TheDinarian
News • Business • Investing & Finance
Quantum computers and the Bitcoin blockchain
An analysis of the impact quantum computers might have on the Bitcoin blockchain
April 25, 2024
post photo preview

To be fully 100% transparent with you all, I am not and refuse to invest in any Bitcoin. As a matter of fact I am probably one of the most Anti-Bitcoin individuals you will ever meet. This is mainly due to the below and the simple fact that it is overmarketed by the very institutions it is supposed to be against.  ~The Dinarian

One of the most well-known applications of quantum computers is breaking the mathematical difficulty underlying most of currently used cryptography. Since Google announced that it achieved quantum supremacy there has been an increasing number of articles on the web predicting the demise of currently used cryptography in general, and Bitcoin in particular. The goal of this article is to present a balanced view regarding the risks that quantum computers pose to Bitcoin.

The main focus of this article will be to answer the following questions:

  1. How many Bitcoins could be stolen now if a sufficiently large quantum computer was available?
  2. What can one do to mitigate the risk of Bitcoins being stolen by an adversary with a quantum computer?
  3. Is the Bitcoin blockchain inherently resilient to quantum attacks now and in the future?
 

Quantum computers and cryptography

A great amount of digital ink has been spilled on the topic of how quantum computers pose an existential threat to currently used asymmetric cryptography. We will therefore not discuss this in detail, but only explain the aspects that are relevant for the analysis in this article.

In asymmetric cryptography, a private-public key pair is generated in such a manner that the two keys have a mathematical relation between them. As the name suggests, the private key is kept as secret, while the public key is made publicly available. This allows individuals to produce a digital signature (using their private key) that can be verified by anyone who has the corresponding public key. This scheme is very common in the financial industry to prove authenticity and integrity of transactions.

The security of asymmetric cryptography is based on a mathematical principle called a “one-way function”. This principle dictates that the public key can be easily derived from the private key but not the other way around. All known (classical) algorithms to derive the private key from the public key require an astronomical amount of time to perform such a computation and are therefore not practical. However, in 1994, the mathematician Peter Shor published a quantum algorithm that can break the security assumption of the most common algorithms of asymmetric cryptography. This means that anyone with a sufficiently large quantum computer could use this algorithm to derive a private key from its corresponding public key, and thus, falsify any digital signature.

 

Bitcoin 101

To understand the impact of quantum computers on Bitcoin, we will start with a brief summary about how Bitcoin transactions work. Bitcoin is a decentralized system for transferring value. Unlike the banking system where it is the responsibility of a bank to provide customers with a bank account, a Bitcoin user is responsible for generating his own (random) address. By means of a simple procedure, the user's computer calculates a random Bitcoin address (related to the public key) as well as a secret (private key) that is required in order to perform transactions from this address.

Moving Bitcoins from one address to another is called a transaction. Such a transaction is similar to sending money from one bank account to another. In Bitcoin, the sender must authorize their transaction by providing a digital signature that proves they own the address where the funds are stored. Remember: someone with an operational quantum computer who has your public key could falsify this signature, and therefore potentially spend anyone’s Bitcoins!

In the Bitcoin network, the decision of which transactions are accepted into the network is ultimately left to the so called miners. Miners compete in a race to process the next batch of transactions, also called a block. Whoever wins the race, is allowed to construct the next block, awarding them new coins as they do so. Bitcoin blocks are linked to each other in a sequential manner. Together, they form a chain of blocks, also called the “blockchain”.

The victorious miner who creates a new block, is free to include whichever transaction they wish. Other miners express their agreement by building on top of blocks they agree with. In case of a disagreement, they will build on the most recently accepted block. In other words, if a rogue miner attempts to construct an invalid block, honest miners will ignore the invalid block and build on top of the most recent valid block instead.

 

Address types

Bitcoin transactions allow for a custom logic to be implemented, enabling a myriad of financial transaction types such as escrow and shared ownership. However, for the purpose of this article, we restrict ourselves to simple person-to-person payments. These can be divided into 2 categories, each affected differently by a quantum computer.

