The Identification of ‘X’

Ilexa Yardley
The Circular Theory
2 min readMay 31, 2021

--

Cryptography (crypto-technology) exposes (is dependent upon) the conservation of a circle (as the core dynamic in Nature).

Photo by AltumCode on Unsplash

The identification of X assumes X’. This solves all of the problems in cryptology (cryptography) (and technology) (crypto-technology).

X and X’

This is because the conservation of a circle identifies both X and X’. Where it is impossible to have one without the other.

Therefore X and X’ are ‘equal’ and ‘not-equal’ at the ‘same’ (and different) time.

Conservation of a Circle (0 and 1) (X and X’)

Identification of X (and, therefore, X’):

X
X’

X’

Where ‘same’ and ‘different,’ ‘equal’ and ‘not-equal,’ are articulated by the diagram (any X) (every X) (any X’) (every X’). (If X, then X’, is, always, assumed.) (Therefore, if X’, then X).

This solves all of the (current) problems in cryptology. Technology. Psychology. Produces the algorithm for reality.

Conservation of the Circle is the core (and, thus, the only) dynamic in Nature. Where ‘Nature’ is the ‘tokenization’ of Reality (and tokenization (think: ‘reality’) is (no matter the tokenization), always, the conservation of a circle).

Tokenization

X

The hash function is a tokenization of (the redundancy in) (the reality behind and in-front-of) reality. Thus, there is only one (real) token for ‘reality’ (the hyper-cryptic-redundancy in reality) (technically, only one reality):

Amazon.com: Biomemetics: The Tokenization of Reality eBook: Yardley, Ilexa: Kindle Store

Continue with: Universal Tokenization. Cracking the ‘universal’ code: the… | by Ilexa Yardley | The Circular Theory | May, 2021 | Medium

--

--