency.
Angel MSome of these stones were 12 feet across and weighed tons. When a transaction occurred, say someone bought a piece of land, they didn't physically roll a four-ton stone across the island.
Antonio AThe stones stayed exactly where they were, sometimes even at the bottom of the ocean if a canoe sank while transporting them.
Angel MBecause the physical location of the stone was irrelevant. What mattered was the shared consensus. When a transaction happened, the entire community simply updated their shared mental ledger.
Antonio AThe collective memory of the island agreed. The ownership of that stone is now transferred. The town's consensus was the money.
Angel MThere are no physical coins, there are no digital files that you send to someone.
Antonio AThere is only the public ledger, and everyone's balance is derived from reading that ledger. But instead of relying on the fragile memory of a village or the promises of a central bank, the consensus is secured by cold, hard math.
Angel MAnd that physical security is enforced by economic incentives that make dishonesty catastrophic. Let us imagine a scenario where a miner attempts to cheat the system.
Antonio AThey try to sneak a fraudulent transaction into their block, perhaps trying to spend the same Bitcoin twice.
Angel MThey expend the massive amount of electricity required to solve the proof-of-work puzzle and submit their block to the network.
Antonio AInstantly, the tens of thousands of other nodes on the network run the quick, cheap verification check. They see the fraudulent transaction, they immediately reject the block.
Angel MAnd what is the penalty for the attacker? They have just burned thousands, potentially millions of dollars in physical electricity to solve the puzzle. And because they were caught lying, the network ignores them.
Antonio AThey receive no block reward. They lose everything. The system doesn't need police. The economic cost of attempting to alter the ledger naturally enforces honesty.
Angel MTo successfully rewrite the historical ledger, an attacker would need to execute what is known as a 51% attack. They would need to amass and control more than half of the total computational processing power of the entire global network.
Antonio AThe Bitcoin network currently processes roughly 20 aghetal hashes per second.
Angel MThat number is almost too large for the human brain to contextualize. It means the network is making 20 quintillion mathematical guesses every single second.
Antonio AIt is the equivalent processing power of two trillion standard consumer laptops running simultaneously, dedicated to one single task, ensuring the ledger cannot be altered.
Angel MIt is an impenetrable planetary scale wall of computing power. Why should you care about this? Because it fundamentally changes our relationship with historical records.
Antonio AFor the first time in history, we have moved from a paradigm where truth is fragile and reliant on human honesty to a paradigm where a record of truth exists that no king, printer, or centralized authority can alter or corrupt with a typo. You cannot bribe the Bitcoin network. You cannot politically pressure it.
Angel MYou cannot have a tired typesetter accidentally drop a zero and ruin an account. The ledger is immutable.
Antonio AThat concept of an unalterable, completely public ledger is revolutionary. But it also introduces a massive problem for the individual. If the ledger is public and permanent, what happens when you have thoughts, theories, or transactions that you desperately need to keep private?
Angel MWhen the public record is controlled by an authority you do not trust, or when your knowledge is too dangerous for the mainstream consensus, you don't broadcast it. You hide it.
Ancient Intimacy And Ciphers
Antonio AThe history of cryptography is essentially the history of individuals carving out private sanctuaries within a hostile public ledger. We often associate cryptography with modern warfare, like Enigma machines and military intelligence, but its roots are deeply personal and surprisingly ancient.
Angel MOne of the earliest documented uses of cryptographic theory wasn't for moving troops, it was for protecting intimacy.
Antonio AThis detail from our sources completely blew my mind. If we look at the Kama Sutra, an ancient Indian text estimated to have been compiled between 400 BC and 300 AD, it famously lists 64 arts that are recommended for a refined, high-quality life.
Angel MWe know about the physical arts, the music, the perfumes, but right there in the list is a practice called Makita Vikalpa.
Antonio AThis translates directly to the art of understanding writing in cipher or writing words in a peculiar disguised manner.
Angel MThe text explicitly recommends mastering substitution ciphers as a necessary skill for secret communication between lovers.
Antonio AIt provided a method for individuals to coordinate and express themselves securely, shielding their private affairs from the prying eyes of family members or societal authorities.
Angel MIt was encryption utilized for personal sovereignty. We see similar practices in the Hellenistic world with the Greek magical papyri, where esoteric rituals and spells were written in complex cipher scripts to ensure the uninitiated could not access. The power contained within.
Da Vinci’s Mirror Script And Science
Antonio AHumans have always possessed this desperate need for encrypted spaces, and arguably, no one in human history possessed a mind more in need of encryption than the ultimate Renaissance polymath, Leonardo da Vinci.