In the first type, a public key directly serves as the Bitcoin address of the recipient. A transaction to such an address is called ‘pay to public key’ (p2pk) for obvious reasons. In the early days of Bitcoin, in 2009, this was the dominant address type. Many of the original coins mined by Satoshi Nakamoto himself are still stored in such addresses. One of the issues with these addresses is the lack of a mechanism to detect mistyping of addresses (for example a last checksum digit which is used, for example, in credit card numbers). An additional problem is that these addresses are very long, which results in a larger transaction file and therefore longer processing time. Regarding the threat from a quantum computer, the public key is directly obtainable from the address. Since all transactions in Bitcoin are public, anyone can obtain the public key from any p2pk address. A quantum computer running Shor’s algorithm could then be used to derive the private key from this address. This would allow an adversary who has a quantum computer to spend the coins that the address had.

In the second type of transaction, the address of the recipient is composed of a hash of the public key. As a hash is a one-way cryptographic function, the public key is not directly revealed by the address. The first and most popular implementation of this is called ‘pay to public key hash’ (p2pkh) and was designed to solve the two issues described above (checksum and address length, for a more elaborate explanation we refer to this page. As was mentioned above, the public key cannot be retrieved from the address. The public key is only revealed at the moment when the owner wishes to initiate a transaction. This means that as long as funds have never been transferred from a p2pkh address, the public key is not known and the private key cannot be derived using a quantum computer. There is a ‘but’ though! If funds are ever transferred from a specific p2pkh address (no matter what amount), the public key is revealed. From that moment on, this address is marked "used" and should ideally not be used again to receive new coins. In fact, many wallets are programmed to avoid address reuse as best they can. Avoiding the reuse of addresses is considered best practice for Bitcoin users, but you would be surprised how many people do not take this advice to heart. More on that in the following chapter.

 

How many Bitcoins could be stolen now if sufficiently large quantum computers were available?

Imagine that someone manages to build a quantum computer today and is therefore able to derive private keys. How many Bitcoins will be in danger?

To answer this question, we analyzed the entire Bitcoin blockchain to identify which coins are vulnerable to an attack from a quantum computer. As explained in the previous section, all coins in p2pk addresses and reused p2pkh addresses are vulnerable to a quantum attack. The result of our analysis is presented in the figure below. It shows the distribution of Bitcoins in the various address types over time. As can clearly be seen in the graph, p2pk addresses dominated the Bitcoin blockchain in the first year of its existence. Interestingly, the number of coins in p2pk addresses has stayed practically constant (circa 2M Bitcoins). A reasonable assumption is that these coins were generated through mining and have never been moved from their original address.

As p2pkh was introduced 2010, it quickly became dominant. Most of the coins created since then are stored in this type of address. In the graph we see that the number of Bitcoins stored in reused p2pkh increases from 2010 to 2014, and since then is decreasing slowly to reach the current amount of 2.5M Bitcoins. This suggests that people are generally following the best practice of not using p2pk address as well as not reusing p2pkh addresses. Nevertheless, there are still over 4 million BTC (about 25% of all Bitcoins) which are potentially vulnerable to a quantum attack. At the current price this is over 40 billion USD!

cq5dam.web.700.350.desktop.jpegFigure 1: The distribution of Bitcoins that are stored in address that are vulnerable to quantum attacks. This graph shows that about 25% of all Bitcoins are vulnerable to a quantum attack and that there is an equal number of vulnerable p2pk and p2pkh coins. Note that reused Segwit coins are presented in the graph but are otherwise not mentioned in the article.
 

What can one do to mitigate the risk of Bitcoins being stolen by an adversary with a quantum computer?

In the previous section we explained that p2pk and reused p2pkh addresses are vulnerable to quantum attacks. However, p2pkh addresses that have never been used to spend Bitcoins are safe, as their public keys are not yet public. This means that if you transfer your Bitcoins to a new p2pkh address, then they should not be vulnerable to a quantum attack.

The issue with this approach is that many owners of vulnerable Bitcoins have lost their private keys. These coins cannot be transferred and are waiting to be taken by the first person who manages to build a sufficiently large quantum computer. A way to address this issue is to come to a consensus within the Bitcoin community and provide an ultimatum for people to move their coins to a safe address. After a predefined period, coins in unsafe addresses would become unusable (technically, this means that miner will ignore transactions coming from these addresses). Such a drastic step needs to be considered carefully before implemented, not to mention the complexity of achieving consensus about such a sensitive issue.

