TheDinarian
News • Business • Investing & Finance
The Society for Worldwide Interbank Financial Telecommunication (Swift)
What is it actually?
November 22, 2023
post photo preview

This is a great amount of information and history regarding S.W.I.F.T, and sums up why THEY are moving to the ISO standards worldwide. 

Knowledge Is Power ~D

The Society for Worldwide Interbank Financial Telecommunication (Swift), legally S.W.I.F.T. SC, is a Belgian cooperative society providing services related to the execution of financial transactions and payments between certain banks worldwide. Its principal function is to serve as the main messaging network through which international payments are initiated.[2] It also sells software and services to financial institutions, mostly for use on its proprietary "SWIFTNet", and assigns ISO 9362 Business Identifier Codes (BICs), popularly known as "Swift codes".

The Swift messaging network is a component of the global payments system.[3] Swift acts as a carrier of the "messages containing the payment instructions between financial institutions involved in a transaction".[4][5] However, the organisation does not manage accounts on behalf of individuals or financial institutions, and it does not hold funds from third parties.[6] It also does not perform clearing or settlement functions.[7][5] After a payment has been initiated, it must be settled through a payment system, such as TARGET2 in Europe.[8] In the context of cross-border transactions, this step often takes place through correspondent banking accounts that financial institutions have with each other.[4]

As of 2018, around half of all high-value cross-border payments worldwide used the Swift network,[9] and in 2015, Swift linked more than 11,000 financial institutions in over 200 countries and territories, who were exchanging an average of over 32 million messages per day (compared to an average of 2.4 million daily messages in 1995).[10]

Though widely utilised, Swift has been criticised for its inefficiency. In 2018, the London-based Financial Times noted that transfers frequently "pass through multiple banks before reaching their final destination, making them time-consuming, costly and lacking transparency on how much money will arrive at the other end".[9] Swift has since introduced an improved service called "Global Payments Innovation" (GPI), claiming it was adopted by 165 banks and was completing half its payments within 30 minutes.[9] The new standard which included Swift Go was supposed to be utilised in receiving and transferring low-value international payments. One of the significant changes was the transaction amount, which would not differ from start to the end. However, as of 2023, uptake was mixed. For instance, Alisherov Eraj, Alif Bank Treasury Department Swift Transfers & Banking Relationship Expert in the Republic of Tajikistan, describes that the leading cause for the late Swift Go adoption in Tajikistan was the Core Banking System itself. To connect to Swift Go, he adds, banking system interfaces needed to be upgraded and integrate with their software to be fully compatible, this hindered many banks from adopting the technology earlier.

As a cooperative society under Belgian law, Swift is owned by its member financial institutions. It is headquartered in La Hulpe, Belgium, near Brussels; its main building was designed by Ricardo Bofill Taller de Arquitectura and completed in 1989.[11] The chairman of Swift is Graeme Munro of United Kingdom,[12] and its CEO is Javier Pérez-Tasso of Spain.[13] Swift hosts an annual conference, called Sibos, specifically aimed at the financial services industry.[14]

History[edit]

SWIFT was founded in Brussels on 3 May 1973 under the leadership of its inaugural Swedish CEO, Carl Reuterskiöld (1973–1989), a Wallenberg-associate, and was supported by 239 banks in 15 countries.[15] Before its establishment, international financial transactions were communicated over Telex, a public system involving manual writing and reading of messages.[16] It was set up out of fear of what might happen if a single private and fully American entity controlled global financial flows – which before was First National City Bank (FNCB) of New York – later Citibank. In response to FNCB's protocol, FNCB's competitors in the US and Europe pushed an alternative "messaging system that could replace the public providers and speed up the payment process".[17] SWIFT started to establish common standards for financial transactions and a shared data processing system and worldwide communications network designed by Logica and developed by the Burroughs Corporation.[18] Fundamental operating procedures and rules for liability were established in 1975, and the first message was sent in 1977. SWIFT's first international (non-European) operations centre was inaugurated by Governor John N. Dalton of Virginia in 1979.[19]

Standards[edit]

SWIFT has become the industry standard for syntax in financial messages. Messages formatted to SWIFT standards can be read and processed by many well-known financial processing systems, whether or not the message travelled over the SWIFT network. SWIFT cooperates with international organizations for defining standards for message format and content. SWIFT is also Registration authority (RA) for the following ISO standards: [20]

  • ISO 9362: 1994 Banking – Banking telecommunication messages – Bank identifier codes
  • ISO 10383: 2003 Securities and related financial instruments – Codes for exchanges and market identification (MIC)
  • ISO 13616: 2003 IBAN Registry
  • ISO 15022: 1999 Securities – Scheme for messages (Data Field Dictionary) (replaces ISO 7775)
  • ISO 20022-1: 2004 and ISO 20022-2:2007 Financial services – Universal Financial Industry message scheme

In RFC 3615 urn:swift: was defined as Uniform Resource Names (URNs) for SWIFT FIN.[21]

Operations centres[edit]

The SWIFT secure messaging network is run from three data centres, located in the United States, the Netherlands, and Switzerland. These centres share information in near real-time. In case of a failure in one of the data centres, another is able to handle the traffic of the complete network(Sound familiar? "Nodes"). SWIFT uses submarine communications cables to transmit its data.[22]

Shortly after opening its third data centre in Switzerland in 2009,[23] SWIFT introduced new distributed architecture with two messaging zones, European and Trans-Atlantic, so data from European SWIFT members no longer mirrored the U.S. data centre.[24] European zone messages are stored in the Netherlands and in part of the Swiss operating centre; Trans-Atlantic zone messages are stored in the United States and in another part of the Swiss operating centre that is segregated from the European zone messages. Countries outside of Europe were by default allocated to the Trans-Atlantic zone, but could choose to have their messages stored in the European zone.