Angel MDa Vinci is the supreme case study in individual analog cryptography. He produced thousands of pages of personal notebooks, his codices, documenting an intellect that was sprawling, visionary, and often radically out of step with the dogmas of his era.
Antonio ABut he didn't record his thoughts in a standard format.
Angel MThe most prominent example of his idiosyncratic recording method is the Codex Leicester. Compiled roughly between 1506 and 1510, it is a relatively short manuscript at 72 pages, but its provenance is legendary.
Antonio AIt passed through the hands of Thomas Koch, the Earl of Leicester, later the industrialist Armand Hammer, and is currently owned by Bill Gates. The entire manuscript is written in Italian, but Da Vinci employed a flawless mirror image cursive.
Angel MTo read the Codex Leicester with any fluidity, you physically have to hold a mirror up to the page. The historical debate surrounding this practice has been ongoing for centuries.
Antonio AThe mundane explanation is simply biological convenience. Da Vinci was notoriously left-handed. Writing left to right with wet Renaissance ink meant dragging his hand across the fresh text, smudging his work. Writing right to left in mirror script solved the smudging problem.
Angel MBut many historians argue that this was a deliberate, medieval, cryptographic technique designed to protect his intellectual property.
Antonio AGiven the radically advanced nature of his observations, the desire for obfuscation is highly probable. Da Vinci was operating in a period where the church maintained a strict monopoly on the interpretation of the natural world.
Painting As Physical Cryptography
Angel MIdeas that contradicted established theological narratives could invite accusations of heresy. And the Codex Lester is overflowing with concepts that were literally centuries ahead of their time.
Antonio AIt is effectively a ledger of a man predicting the future of science. He dedicates extensive sections to fluid dynamics, meticulously analyzing the flow of water, eddies, and currents.
Angel MBut the truly dangerous ideas were geological and astronomical. He tackles the presence of fossilized sea creatures found embedded in the rock at the peaks of mountains.
Antonio AThe prevailing belief at the time was the biblical flood. The water rose, deposited the shells, and receded. Da Vinci looks at the structural integrity of the shells and deduces that this is impossible.
Angel MHe realizes that the mountains themselves must have previously been ancient seabeds that were gradually, over unfathomable stretches of time, thrust upward.
Antonio AHe is outlining the foundational concepts of tectonic uplift and deep time hundreds of years before geology existed as a science.
Angel MHis astronomical deductions were equally staggering. He tackles the phenomenon of planet shine. If you observe a crescent moon on a clear night, you can often faintly see the outline of the dark, unlit portion of the lunar sphere.
Public Key Cryptography And Sovereignty
Antonio ADa Vinci correctly theorized that this pale glow is actually sunlight bouncing off the Earth's oceans, projecting out into space and illuminating the dark side of the moon.
Angel MHe deduced Earth shine a full century before the German astronomer Johannes Kepler could scientifically prove it. When you are harboring insights that threaten the established cosmological order, you do not write them in plain text. You build a wall around your ideas.
Antonio ABut da Vinci's compulsion to encrypt didn't stop at his penmanship. It extended deeply into his physical art. This is where the synthesis of science and artistry becomes truly mind-bending.
Angel MModern chemical analysis has recently allowed us to look past the surface of his paintings to understand the exact mechanics of his famous technique, sumato. It is what gives the Mona Lisa her ethereal, deeply ambiguous quality. For centuries, artists tried to replicate the exact depth of his shadows and skin tones, usually falling short.
Antonio AIt wasn't until scientists utilized advanced non-invasive technology like portable X-ray diffraction and chlorescent spectrometry that we understood the microscopic architecture of his canvases.
Angel MThe scientists took these portable X-ray devices right up to the paintings in situ at the Louvre. The scans revealed that Da Vinci wasn't just mixing colors on a palette.
Antonio AHe was applying foundational layers of lead white and then meticulously building up the image using highly specific translucent glazes containing precise ratios of copper and manganese pigments.
Angel MThe physical execution is astounding. The X-ray data showed that some of these individual glaze layers were only one to two micrometers thick.
Antonio ATo contextualize that, a single micrometer is a thousandth of a millimeter. He was painting in layers that are a fraction of the thickness of a human hair.
Angel MHe would apply a microscopic glaze, wait for it to dry completely, and apply another, sometimes building up to 30 distinct layers in the darker shadowed regions of a face.
Antonio AHe was literally engaging in a physical cryptography of light. Because the glazes were translucent, the ambient light in the room would penetrate through the micrometer thick layers, hit the foundational lead white base, and bounce back through the varying pigments.