 

Is the Bitcoin blockchain inherently resilient to quantum attacks now and in the future?

Let’s assume for a minute that all owners of vulnerable Bitcoins transfer their funds to safe addresses (everyone who lost their private key ‘magically’ finds them). Does that mean that the Bitcoin blockchain is no longer vulnerable to quantum attacks? The answer to this question is actually not that simple. The prerequisite of being “quantum safe” is that the public key associated with this address is not public. But as we explained above, the moment you want to transfer coins from such a “safe” address, you also reveal the public key, making the address vulnerable. From that moment until your transaction is “mined”, an attacker who possesses a quantum computer gets a window of opportunity to steal your coins. In such an attack, the adversary will first derive your private key from the public key and then initiate a competing transaction to their own address. They will try to get priority over the original transaction by offering a higher mining fee.

In the Bitcoin blockchain it currently takes about 10 minutes for transactions to be mined (unless the network is congested which has happened frequently in the past). As long as it takes a quantum computer longer to derive the private key of a specific public key then the network should be safe against a quantum attack. Current scientific estimations predict that a quantum computer will take about 8 hours to break an RSA key, and some specific calculations predict that a Bitcoin signature could be hacked within 30 minutes. This means that Bitcoin should be, in principle, resistant to quantum attacks (as long as you do not reuse addresses). However, as the field of quantum computers is still in its infancy, it is unclear how fast such a quantum computer will become in the future. If a quantum computer will ever get closer to the 10 minutes mark to derive a private key from its public key, then the Bitcoin blockchain will be inherently broken.

 

Closing remarks

Quantum computers are posing a serious challenge to the security of the Bitcoin blockchain. Presently, about 25% of the Bitcoins in circulation are vulnerable to a quantum attack. If you have Bitcoins in a vulnerable address and believe that progress in quantum computing is more advanced than publicly known, then you should probably transfer your coins to a new p2pkh address (don’t forget to make a secure backup of your private key).

In case your own Bitcoins are safe in a new p2pkh address, you might still be impacted if many people will not (or cannot) take the same protection measures. In a situation where a large number of Bitcoins is stolen, the price will most likely crash and the confidence in the technology will be lost.

Even if everyone takes the same protection measures, quantum computers might eventually become so fast that they will undermine the Bitcoin transaction process. In this case the security of the Bitcoin blockchain will be fundamentally broken. The only solution in this case is to transition to a new type of cryptography called ‘post-quantum cryptography’, which is considered to be inherently resistant to quantum attacks. These types of algorithms present other challenges to the usability of blockchains and are being investigated by cryptographers around the world. We anticipate that future research into post-quantum cryptography will eventually bring the necessary change to build robust and future-proof blockchain applications.

Link

community logo
Join the TheDinarian Community
To read more articles like this, sign up and join my community today
0
What else you may like…
Videos
Podcasts
Posts
Articles
👀 Klaus Schwab promises new WEF recruits 👀

In a leaked video, Klaus Schwab promises new WEF recruits that their "avatar" will live on after death, and that their brains "will be replicated through artificial intelligence and algorithms."

00:00:38
🚨BlackRock: The Most Evil Business In The World🚨

The company that owns the world. They are buying up the media, real-estate, everything you can think of and it's leading to dystopian future ahead. Larry Fink's investment management is destroying our lives.

"BlackRock is the 4th branch of government" - Bloomberg

“Whoever controls the money controls the world” - Henry Kissinger

We no longer live under free market capitalism, we live under a system of socialism for the rich.

00:15:38
🚨Klaus Schwab Admits He Has Lost Control🚨

Klaus Schwab admits he has lost control and continues to lose the narrative that once sustained public trust in him.

He claims this narrative has guided humanity since the beginning and steered people toward what he calls a better future.

Schwab says the level of push back he now faces has made international cooperation nearly impossible.

He says the elites are now being forced to think about how to create an entirely new narrative.