Data centres
SNSWIFT data centresType
1ZoeterwoudeNetherlandsOPC (Operating Centre)
2Culpeper, VirginiaUnited StatesOPC (Operating Centre)
3DiessenhofenSwitzerland[25]OPC (Operating Centre)
4Hong KongCommand and control

 

SWIFTNet network

SWIFT moved to its current IP network infrastructure, known as SWIFTNet, from 2001 to 2005,[26] providing a total replacement of the previous X.25 infrastructure. The process involved the development of new protocols that facilitate efficient messaging, using existing and new message standards. The adopted technology chosen to develop the protocols was XML, where it now provides a wrapper around all messages legacy or contemporary. The communication protocols can be broken down into:

InterAct

  • SWIFTNet InterAct Realtime
  • SWIFTNet InterAct Store and Forward

FileAct

  • SWIFTNet FileAct Realtime
  • SWIFTNet FileAct Store and Forward

Browse

  • SWIFTNet Browse

 

Architecture

SWIFT provides a centralized store-and-forward mechanism, with some transaction management. For bank A to send a message to bank B with a copy or authorization involving institution C, it formats the message according to standards and securely sends it to SWIFT. SWIFT guarantees its secure and reliable delivery to B after the appropriate action by C. SWIFT guarantees are based primarily on high redundancy of hardware, software, and people.

 

SWIFTNet Phase 2

During 2007 and 2008, the entire SWIFT network migrated its infrastructure to a new protocol called SWIFTNet Phase 2. The main difference between Phase 2 and the former arrangement is that Phase 2 requires banks connecting to the network to use a Relationship Management Application (RMA) instead of the former bilateral key exchange (BKE) system. According to SWIFT's public information database on the subject, RMA software should eventually prove more secure and easier to keep up-to-date; however, converting to the RMA system meant that thousands of banks around the world had to update their international payments systems to comply with the new standards. RMA completely replaced BKE on 1 January 2009.

 

Products and interfaces

SWIFT means several things in the financial world:

  1. secure network for transmitting messages between financial institutions;
  2. a set of syntax standards for financial messages (for transmission over SWIFTNet or any other network)
  3. a set of connection software and services allowing financial institutions to transmit messages over SWIFT network.

Under 3 above, SWIFT provides turn-key solutions for members, consisting of linkage clients to facilitate connectivity to the SWIFT network and CBTs or "computer based terminals" which members use to manage the delivery and receipt of their messages. Some of the more well-known interfaces and CBTs provided to their members are:

  • SWIFTNet Link (SNL) software which is installed on the SWIFT customer's site and opens a connection to SWIFTNet. Other applications can only communicate with SWIFTNet through the SNL.
  • Alliance Gateway (SAG) software with interfaces (e.g., RAHA = Remote Access Host Adapter), allowing other software products to use the SNL to connect to SWIFTNet
  • Alliance WebStation (SAB) desktop interface for SWIFT Alliance Gateway with several usage options:
    1. administrative access to the SAG
    2. direct connection SWIFTNet by the SAG, to administrate SWIFT Certificates
    3. so-called Browse connection to SWIFTNet (also by SAG) to use additional services, for example Target2
  • Alliance Access (SAA) and Alliance Messaging Hub (AMH) are the main messaging software applications by SWIFT, which allow message creation for FIN messages, routing and monitoring for FIN and MX messages. The main interfaces are FTA (files transfer automated, not FTP) and MQSA, a WebSphere MQ interface.
  • The Alliance Workstation (SAW) is the desktop software for administration, monitoring and FIN message creation. Since Alliance Access is not yet capable of creating MX messages, Alliance Messenger (SAM) has to be used for this purpose.
  • Alliance Web Platform (SWP) as new thin-client desktop interface provided as an alternative to existing Alliance WebStation, Alliance Workstation (soon)[when?] and Alliance Messenger.
  • Alliance Integrator built on Oracle's Java Caps which enables customer's back office applications to connect to Alliance Access or Alliance Entry.
  • Alliance Lite2 is a secure and reliable, cloud-based way to connect to the SWIFT network which is a light version of Alliance Access specifically targeting customers with low volume of traffic.

 

Services

There are four key areas that SWIFT services fall under in the financial marketplace: securitiestreasury & derivatives, trade services. and payments-and-cash management.

Securities

  • SWIFTNet FIX (obsolete)
  • SWIFTNet Data Distribution
  • SWIFTNet Funds
  • SWIFTNet Accord for Securities (end of life October 2017)[27]

Treasury and derivatives

  • SWIFTNet Accord for Treasury (end of life October 2017)[27]
  • SWIFTNet Affirmations
  • SWIFTNet CLS Third Party Service

Cash management

  • SWIFTNet Bulk Payments
  • SWIFTNet Cash Reporting
  • SWIFTNet Exceptions and Investigations

Trade services

 

SWIFTREF

Swift Ref, the global payment reference data utility, is SWIFT's unique reference data service. Swift Ref sources data direct from data originators, including central banks, code issuers and banks making it easy for issuers and originators to maintain data regularly and thoroughly. SWIFTRef constantly validates and cross-checks data across the different data sets.[28]

SWIFTNet Mail[edit]

SWIFT offers a secure person-to-person messaging service, SWIFTNet Mail, which went live on 16 May 2007.[29] SWIFT clients can configure their existing email infrastructure to pass email messages through the highly secure and reliable SWIFTNet network instead of the open Internet. SWIFTNet Mail is intended for the secure transfer of sensitive business documents, such as invoices, contracts and signatories, and is designed to replace existing telex and courier services, as well as the transmission of security-sensitive data over the open Internet. Seven financial institutions, including HSBCFirstRand BankClearstreamDnB NORNedbank, and Standard Bank of South Africa, as well as SWIFT piloted the service.[30]

 

U.S. government involvement

Terrorist Finance Tracking Program[edit]

A series of articles published on 23 June 2006 in The New York TimesThe Wall Street Journal, and the Los Angeles Times revealed a program, named the Terrorist Finance Tracking Program, which the US Treasury DepartmentCentral Intelligence Agency (CIA), and other United States governmental agencies initiated after the 11 September attacks to gain access to the SWIFT transaction database.[31]

After the publication of these articles, SWIFT quickly came under pressure for compromising the data privacy of its customers by allowing governments to gain access to sensitive personal information. In September 2006, the Belgian government declared that these SWIFT dealings with American governmental authorities were a breach of Belgian and European privacy laws.

