The Identification of ‘X’
Cryptography (crypto-technology) exposes (is dependent upon) the conservation of a circle (as the core dynamic in Nature).
The identification of X assumes X’. This solves all of the problems in cryptology (cryptography) (and technology) (crypto-technology).
X and X’
This is because the conservation of a circle identifies both X and X’. Where it is impossible to have one without the other.
Therefore X and X’ are ‘equal’ and ‘not-equal’ at the ‘same’ (and different) time.
Identification of X (and, therefore, X’):
X’
Where ‘same’ and ‘different,’ ‘equal’ and ‘not-equal,’ are articulated by the diagram (any X) (every X) (any X’) (every X’). (If X, then X’, is, always, assumed.) (Therefore, if X’, then X).
This solves all of the (current) problems in cryptology. Technology. Psychology. Produces the algorithm for reality.
Conservation of the Circle is the core (and, thus, the only) dynamic in Nature. Where ‘Nature’ is the ‘tokenization’ of Reality (and tokenization (think: ‘reality’) is (no matter the tokenization), always, the conservation of a circle).
X
The hash function is a tokenization of (the redundancy in) (the reality behind and in-front-of) reality. Thus, there is only one (real) token for ‘reality’ (the hyper-cryptic-redundancy in reality) (technically, only one reality):
Continue with: Universal Tokenization. Cracking the ‘universal’ code: the… | by Ilexa Yardley | The Circular Theory | May, 2021 | Medium