00:01:06
👉 Coinbase just launched an AI agent for Crypto Trading

Custom AI assistants that print money in your sleep? 🔜

The future of Crypto x AI is about to go crazy.

👉 Here’s what you need to know:

💠 'Based Agent' enables creation of custom AI agents
💠 Users set up personalized agents in < 3 minutes
💠 Equipped w/ crypto wallet and on-chain functions
💠 Capable of completing trades, swaps, and staking
💠 Integrates with Coinbase’s SDK, OpenAI, & Replit

👉 What this means for the future of Crypto:

1. Open Access: Democratized access to advanced trading
2. Automated Txns: Complex trades + streamlined on-chain activity
3. AI Dominance: Est ~80% of crypto 👉txns done by AI agents by 2025

🚨 I personally wouldn't bet against Brian Armstrong and Jesse Pollak.

👉 Coinbase just launched an AI agent for Crypto Trading

🚨 Bittensor’s founder: “TAO isn’t a crypto—it’s AI infrastructure” 🚨

A major narrative shift is being pushed by Jacob Steeves—and it directly challenges how most people view tokens like TAO.

🔑 Key points

🔹 Not a token-first system
Steeves argues TAO isn’t meant to be a speculative asset—it’s the incentive layer powering a decentralized AI network.

🔹 Marketplace for intelligence
Bittensor functions as a peer-to-peer market where AI models compete and get paid for useful output, not hype or staking alone.

🔹 Subnets = micro-economies
The network is split into specialized subnets, each acting like its own AI market (text, vision, prediction, etc.), rewarding contributors based on performance.

🔹 Fixing open-source AI incentives
Bittensor aims to solve a core problem:
👉 open AI research isn’t well monetized
👉 centralized labs dominate

So it introduces token rewards to incentivize global contributors.

🔹 “Proof of intelligence” model
Instead of proof-of-work or proof-of-stake, the network rewards useful ...

🚨 $620M floods into Bittensor as Nvidia & Polychain load up 🚨

A massive institutional wave just hit Bittensor (TAO), and it’s not small money—this is serious capital positioning around decentralized AI infrastructure.

🔑 Key points

🔹 $620M institutional injection:
Nvidia ($200M) have deployed over $620M into TAO exposure.

🔹 Heavy staking = supply squeeze:
Around 68% of TAO supply is locked, with much of Nvidia’s allocation staked—reducing circulating liquidity.

🔹 Real revenue, not just hype:
The network generated ~$43M in AI compute revenue in Q1 2026, showing actual usage.

🔹 Emission cut tightening supply:
Daily token emissions were cut in half, lowering sell pressure by ~$500K per day.

🔹 Price supported by fundamentals:
TAO rose ~21% in Q1 2026, holding strength despite volatility.

🔹 ETF narrative building:
Grayscale & Bitwise filings for TAO ETFs could become a major future catalyst.

🔎 Why it matters

🔹 This is AI infrastructure, not just a token
Bittensor is essentially a marketplace for machine...

Keep your 👀 on Europe 🇪🇺

EU’s proposed Google data access rule could enable large-scale surveillance

The European Commission is facing criticism from security and privacy experts over a proposed Digital Markets Act (DMA) measure that would require Google to share vast amounts of search data with third parties via an automated API.

Critics warn the plan could expose sensitive user queries at scale, creating both privacy and national security risks.

https://cyberinsider.com/eus-proposed-google-data-access-rule-could-enable-large-scale-surveillance/

post photo preview
The Quiet Revolution in Bittensor

This past week (April 13–19, 2026) wasn’t just another cycle of subnet drama and $TAO price noise.

Three major developments landed almost back-to-back that, when viewed together, paint a far bigger picture than most participants are seeing right now.

Bittensor is steadily transitioning from a speculative incentive network into production-grade decentralized AI infrastructure that enterprises, researchers, and real users are beginning to plug into directly.

Most eyes remain fixed on emissions, governance changes like BIT-0011, or short-term token flows. But the deeper shift happening underneath is structural. These three developments show Bittensor subnets creating tangible value across enterprise physical AI, frontier training scalability, and consumer-facing uncensored models in ways that can compound over years, not hype cycles.