In response, and to satisfy members' concerns about privacy, SWIFT began a process of improving its architecture by implementing a distributed architecture with a two-zone model for storing messages (see Operations centres).

Concurrently, the European Union negotiated an agreement with the United States government to permit the transfer of intra-EU SWIFT transaction information to the United States under certain circumstances. Because of concerns about its potential contents, the European Parliament adopted a position statement in September 2009, demanding to see the full text of the agreement and asking that it be fully compliant with EU privacy legislation, with oversight mechanisms emplaced to ensure that all data requests were handled appropriately.[32] An interim agreement was signed without European Parliamentary approval by the European Council on 30 November 2009,[33] the day before the Lisbon Treatywhich would have prohibited such an agreement from being signed under the terms of the codecision procedure—formally came into effect. While the interim agreement was scheduled to come into effect on 1 January 2010, the text of the agreement was classified as "EU Restricted" until translations could be provided in all EU languages and published on 25 January 2010.

On 11 February 2010, the European Parliament decided to reject the interim agreement between the EU and the US by 378 to 196 votes.[34][35] One week earlier, the parliament's civil liberties committee had already rejected the deal, citing legal reservations.[36]

In March 2011, it was reported that two mechanisms of data protection had failedEUROPOL released a report complaining that requests for information from the US had been too vague (making it impossible to make judgments on validity)[37] and that the guaranteed right for European citizens to know whether their information had been accessed by US authorities had not been put into practice.[37]

 

Monitoring by the NSA

Der Spiegel reported in September 2013 that the National Security Agency (NSA) widely monitors banking transactions via SWIFT, as well as credit card transactions.[38] The NSA intercepted and retained data from the SWIFT network used by thousands of banks to securely send transaction information. SWIFT was named as a "target", according to documents leaked by Edward Snowden. The documents revealed that the NSA spied on SWIFT using a variety of methods, including reading "SWIFT printer traffic from numerous banks".[38] In April 2017, a group known as the Shadow Brokers released files allegedly from the NSA which indicate that the agency monitored financial transactions made through SWIFT.[39][40]

 

Use in sanctions:

 

Belarus

The European Union issued the first set of sanctions against Belarus - the first was introduced on 27 February 2022, which banned certain categories of Belarusian items in the EU, including timber, steel, mineral fuels and tobacco.[41] After the Lithuanian prime minister proposed disconnecting Belarus from SWIFT,[42] the European Union, which does not recognise Lukashenko as the legitimate President of Belarus, started to plan an extension of the sanctions already issued against Russian entities and top officials to its ally.[43]

 

Iran

In January 2012, the advocacy group United Against Nuclear Iran (UANI) implemented a campaign calling on SWIFT to end all relations with Iran's banking system, including the Central Bank of Iran. UANI asserted that Iran's membership in SWIFT violated US and EU financial sanctions against Iran as well as SWIFT's own corporate rules.[44]

Consequently, in February 2012, the U.S. Senate Banking Committee unanimously approved sanctions against SWIFT aimed at pressuring it to terminate its ties with blacklisted Iranian banks. Expelling Iranian banks from SWIFT would potentially deny Iran access to billions of dollars in revenue using SWIFT but not from using IVTSMark Wallace, president of UANI, praised the Senate Banking Committee.[45]

Initially SWIFT denied that it was acting illegally,[45] but later[when?] said that "it is working with U.S. and European governments to address their concerns that its financial services are being used by Iran to avoid sanctions and conduct illicit business".[46] Targeted banks would be—amongst others—Saderat Bank of IranBank MellatPost Bank of Iran and Sepah Bank.[47] On 17 March 2012, following agreement two days earlier between all 27 member states of the Council of the European Union and the Council's subsequent ruling, SWIFT disconnected all Iranian banks that had been identified as institutions in breach of current EU sanctions from its international network and warned that even more Iranian financial institutions could be disconnected from the network.

In February 2016, most Iranian banks reconnected to the network following the lift of sanctions due to the Joint Comprehensive Plan of Action.[48]

 

Russia

Similarly, in August 2014 the UK planned to press the EU to block Russian use of SWIFT as a sanction due to Russian military intervention in Ukraine.[49] However, SWIFT refused to do so.[50] SPFS, a Russian alternative to SWIFT, was developed by the Central Bank of Russia as a backup measure.[51]

During the prelude to the 2022 Russian invasion of Ukraine, the United States developed preliminary possible sanctions against Russia, but excluded banning Russia from SWIFT.[52] Following the 2022 Russian invasion of Ukraine, the foreign ministers of the Baltic states Lithuania, Latvia, and Estonia called for Russia to be cut off from SWIFT. However, other EU member states were reluctant, both because European lenders held most of the nearly $30 billion in foreign banks' exposure to Russia and because Russia had developed the SPFS alternative.[53] The European Union, United Kingdom, Canada, and the United States finally agreed to remove few Russian banks from the SWIFT messaging system in response to the 2022 Russian invasion of Ukraine; the governments of France, Germany, Italy and Japan individually released statements alongside the EU.[54][5]