Angel MHe was constructing optical illusions at a chemical level, manipulating photons to blur the lines of reality in the human eye. He encoded his genius into layers invisible to the naked eye.
Antonio AWhether it is the ancient lovers utilizing Mikito Vacalpa, Da Vinci mirror writing his geological theories, or applying micrometer thick glazes, the impulse is identical, the creation of a secure private reality separate from the public gaze.
Angel MAnd if we draw a line from those early cryptography methods and Da Vinci's encoding to the modern era, we arrive directly at the concept of public key cryptography, which is the ultimate evolution of protecting individual sovereignty and a core part of Bitcoin.
Antonio ARight? Proof of work ensures the public ledger cannot be altered. But public key cryptography ensures that your personal flice of that ledger remains completely under your sovereign control.
Angel MIn the digital age, you hold a private key. This is essentially a mathematically unbreakable secret password. You never show this private key to anyone.
Antonio AInstead, you run it through a mathematical algorithm to generate a public key, which you share with the world.
Angel MThe mathematics ensure a one-way street. Anyone in the world can use your public key to verify a transaction or send you funds, but it is mathematically impossible to reverse engineer the public key to discover the private key.
Antonio AIt is the democratization of absolute secrecy. Da Vinci was forced to rely on visual tricks to hide his thoughts. But today, we use prime numbers and elliptic curves.
Angel MBut to maintain a global network of absolute truth, to power the 20 exheses of computation that keep the digital ledger secure requires an immense constant flow of physical energy.
Antonio AThe security of the system is entirely dependent on electricity. And here is where it gets really interesting. You cannot discuss the sheer power of electricity to change the world without discussing the genius and the tragedy of Nikola Tesla.
Angel MNikola Tesla is perhaps the most poignant historical figure when it comes to understanding the friction between visionary technological architecture and centralized financial power. His life is a masterclass in the dangers of relying on a single note of trust.
Antonio ALet us trace his rise. His trajectory is almost mythical. He was born in 1856 in the village of Smilgen.
Angel MHe possessed a true idetic memory, capable of visualizing complex machinery in three dimensions in his mind, running it and checking for wear and tear before ever sketching a blueprint.
Antonio AAs a boy, he survived a horrific died of cholera, hovering near death, before going on to study engineering. His arrival in America in 1884 sets the stage for the defining technological conflict of the era, the war of currents.
Angel MHe goes to work for Thomas Edison, who is heavily invested in direct current or DC power. The fundamental problem with DC was transmission distance. It could not easily be stepped up to high voltages for long distance travel.
Antonio ATesla immediately recognized the limitations. He had already conceptualized the alternating current or AC induction motor.
Angel MHe understood that by utilizing a polyphase current, he could generate a rotating magnetic field in the motor without the need for mechanical commutators. More importantly, AC could be transmitted over hundreds of miles via thin wires.
Antonio AThe friction between Edison's DC and Tesla's AC was inevitable. Tesla eventually resigns in disgust, ending up digging ditches for a period before his patents for the AC motor catch the attention of George Westinghouse.
Angel MThe ultimate vindication for Tesla's architecture happens at the 1893 World's Columbian Exposition in Chicago. Westinghouse and Tesla proved the safety of polyphase AC power, underbidding General Electric to illuminate the massive fairgrounds.
Antonio AWhen they push the button, a hundred thousand incandescent lamps flood the neoclassical white city with brilliant light. They set up an exhibit hall to display the Egg of Columbus, a solid copper egg that would spin so fast in a rotating magnetic field that it stood up on its major axis.
Angel MThe exposition proved to the world that EC was the future. That victory cemented the foundation of the modern electrical grid, but Tesla's ambition was not constrained by copper wires.
Antonio AHe viewed the grid as merely a transitional technology. His ultimate ambition was far grander, and it is precisely here that we see the fatal flaw of his operational model. Tesla envisioned a world of entirely wireless power and global communication.
Angel MThis ambition culminates in the Wardencliffe Tower Project. In 1901, Tesla approaches JP Morgan, the ultimate centralized financier, and secures$150,000 in funding.
Antonio ATesla begins constructing an absolute monolith of eccentric engineering on Long Island, an overhead wooden tower rising 186 feet into the sky.
Angel MBut the true scope lay underground. They excavated a shaft 120 feet deep directly beneath the tower.
Antonio AAnd from the bottom of that shaft, he drove 16 iron pipes another 300 feet deeper into the earth. The goal was to have a grip on the earth so the whole of this globe can quiver.
Angel MHe wanted to create standing resonant waves, a future where anyone on the planet could tap into limitless wireless electrical power and communication.
Antonio ABut the entire utopian dream possessed a single massive point of reliance on a trusted third party. JP Morgan.