  1. Score (Subnet 44) + Manako Labs Secures PwC France & Maghreb Alliance:

 

This was one of the clearest institutional validation moments the ecosystem has seen so far.
@manakoai, the commercial product layer built on @webuildscore decentralized computer vision network, took first place at Start in Block, beating more than 1,000 startups at the Louvre during
 
Around the same time, @PwC_France & Maghreb announced a strategic alliance to integrate Manako’s Business Operations World Model into its AI and digital advisory practice. PwC isn’t some small crypto-friendly firm. They are a $57B revenue global giant serving 82% of the Fortune Global 500. Reports indicate they spent months on technical and legal due diligence before deciding to move forward with deployment opportunities across retail, manufacturing, logistics, energy, and infrastructure.
 
The key capability is powerful: transforming existing enterprise camera systems into real-time physical AI decision networks without requiring companies to rebuild their entire operational stack.
 
The Bigger Picture Most Aren’t Seeing: This does not look like a one-off pilot or marketing headline. It could represent one of the first real on-ramps for Big Four consulting firms to distribute decentralized AI infrastructure to enterprise clients at scale. If successful, this creates:
 
▫️Recurring enterprise demand
▫️Regulatory credibility
▫️Higher-quality commercial usage
▫️Long-term trust in Bittensor infrastructure
 
That type of adoption cannot be replicated by retail hype alone.
 
2. Macrocosmos (Subnet 9 / IOTA) Releases ResBM: 128x Activation Compression
 
 
While enterprise headlines captured attention, @MacrocosmosAI quietly released its ResBM (Residual Bottleneck Models) research paper. The breakthrough demonstrated state-of-the-art 128x activation compression in pipeline-parallel training while maintaining near-zero loss in convergence, memory efficiency, or compute overhead. This is highly relevant because it is designed for low-bandwidth, internet-scale distributed training, the exact type of environment decentralized networks must solve for.
 
Why This Matters Long-Term:
 
The biggest barrier to truly decentralized frontier model training is not only GPU access. It is bandwidth and communication cost when massive models are split across many machines. Centralized labs solve this using expensive proprietary interconnects inside hyperscale data centers. ResBM attempts to attack that problem directly. What many miss is that this tech moat positions Subnet 9 (@IOTA_SN9), and Bittensor’s pre-training layer more broadly, as a viable alternative for the next wave of open-source models. As training demands continue to rise, the ability to scale efficiently without centralization could become a compounding strategic advantage.
 
This is not a minor upgrade. It may materially shift the economics of who gets to train competitive models.
 
3. Venice Uncensored 1.2 Launches, Trained on Targon (Subnet 4)
 
 
@ErikVoorhees and the @AskVenice team released Venice Uncensored 1.2, a Mistral 24B variant featuring:
 
• Vision support
• 4x larger context window
• Stronger tool use
• Minimal refusal behavior after extensive testing
 
Most importantly, it was explicitly trained using @TargonCompute confidential compute on Subnet 4.
 
This gained strong attention because it is a live consumer-facing product users can interact with immediately. Privacy-focused, uncensored AI running on decentralized infrastructure resonates in a world increasingly concerned about centralized censorship, data harvesting, and platform control.
 
The Underappreciated Angle Targon’s confidential compute layer is showing it can support real model training workloads for production applications.
 
Every Venice-style release creates a direct bridge between:
 
▫️End-user demand
▫️Subnet emissions
▫️Compute utilization
▫️TAO-linked ecosystem value
 
As regulation around privacy and AI governance grows stricter, demand for confidential and permissionless training environments may continue rising.
 
This is the consumer on-ramp that complements the enterprise and research stories above.
 
Connecting the Dots: The Bigger Picture for Bittensor: Individually, these are impressive wins.
 
Together, they signal something more profound:
 
▫️Enterprise bridge (SN44): Real corporate budgets and distribution channels via PwC.
▫️Technical scalability (SN9): Solving the hard physics of decentralized training.
▫️Product-market pull (SN4): Shipping usable AI to everyday users who value freedom and privacy.
 
Bittensor is no longer just incentivizing miners. It is evolving into a neutral, permissionless layer where multiple AI value chains can operate together, from world models and large-scale training to inference, compute, and consumer applications.
 