On 20 March 2023, the Russian Federation banned the use of SWIFT.[55][56]

 

Israel

In 2014, SWIFT rejected calls from pro-Palestinian activists to revoke Israeli banks' access to its network owing to the Israeli occupation of Palestinian territory.[57]

 

Competitors

Alternatives to the SWIFT system include:

  1. CIPS: sponsored by China, for RMB related deals. 1467 financial institutions in 111 countries and regions have connected to the system. The actual business covers more than 4,200 banking institutions in 182 countries and regions around the world.[58][59][60]
  2. SFMS: sponsored by India
  3. SPFS: developed by the Russian Federation[61]
  4. INSTEX: sponsored by the European Union, limited to non-USD transactions for trade with Iran, largely unused and ineffective[62][63]

 

Security

In 2016 an $81 million theft from the Bangladesh central bank via its account at the New York Federal Reserve Bank was traced to hacker penetration of SWIFT's Alliance Access software, according to a New York Times report. It was not the first such attempt, the society acknowledged, and the security of the transfer system was undergoing new examination accordingly.[64] Soon after the reports of the theft from the Bangladesh central bank, a second, apparently related, attack was reported to have occurred on a commercial bank in Vietnam.[65][66]

Both attacks involved malware written to both issue unauthorized SWIFT messages and to conceal that the messages had been sent. After the malware sent the SWIFT messages that stole the funds, it deleted the database record of the transfers then took further steps to prevent confirmation messages from revealing the theft. In the Bangladeshi case, the confirmation messages would have appeared on a paper report; the malware altered the paper reports when they were sent to the printer. In the second case, the bank used a PDF report; the malware altered the PDF viewer to hide the transfers.[65]

In May 2016, Banco del Austro (BDA) in Ecuador sued Wells Fargo after Wells Fargo honoured $12 million in fund transfer requests that had been placed by thieves.[66] In this case, the thieves sent SWIFT messages that resembled recently cancelled transfer requests from BDA, with slightly altered amounts; the reports do not detail how the thieves gained access to send the SWIFT messages. BDA asserts that Wells Fargo should have detected the suspicious SWIFT messages, which were placed outside of normal BDA working hours and were of an unusual size. Wells Fargo claims that BDA is responsible for the loss, as the thieves gained access to the legitimate SWIFT credentials of a BDA employee and sent fully authenticated SWIFT messages.[66]

In the first half of 2016, an anonymous Ukrainian bank and others—even "dozens" that are not being made public—were variously reported to have been "compromised" through the SWIFT network and to have lost money.[67]

In March 2022, Swiss newspaper Neue Zürcher Zeitung reported about the increased security precautions by the State Police of Thurgau at the SWIFT data centre in Diessenhofen. After most of the Russian banks have been excluded from the private payment system, the risk of sabotage was considered higher. Inhabitants of the town described the large complex as a "fortress" or "prison" where frequent security checks of the fenced property are conducted.[68]

Link

community logo
Join the TheDinarian Community
To read more articles like this, sign up and join my community today
0
What else you may like…
Videos
Podcasts
Posts
Articles
👀 Klaus Schwab promises new WEF recruits 👀

In a leaked video, Klaus Schwab promises new WEF recruits that their "avatar" will live on after death, and that their brains "will be replicated through artificial intelligence and algorithms."

00:00:38
🚨BlackRock: The Most Evil Business In The World🚨

The company that owns the world. They are buying up the media, real-estate, everything you can think of and it's leading to dystopian future ahead. Larry Fink's investment management is destroying our lives.

"BlackRock is the 4th branch of government" - Bloomberg

“Whoever controls the money controls the world” - Henry Kissinger

We no longer live under free market capitalism, we live under a system of socialism for the rich.

00:15:38
🚨Klaus Schwab Admits He Has Lost Control🚨

Klaus Schwab admits he has lost control and continues to lose the narrative that once sustained public trust in him.

He claims this narrative has guided humanity since the beginning and steered people toward what he calls a better future.

Schwab says the level of push back he now faces has made international cooperation nearly impossible.

He says the elites are now being forced to think about how to create an entirely new narrative.

00:01:06
👉 Coinbase just launched an AI agent for Crypto Trading

Custom AI assistants that print money in your sleep? 🔜

The future of Crypto x AI is about to go crazy.

👉 Here’s what you need to know:

💠 'Based Agent' enables creation of custom AI agents
💠 Users set up personalized agents in < 3 minutes
💠 Equipped w/ crypto wallet and on-chain functions
💠 Capable of completing trades, swaps, and staking
💠 Integrates with Coinbase’s SDK, OpenAI, & Replit

👉 What this means for the future of Crypto:

1. Open Access: Democratized access to advanced trading
2. Automated Txns: Complex trades + streamlined on-chain activity
3. AI Dominance: Est ~80% of crypto 👉txns done by AI agents by 2025

🚨 I personally wouldn't bet against Brian Armstrong and Jesse Pollak.

👉 Coinbase just launched an AI agent for Crypto Trading

🚨 Bittensor’s founder: “TAO isn’t a crypto—it’s AI infrastructure” 🚨

A major narrative shift is being pushed by Jacob Steeves—and it directly challenges how most people view tokens like TAO.

🔑 Key points

🔹 Not a token-first system
Steeves argues TAO isn’t meant to be a speculative asset—it’s the incentive layer powering a decentralized AI network.

🔹 Marketplace for intelligence
Bittensor functions as a peer-to-peer market where AI models compete and get paid for useful output, not hype or staking alone.

🔹 Subnets = micro-economies
The network is split into specialized subnets, each acting like its own AI market (text, vision, prediction, etc.), rewarding contributors based on performance.