Angel MWhen Tesla's rival, Gugliamo Marconi, successfully sent a simpler radio signal first, Morgan flatly refused to provide more funding for Tesla's grander vision.
Antonio AThere's that famous report of Morgan considering the prospect of wireless, globally available free energy and asking, where do we put the meter?
Angel MIf you can't meters, you can't monetize it. When the central authority withdrew support, the project collapsed. The tower was eventually demolished for scrap metal in 1917 to satisfy Tesla's mounting debts.
Antonio AThe fall of this centralized visionary is profoundly tragic. The latter half of his life was spent living in hotels like the Waldorf Astoria and the New Yorker, leaving a trail of unpaid bills.
Angel MPitching increasingly desperate concepts like a death ray called Teleforce to the War Department in 1934.
Antonio AAnd spending$2,000 nursing a broken-winged white pigeon that he developed an intense attachment to, he ultimately died entirely alone.
Angel MTesla's fate is the ultimate cautionary tale regarding the architecture of power. He possessed the intellect to alter human history, but because his system required the ongoing permission of a centralized, trusted third party, the plug could be pulled.
Antonio AIf we contrast Tesla's fate with the decentralized architecture of Bitcoin, the philosophical shift becomes intensely clear.
Angel MExactly. I want to bring in a quote from our sources by Ralph Merkel, a pioneer in cryptography. He described Bitcoin saying, it is the first example of a new form of life. It lives because it can pay people to keep it alive.
Antonio ABecause Bitcoin relies on massive decentralized processing power, the 20 eggs ashes we talked about, which is equivalent to two trillion laptops, instead of one central backer like JP Morgan, it cannot be defunded or shut down.
Angel MThere is no CEO to fire. There is no board of directors to withdraw funding. The incentive structure is self-sustaining.
Antonio AAnd this decentralized architecture creates a system that is incredibly rigid. And in the world of cryptographic ledgers, that unalterable status quo bias is its greatest strength. To understand why, we just look at centralized failure in crypto.
Angel MThe perfect example is the DAO hack on the Ethereum network. The DAO was a decentralized venture capital fund that amassed roughly$150 million.
Antonio AThe ethos was code is law. But there was a flaw in the code, and an attacker diverted over$50 million.
Angel MBecause Ethereum possesses a more centralized leadership structure, they faced a choice: accept the code as written or rewrite the history of the ledger to erase the hack and return the funds.
Antonio AThey chose to intervene and alter the ledger. On a human level, you want to return stolen money. But architecturally, it proved that if the human leadership agrees, the history of the ledger can be rewritten.
Angel MIt reintroduced the trusted third party. Bitcoin's architecture aggressively rejects this flexibility. The physics of the proof-of-work engines simply continue validating blocks indiscriminately. It only possesses mathematical truth.
Antonio ASo as we wrap up, we have traveled a massive arc today, from the error-riddled printing presses of the 1611 King James Version and the deeply buried Aramaic scrolls of Enoch.
Angel MThrough Da Vinci's mirror scripts and the lover's codes of the Kama Sutra.
Antonio AAll the way to Tesla's doomed Wardencliffe Tower and the electricity-guzzling, unhackable truth machine of Bitcoin.
Angel MIt leaves you with a final concept to mull over. For centuries, humans relied on brilliant individuals, translators, genius inventors, and wealthy financiers to guard our knowledge and power our future. And almost always, human nature compromised the system.
Antonio AIf Bitcoin's true innovation is simply removing the need for human trust by replacing it with massive, unfeeling computational physics, what happens when we apply that trustless philosophy not just to our money, but to our historical records?
Angel MOr to our scientific discoveries and our social contracts, like voting?
Antonio AWill future generations look back at our centralized, trust based internet the same way we look at the air riddled 1631 Wicked Bible? I want to thank you so much for joining us on this deep dive. As you navigate the world, we encourage you to question the ledgers you trust in your own life.
Podcasts we love
Check out these other fine podcasts recommended by us, not an algorithm.
Ancient Aliens
PodcastOne
Digging Up Ancient Aliens
Fredrik Trusohamn
The Joe Rogan Experience
Joe Rogan
Lex Fridman Podcast
Lex Fridman
Inspired Evolution with Amrit Sandhu 🙏🏻
Amrit Sandhu
Duncan Trussell's Podcast
Duncan Trussell
Melchizedek Chronicles
Dr. Kenny Williamson
Melchizedek Chronicles
Kenny Williamson
The One Lost Sheep
SevenAudio
The Flat Earth Reality
Robert Lick
The Flat Earth Files
Delmarva Studios