While many still focus on short-term moves such as subnet rotations, governance votes, or
$TAO price action amid post-Covenant recovery, the bigger shift is ecosystem maturity.
 
These developments help attract:
 
▫️ Serious capital
▫️ Strong technical talent
▫️ Real enterprise demand
▫️ Growing consumer usage
 
This week showed resilience and forward momentum.
 
Big Four validation, meaningful research breakthroughs, and live products all point to one thing: The vision is becoming real.
 
Final Thoughts: If you are only watching the chart, you may be missing the real shift. Bittensor is laying the groundwork to become the decentralized backbone for the next era of AI, not by competing head-on with closed labs on every metric, but by becoming the open, scalable, incentive-aligned alternative no single company can fully control or censor.
 
The pieces are moving.
 
The bigger picture is beginning to come into focus for those paying attention beyond the noise.
 

 🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:

1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below 📲 or Click Here

🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
post photo preview
📈Bittensor ($TAO) Staking📈
Learn how to stake your TAO and earn potential rewards.

Decentralized staking

Staking TAO tokens lets you earn rewards by supporting the Bittensor network. In return, you receive a share of the staking rewards.

Source: Taostats

In the Bittensor (TAO) ecosystem, there are two main ways people can stake their tokens: Root staking and Alpha staking. These represent two different strategies, with different levels of risk and reward.

Root staking was the first method introduced when Bittensor launched. It allows users to lock up their TAO tokens in the core part of the network (now called Subnet 0) to earn steady, “predictable” rewards. It's straightforward and carries less risk, making it a good fit for early users or anyone who prefers a more passive, steady approach. In essence, this is the “traditional” form of token staking seen in many crypto projects. Rather than simply holding your tokens, you delegate them to validators who help run and secure the network on your behalf.

Source: Taostats.io

Later, on February 13, 2025, Alpha staking was introduced as part of a major network upgrade called Dynamic TAO (dTAO). This upgrade created subnet-specific tokens called Alpha tokens, which users receive when they stake TAO into subnets. If you’re not familiar with the concept of subnets and Bittensor infrastructure, please check out Bittensor project reviewAlpha tokens can go up or down in value, but they also offer a chance for much higher rewards, especially in new or fast-growing subnets. It has more complex staking dynamics and comes with more risk, but also more opportunity if you're actively involved.

Source: Taostats.io

In both Root and Alpha staking, there’s no fixed lock-up period—you can stake or unstake your TAO tokens at any time. However, while your tokens are staked, they’re temporarily locked, which means you can’t trade or transfer them until you unstake.

In Root staking, staking rewards are simple and “stable”. However, the reward amount (APY) is slowly going down over time. It’s because the network is moving more rewards toward Alpha staking.

In Alpha staking, things work differently. You first change your TAO into special tokens called Alpha tokens, which are connected to subnets. When you hold Alpha tokens, your balance grows as and when the subnet earns daily rewards. The more TAO is staked into a subnet, the more rewards it gets. If you want to exit, you must convert your Alpha tokens back to TAO. This process can be affected by market prices and might give you less TAO back than you put in, depending on the timing. This method can earn you more than Root staking, but it depends on how well your chosen subnet performs and how much activity it gets.

With Root staking, your rewards are based on how well your validator performs in the network. In Alpha staking, you stake your TAO into a subnet, and your rewards depend on the overall performance of that subnet. Subnets that provide more value to the network receive more emissions, which increases your Alpha token balance.

Centralized staking

Centralized TAO staking, offered by platforms like Coinbase, is a simple and beginner-friendly option where the exchange handles the staking process for you. You earn a fixed reward rate of around 17.3% APY. While your tokens are temporarily locked during staking, there are no additional lock-up periods beyond what the network requires. The main trade-off between centralized and decentralized staking is convenience versus control.

Staking is a great way to put your TAO to work while contributing to the network's security. But, it's important to understand the terms before participating, as rewards and conditions may differ depending on the platform you choose.

 🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:
1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below 📲 or Click Here


🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
post photo preview
🧬VINDICATED! The Epstein Files Connect Gates, Pandemics & Censorship to a Globalist Blueprint for a Biosecurity State🧬

Every warning. Every documentary. Every article. Every post that got us banned. All of it was true. Now what? What can we do? Read on, share this Substack, help us save lives! The Light is shining! ✨

Well, well, well… look what the cat dragged in.

Actually, scratch that. Look what the Department of Justice finally dragged out of Jeffrey Epstein’s email inbox and dumped on the world’s doorstep like a rotting corpse nobody wanted to claim. Yep, that’s right. The Epstein files. It’s hilarious how the “Democratic hoax” and “fantasy” client list we were all told didn’t exist suddenly became a very real, very unsealed document.

For years—years—they called us conspiracy theorists. They slapped “misinformation” labels on our posts faster than Pfizer could print liability waivers. They kicked us off platforms, lied about us in the media, and shadow-banned our reach. Meanwhile, the real conspiracy—the one typed out in black-and-white emails between billionaires, bankers, and a convicted pedophile—was sitting in a government vault, waiting to prove us right.

And now? Now the receipts are public.

The release of Jeffrey Epstein’s files has done far more than expose a network of elite pedophilia and blackmail—it has vindicated truth-tellers like us and countless others who were smeared, censored, de-platformed, and persecuted for warning about the sinister agendas of the globalist elite. The documents reveal shocking connections between Epstein, Bill Gates, pandemic planning, and the systematic suppression of anyone who dared to connect the dots.

We weren’t crazy. We were just early. And they hated us for it.

Epstein, Gates, and the Pandemic “Business Model” They Built Together

One of the most damning revelations from Epstein’s files is his partnership with Bill Gates. Forget the carefully crafted PR spin about “regretting” those meetings. These weren’t casual dinners. These were planning sessions.

Back in 2015, Gates and Epstein exchanged emails about “preparing for pandemics” and strategies to “involve the WHO.” Gates wrote: I hope we can pull this off.”

How’s that for a chill down your spine?

This eerily foreshadowed the 2019 Event 201 simulation—a pandemic exercise hosted by the Gates Foundation, Johns Hopkins, and the World Economic Forum that just happened to model a global coronavirus outbreak… just months before COVID-19 ”mysteriously” emerged in Wuhan. Funny how that works, isn’t it?

But let’s rewind even further, to the real blueprint—the financial architecture that made the pandemic response not just possible, but profitable.

The story crystallizes in a chilling 2011 email exchangeJuliet Pullis, a JPMorgan executive under then-chairman Jes Staley, emailed Jeffrey Epstein with a list of detailed questions. The source? “The JPM team that is putting together some ideas for Gates.

The questions were precise: What are the objectives? Is anonymity key? Who directs the investments and grants? This wasn’t JPMorgan consulting an expert; it was a trillion-dollar bank asking a convicted felon to architect a billion-dollar philanthropic fund for Bill Gates.

This wasn’t JPMorgan consulting a philanthropic expert. This was a trillion-dollar bank asking a convicted felon to architect a billion-dollar philanthropic fund for one of the richest men on Earth. Let that marinate for a moment.

Epstein’s reply was fluent and commanding. He described a donor-advised fund with a “stellar board” and ties to the Gates-Buffett “Giving Pledge.” He noted the billions already pledged and identified the gap: “They all have a tax advisor, but have no real clue on how to give it away.” His solution? JPM would be an integral part. Not advisor… operator, compliance. Staley’s response: We need to talk.

By July 2011, the plan evolved. In an email to Staley, copying Boris Nikolic (Gates’ chief science advisor), Epstein laid out the core pitch: A silo based proposal that will get Bill more money for vaccines.”

Not “more research for pandemics.” Not “better public health infrastructure.” More money for vaccines.” This is the unambiguous language of capital formation, not charity. It reveals the structure’s intended output planning reached the highest levels.

In August 2011, Mary Erdoes, CEO of JPMorgan’s $2+ trillion Asset & Wealth Management division, emailed Epstein (while on vacation) with additional operational questions.

Epstein’s reply was breathtaking in scope:

  • Scale: “Billions of dollars” in two years, “tens of billions by year 4.”

  • Structure: Donors choose from “silos” like mutual funds.