🔹 Fixing open-source AI incentives
Bittensor aims to solve a core problem:
👉 open AI research isn’t well monetized
👉 centralized labs dominate

So it introduces token rewards to incentivize global contributors.

🔹 “Proof of intelligence” model
Instead of proof-of-work or proof-of-stake, the network rewards useful ...

🚨 $620M floods into Bittensor as Nvidia & Polychain load up 🚨

A massive institutional wave just hit Bittensor (TAO), and it’s not small money—this is serious capital positioning around decentralized AI infrastructure.

🔑 Key points

🔹 $620M institutional injection:
Nvidia ($200M) have deployed over $620M into TAO exposure.

🔹 Heavy staking = supply squeeze:
Around 68% of TAO supply is locked, with much of Nvidia’s allocation staked—reducing circulating liquidity.

🔹 Real revenue, not just hype:
The network generated ~$43M in AI compute revenue in Q1 2026, showing actual usage.

🔹 Emission cut tightening supply:
Daily token emissions were cut in half, lowering sell pressure by ~$500K per day.

🔹 Price supported by fundamentals:
TAO rose ~21% in Q1 2026, holding strength despite volatility.

🔹 ETF narrative building:
Grayscale & Bitwise filings for TAO ETFs could become a major future catalyst.

🔎 Why it matters

🔹 This is AI infrastructure, not just a token
Bittensor is essentially a marketplace for machine...

Keep your 👀 on Europe 🇪🇺

EU’s proposed Google data access rule could enable large-scale surveillance

The European Commission is facing criticism from security and privacy experts over a proposed Digital Markets Act (DMA) measure that would require Google to share vast amounts of search data with third parties via an automated API.

Critics warn the plan could expose sensitive user queries at scale, creating both privacy and national security risks.

https://cyberinsider.com/eus-proposed-google-data-access-rule-could-enable-large-scale-surveillance/

post photo preview
The Quiet Revolution in Bittensor

This past week (April 13–19, 2026) wasn’t just another cycle of subnet drama and $TAO price noise.

Three major developments landed almost back-to-back that, when viewed together, paint a far bigger picture than most participants are seeing right now.

Bittensor is steadily transitioning from a speculative incentive network into production-grade decentralized AI infrastructure that enterprises, researchers, and real users are beginning to plug into directly.

Most eyes remain fixed on emissions, governance changes like BIT-0011, or short-term token flows. But the deeper shift happening underneath is structural. These three developments show Bittensor subnets creating tangible value across enterprise physical AI, frontier training scalability, and consumer-facing uncensored models in ways that can compound over years, not hype cycles.

  1. Score (Subnet 44) + Manako Labs Secures PwC France & Maghreb Alliance:

 

This was one of the clearest institutional validation moments the ecosystem has seen so far.
@manakoai, the commercial product layer built on @webuildscore decentralized computer vision network, took first place at Start in Block, beating more than 1,000 startups at the Louvre during
 
Around the same time, @PwC_France & Maghreb announced a strategic alliance to integrate Manako’s Business Operations World Model into its AI and digital advisory practice. PwC isn’t some small crypto-friendly firm. They are a $57B revenue global giant serving 82% of the Fortune Global 500. Reports indicate they spent months on technical and legal due diligence before deciding to move forward with deployment opportunities across retail, manufacturing, logistics, energy, and infrastructure.
 
The key capability is powerful: transforming existing enterprise camera systems into real-time physical AI decision networks without requiring companies to rebuild their entire operational stack.
 
The Bigger Picture Most Aren’t Seeing: This does not look like a one-off pilot or marketing headline. It could represent one of the first real on-ramps for Big Four consulting firms to distribute decentralized AI infrastructure to enterprise clients at scale. If successful, this creates:
 
▫️Recurring enterprise demand
▫️Regulatory credibility
▫️Higher-quality commercial usage
▫️Long-term trust in Bittensor infrastructure
 
That type of adoption cannot be replicated by retail hype alone.
 
2. Macrocosmos (Subnet 9 / IOTA) Releases ResBM: 128x Activation Compression
 
 
While enterprise headlines captured attention, @MacrocosmosAI quietly released its ResBM (Residual Bottleneck Models) research paper. The breakthrough demonstrated state-of-the-art 128x activation compression in pipeline-parallel training while maintaining near-zero loss in convergence, memory efficiency, or compute overhead. This is highly relevant because it is designed for low-bandwidth, internet-scale distributed training, the exact type of environment decentralized networks must solve for.
 
Why This Matters Long-Term:
 
The biggest barrier to truly decentralized frontier model training is not only GPU access. It is bandwidth and communication cost when massive models are split across many machines. Centralized labs solve this using expensive proprietary interconnects inside hyperscale data centers. ResBM attempts to attack that problem directly. What many miss is that this tech moat positions Subnet 9 (@IOTA_SN9), and Bittensor’s pre-training layer more broadly, as a viable alternative for the next wave of open-source models. As training demands continue to rise, the ability to scale efficiently without centralization could become a compounding strategic advantage.
 
This is not a minor upgrade. It may materially shift the economics of who gets to train competitive models.
 
3. Venice Uncensored 1.2 Launches, Trained on Targon (Subnet 4)
 
 
@ErikVoorhees and the @AskVenice team released Venice Uncensored 1.2, a Mistral 24B variant featuring:
 
• Vision support
• 4x larger context window
• Stronger tool use
• Minimal refusal behavior after extensive testing
 
Most importantly, it was explicitly trained using @TargonCompute confidential compute on Subnet 4.
 
This gained strong attention because it is a live consumer-facing product users can interact with immediately. Privacy-focused, uncensored AI running on decentralized infrastructure resonates in a world increasingly concerned about centralized censorship, data harvesting, and platform control.
 
The Underappreciated Angle Targon’s confidential compute layer is showing it can support real model training workloads for production applications.
 
Every Venice-style release creates a direct bridge between:
 
▫️End-user demand
▫️Subnet emissions
▫️Compute utilization
▫️TAO-linked ecosystem value
 
As regulation around privacy and AI governance grows stricter, demand for confidential and permissionless training environments may continue rising.
 
This is the consumer on-ramp that complements the enterprise and research stories above.
 
Connecting the Dots: The Bigger Picture for Bittensor: Individually, these are impressive wins.
 
Together, they signal something more profound:
 
▫️Enterprise bridge (SN44): Real corporate budgets and distribution channels via PwC.
▫️Technical scalability (SN9): Solving the hard physics of decentralized training.
▫️Product-market pull (SN4): Shipping usable AI to everyday users who value freedom and privacy.
 
Bittensor is no longer just incentivizing miners. It is evolving into a neutral, permissionless layer where multiple AI value chains can operate together, from world models and large-scale training to inference, compute, and consumer applications.
 
While many still focus on short-term moves such as subnet rotations, governance votes, or
$TAO price action amid post-Covenant recovery, the bigger shift is ecosystem maturity.
 
These developments help attract:
 
▫️ Serious capital
▫️ Strong technical talent
▫️ Real enterprise demand
▫️ Growing consumer usage
 
This week showed resilience and forward momentum.
 
Big Four validation, meaningful research breakthroughs, and live products all point to one thing: The vision is becoming real.
 
Final Thoughts: If you are only watching the chart, you may be missing the real shift. Bittensor is laying the groundwork to become the decentralized backbone for the next era of AI, not by competing head-on with closed labs on every metric, but by becoming the open, scalable, incentive-aligned alternative no single company can fully control or censor.
 
The pieces are moving.
 
The bigger picture is beginning to come into focus for those paying attention beyond the noise.
 

 🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:

1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below 📲 or Click Here

🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
post photo preview
📈Bittensor ($TAO) Staking📈
Learn how to stake your TAO and earn potential rewards.

Decentralized staking

Staking TAO tokens lets you earn rewards by supporting the Bittensor network. In return, you receive a share of the staking rewards.

Source: Taostats

In the Bittensor (TAO) ecosystem, there are two main ways people can stake their tokens: Root staking and Alpha staking. These represent two different strategies, with different levels of risk and reward.

Root staking was the first method introduced when Bittensor launched. It allows users to lock up their TAO tokens in the core part of the network (now called Subnet 0) to earn steady, “predictable” rewards. It's straightforward and carries less risk, making it a good fit for early users or anyone who prefers a more passive, steady approach. In essence, this is the “traditional” form of token staking seen in many crypto projects. Rather than simply holding your tokens, you delegate them to validators who help run and secure the network on your behalf.

Source: Taostats.io

Later, on February 13, 2025, Alpha staking was introduced as part of a major network upgrade called Dynamic TAO (dTAO). This upgrade created subnet-specific tokens called Alpha tokens, which users receive when they stake TAO into subnets. If you’re not familiar with the concept of subnets and Bittensor infrastructure, please check out Bittensor project reviewAlpha tokens can go up or down in value, but they also offer a chance for much higher rewards, especially in new or fast-growing subnets. It has more complex staking dynamics and comes with more risk, but also more opportunity if you're actively involved.

Source: Taostats.io

In both Root and Alpha staking, there’s no fixed lock-up period—you can stake or unstake your TAO tokens at any time. However, while your tokens are staked, they’re temporarily locked, which means you can’t trade or transfer them until you unstake.

In Root staking, staking rewards are simple and “stable”. However, the reward amount (APY) is slowly going down over time. It’s because the network is moving more rewards toward Alpha staking.

In Alpha staking, things work differently. You first change your TAO into special tokens called Alpha tokens, which are connected to subnets. When you hold Alpha tokens, your balance grows as and when the subnet earns daily rewards. The more TAO is staked into a subnet, the more rewards it gets. If you want to exit, you must convert your Alpha tokens back to TAO. This process can be affected by market prices and might give you less TAO back than you put in, depending on the timing. This method can earn you more than Root staking, but it depends on how well your chosen subnet performs and how much activity it gets.

With Root staking, your rewards are based on how well your validator performs in the network. In Alpha staking, you stake your TAO into a subnet, and your rewards depend on the overall performance of that subnet. Subnets that provide more value to the network receive more emissions, which increases your Alpha token balance.

Centralized staking

Centralized TAO staking, offered by platforms like Coinbase, is a simple and beginner-friendly option where the exchange handles the staking process for you. You earn a fixed reward rate of around 17.3% APY. While your tokens are temporarily locked during staking, there are no additional lock-up periods beyond what the network requires. The main trade-off between centralized and decentralized staking is convenience versus control.

Staking is a great way to put your TAO to work while contributing to the network's security. But, it's important to understand the terms before participating, as rewards and conditions may differ depending on the platform you choose.

 🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:
1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below 📲 or Click Here


🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
post photo preview
🧬VINDICATED! The Epstein Files Connect Gates, Pandemics & Censorship to a Globalist Blueprint for a Biosecurity State🧬

Every warning. Every documentary. Every article. Every post that got us banned. All of it was true. Now what? What can we do? Read on, share this Substack, help us save lives! The Light is shining! ✨

Well, well, well… look what the cat dragged in.

Actually, scratch that. Look what the Department of Justice finally dragged out of Jeffrey Epstein’s email inbox and dumped on the world’s doorstep like a rotting corpse nobody wanted to claim. Yep, that’s right. The Epstein files. It’s hilarious how the “Democratic hoax” and “fantasy” client list we were all told didn’t exist suddenly became a very real, very unsealed document.

For years—years—they called us conspiracy theorists. They slapped “misinformation” labels on our posts faster than Pfizer could print liability waivers. They kicked us off platforms, lied about us in the media, and shadow-banned our reach. Meanwhile, the real conspiracy—the one typed out in black-and-white emails between billionaires, bankers, and a convicted pedophile—was sitting in a government vault, waiting to prove us right.

And now? Now the receipts are public.

The release of Jeffrey Epstein’s files has done far more than expose a network of elite pedophilia and blackmail—it has vindicated truth-tellers like us and countless others who were smeared, censored, de-platformed, and persecuted for warning about the sinister agendas of the globalist elite. The documents reveal shocking connections between Epstein, Bill Gates, pandemic planning, and the systematic suppression of anyone who dared to connect the dots.

We weren’t crazy. We were just early. And they hated us for it.

Epstein, Gates, and the Pandemic “Business Model” They Built Together

One of the most damning revelations from Epstein’s files is his partnership with Bill Gates. Forget the carefully crafted PR spin about “regretting” those meetings. These weren’t casual dinners. These were planning sessions.

Back in 2015, Gates and Epstein exchanged emails about “preparing for pandemics” and strategies to “involve the WHO.” Gates wrote: I hope we can pull this off.”

How’s that for a chill down your spine?

This eerily foreshadowed the 2019 Event 201 simulation—a pandemic exercise hosted by the Gates Foundation, Johns Hopkins, and the World Economic Forum that just happened to model a global coronavirus outbreak… just months before COVID-19 ”mysteriously” emerged in Wuhan. Funny how that works, isn’t it?

But let’s rewind even further, to the real blueprint—the financial architecture that made the pandemic response not just possible, but profitable.

The story crystallizes in a chilling 2011 email exchangeJuliet Pullis, a JPMorgan executive under then-chairman Jes Staley, emailed Jeffrey Epstein with a list of detailed questions. The source? “The JPM team that is putting together some ideas for Gates.

The questions were precise: What are the objectives? Is anonymity key? Who directs the investments and grants? This wasn’t JPMorgan consulting an expert; it was a trillion-dollar bank asking a convicted felon to architect a billion-dollar philanthropic fund for Bill Gates.

This wasn’t JPMorgan consulting a philanthropic expert. This was a trillion-dollar bank asking a convicted felon to architect a billion-dollar philanthropic fund for one of the richest men on Earth. Let that marinate for a moment.

Epstein’s reply was fluent and commanding. He described a donor-advised fund with a “stellar board” and ties to the Gates-Buffett “Giving Pledge.” He noted the billions already pledged and identified the gap: “They all have a tax advisor, but have no real clue on how to give it away.” His solution? JPM would be an integral part. Not advisor… operator, compliance. Staley’s response: We need to talk.

By July 2011, the plan evolved. In an email to Staley, copying Boris Nikolic (Gates’ chief science advisor), Epstein laid out the core pitch: A silo based proposal that will get Bill more money for vaccines.”

Not “more research for pandemics.” Not “better public health infrastructure.” More money for vaccines.” This is the unambiguous language of capital formation, not charity. It reveals the structure’s intended output planning reached the highest levels.

In August 2011, Mary Erdoes, CEO of JPMorgan’s $2+ trillion Asset & Wealth Management division, emailed Epstein (while on vacation) with additional operational questions.

Epstein’s reply was breathtaking in scope:

  • Scale: “Billions of dollars” in two years, “tens of billions by year 4.”

  • Structure: Donors choose from “silos” like mutual funds.

  • The Kicker: However, we should be ready with an offshore arm — especially for vaccines.”

An offshore arm. For vaccines. For a charitable vehicle. Let that sink in.

So, by the time the world was panicking in March 2020, the financial machinery was already built. The investment vehicles, the donor-advised funds, the reinsurance products at places like Swiss Re, and even the simulation playbooks were dusted off and ready to go.

The pandemic wasn’t an interruption to their business—it was the Grand Opening.

Epstein’s role extended far beyond trafficking; he was a facilitator and blackmail operative for the global elite. The same forces that orchestrated the COVID-19 power grab—the mask mandates, lockdowns, censorship, and coercive mRNA push—are the ones who silenced critics like us.

Gates, despite his documented ties to Epstein (multiple flights on the “Lolita Express” after Epstein’s 2008 conviction), walks freely. He’s on TV. He’s advising governments. He’s still funding “global health initiatives” and pushing digital IDs, vaccine passports, and climate lockdowns.

Meanwhile, people like our friend, Joby Weeks, are under house arrest without charges, and voices like ours were de-platformed, demonetized, and destroyed for saying this very thing.

We told you. You knew it in your gut. Now you have the emails.

Censorship: The Elite’s “Misinformation” Label to Cover Their Crimes

The Epstein files expose not just criminal behavior, but the playbook for the systematic suppression of truth. While Epstein’s powerful friends were being protected by the FBI, the DOJ, and the media, platforms like Facebook (Meta), YouTube (Google), and Twitter went to war against anyone talking about it.

Think about the sheer audacity.

We were banned from social media for calling COVID-19 a “fake pandemic” and exposing the vaccine injury data that’s now undeniable.

Below is a screenshot of the first Facebook post that was taken down and then used as “Exhibit A” in their “reports” about how bad we were, naming us the 3rd most dangerous people on earth after Dr Joseph Mercola and Bobby Kennedy in the digital hit list they called the “Disinformation Dozen.” They attacked us, lied about us, and pressured the media, social media, and population at large to do the same: attack, threaten, and cast us out.

We were labeled “dangerous” for sharing emails, documents, and research that the DOJ and the CDC have now confirmed.

It was never about “safety.” It was about narrative control.

The same institutions that turned a blind eye to Epstein’s crimes for decades—the same ones that let him “commit suicide” in a maximum-security prison with cameras conveniently malfunctioning—suddenly became the ruthless hall monitors of “acceptable discourse,” ensuring only their approved stories could be told.

Big Tech, Big Media, and Big Government are all part of the same protection racket. They shielded Epstein’s client list, and now they shield the architects of the pandemic debacle. Independent journalists, researchers, and health advocates like us, who connected these dots, were systematically de-platformed, demonetized, and destroyed.

Why? Because we were right, and that was the greatest threat of all.

When you’re over the target, that’s when the flak gets heaviest. And brothers and sisters, we were getting shelled.

They Lied About Us While Protecting the Real Criminals

Let’s be crystal clear about what happened here.

We have spent decades exposing the cancer industry, Big Pharma’s corruption, and the suppression of natural health solutions. We produced The Truth About Cancer docu-series, reaching millions worldwide. We warned about vaccine injuries, censorship, and the coming medical tyranny years before COVID-19.

And what did they do? They called us “Conspiracy Theorists,” “Anti-Vaxxers,” and “Killers.” Dangerous.

They said we were killing people with “misinformation.”

Facebook banned us. YouTube deleted our videos. Legacy media ran hit pieces. PayPal froze our accounts.

All while Bill Gates—a man with documented ties to Jeffrey Epstein, who flew on his plane multiple times after Epstein’s conviction, who got STDs from Russian girls Epstein provided for him for which Gates asked Epstein’s help getting him antibiotics to slip secretly to his then wife, Melinda, so that she would not know about his inexcusable and perverted escapades—yes, THAT Bill Gates—was at the same time, being platformed on every major news network as the world’s health oracle.

All while Anthony Fauci—who funded gain-of-function research in Wuhan through Peter Daszak and EcoHealth Alliance, who lied under oath to Congress, who flip-flopped on masks, lockdowns, and vaccines—was treated like a saint. Time Magazine’s “Guardian of the Year.”

All while Pfizer—a company with a $2.3 billion criminal fine for fraudulent marketing, bribery, and kickbacks—was given blanket immunity from liability and billions in taxpayer dollars to produce a vaccine in record time with no long-term safety data.

Were we the dangerous ones?

No.

We were the truthful ones. And that made us the enemy.

The Weaponized Institutions: From Epstein’s Blackmail to Your Digital ID

Epstein’s operation was never just about blackmail for perversion; it was blackmail for control. The files show his cozy ties to intelligence agencies (Mossad, CIA), financial giants like JPMorgan and Deutsche Bank, and political leaders across the globe.

This is the same cabal now pushing:

  • The Great Reset

  • Digital IDs

  • Central Bank Digital Currencies (CBDCs)

  • 15-minute cities

  • Carbon credit social scoring

  • Vaccine passports

Let’s connect the dots they desperately don’t want you to see:

Financial Control:

JPMorgan banked Epstein for years despite clear red flags—over $1 billion in suspicious transactions flagged internally and ignored. They knew. They didn’t care. They paid a $290 million fine and moved on.

Now, banks like Bank of America, Chase, and PayPal de-bank conservatives, truckers, health freedom advocates, and anyone who questions the narrative. Canadian truckers. Gun shops. Crypto entrepreneurs. The goal is the same: punish dissent and control economic life.

CBDCs are the endgame—a digital leash on every citizen. Programmable money that can be turned off, restricted, or expired. Social credit by another name.

Medical Tyranny:

The FDA, CDC, and WHO—utterly captured by Big Pharma—lied about:

  • COVID origins (Wuhan lab leak dismissed as conspiracy theory)

  • Vaccine efficacy (”95% effective” turned into “you need boosters forever”)

  • Natural immunity (ignored despite being superior)

  • Early treatments (ivermectin, hydroxychloroquine, vitamin D censored and mocked)

They attacked natural health advocates just as they’ve done for decades with cancer cures, detox protocols, and anything that threatens Big Pharma profits. They are not health agencies; they are profit-enforcement arms dressed in lab coats.

Political Corruption:

Epstein’s blackmail ensured elite immunity. His client list includes presidents, princes, CEOs, scientists, and media moguls.

Meanwhile, true dissidents—Julian Assange (tortured in prison for journalism), Edward Snowden (exiled for exposing mass surveillance), and journalists like us—face persecution, imprisonment, debanking, slanderous hit pieces, and/or constant character assassination.

Two systems of justice: one for them, one for you. One for Epstein’s friends, one for truth-tellers.

The Way Forward: They’re Exposed. Now It’s Time to Build.

The Epstein files are more than proof; they are a declaration that the system is rotten to its core. But here’s the beautiful part: they vindicate us completely.

Every warning. Every documentary. Every article. Every post that got us banned. All of it was true.

The globalists’ grip is weakening. The truth—the real, ugly, documented truth—is erupting from the very files they tried to hide. They labeled us liars, but the emails show they were the architects. They silenced us, they censored us, but that only made our voices more necessary.

Epstein did not kill himself. COVID-19 was not natural. The vaccines were not safe or effective. The censorship was not about protecting you—it was about protecting them.

And now? Now it’s time to use this vindication as fuel. Not for revenge, but for revolution. A revolution of truth, health, freedom, and justice.

They tried to bury us. They didn’t know we were seeds.

The Epstein files are a smoking gun. A paper trail. A confession written in emails, financial structures, and offshore accounts.

They prove what we’ve been saying all along:

  • The system is rigged.

  • The elites are criminals.

  • The pandemic was planned.

  • The censorship was coordinated.

And we were right. 👍

Source

🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:
1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below 📲 or Click Here


🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
See More
Available on mobile and TV devices
google store google store app store app store
google store google store app tv store app tv store amazon store amazon store roku store roku store
Powered by Locals