  • The Kicker: However, we should be ready with an offshore arm — especially for vaccines.”

An offshore arm. For vaccines. For a charitable vehicle. Let that sink in.

So, by the time the world was panicking in March 2020, the financial machinery was already built. The investment vehicles, the donor-advised funds, the reinsurance products at places like Swiss Re, and even the simulation playbooks were dusted off and ready to go.

The pandemic wasn’t an interruption to their business—it was the Grand Opening.

Epstein’s role extended far beyond trafficking; he was a facilitator and blackmail operative for the global elite. The same forces that orchestrated the COVID-19 power grab—the mask mandates, lockdowns, censorship, and coercive mRNA push—are the ones who silenced critics like us.

Gates, despite his documented ties to Epstein (multiple flights on the “Lolita Express” after Epstein’s 2008 conviction), walks freely. He’s on TV. He’s advising governments. He’s still funding “global health initiatives” and pushing digital IDs, vaccine passports, and climate lockdowns.

Meanwhile, people like our friend, Joby Weeks, are under house arrest without charges, and voices like ours were de-platformed, demonetized, and destroyed for saying this very thing.

We told you. You knew it in your gut. Now you have the emails.

Censorship: The Elite’s “Misinformation” Label to Cover Their Crimes

The Epstein files expose not just criminal behavior, but the playbook for the systematic suppression of truth. While Epstein’s powerful friends were being protected by the FBI, the DOJ, and the media, platforms like Facebook (Meta), YouTube (Google), and Twitter went to war against anyone talking about it.

Think about the sheer audacity.

We were banned from social media for calling COVID-19 a “fake pandemic” and exposing the vaccine injury data that’s now undeniable.

Below is a screenshot of the first Facebook post that was taken down and then used as “Exhibit A” in their “reports” about how bad we were, naming us the 3rd most dangerous people on earth after Dr Joseph Mercola and Bobby Kennedy in the digital hit list they called the “Disinformation Dozen.” They attacked us, lied about us, and pressured the media, social media, and population at large to do the same: attack, threaten, and cast us out.

We were labeled “dangerous” for sharing emails, documents, and research that the DOJ and the CDC have now confirmed.

It was never about “safety.” It was about narrative control.

The same institutions that turned a blind eye to Epstein’s crimes for decades—the same ones that let him “commit suicide” in a maximum-security prison with cameras conveniently malfunctioning—suddenly became the ruthless hall monitors of “acceptable discourse,” ensuring only their approved stories could be told.

Big Tech, Big Media, and Big Government are all part of the same protection racket. They shielded Epstein’s client list, and now they shield the architects of the pandemic debacle. Independent journalists, researchers, and health advocates like us, who connected these dots, were systematically de-platformed, demonetized, and destroyed.

Why? Because we were right, and that was the greatest threat of all.

When you’re over the target, that’s when the flak gets heaviest. And brothers and sisters, we were getting shelled.

They Lied About Us While Protecting the Real Criminals

Let’s be crystal clear about what happened here.

We have spent decades exposing the cancer industry, Big Pharma’s corruption, and the suppression of natural health solutions. We produced The Truth About Cancer docu-series, reaching millions worldwide. We warned about vaccine injuries, censorship, and the coming medical tyranny years before COVID-19.

And what did they do? They called us “Conspiracy Theorists,” “Anti-Vaxxers,” and “Killers.” Dangerous.

They said we were killing people with “misinformation.”

Facebook banned us. YouTube deleted our videos. Legacy media ran hit pieces. PayPal froze our accounts.

All while Bill Gates—a man with documented ties to Jeffrey Epstein, who flew on his plane multiple times after Epstein’s conviction, who got STDs from Russian girls Epstein provided for him for which Gates asked Epstein’s help getting him antibiotics to slip secretly to his then wife, Melinda, so that she would not know about his inexcusable and perverted escapades—yes, THAT Bill Gates—was at the same time, being platformed on every major news network as the world’s health oracle.

All while Anthony Fauci—who funded gain-of-function research in Wuhan through Peter Daszak and EcoHealth Alliance, who lied under oath to Congress, who flip-flopped on masks, lockdowns, and vaccines—was treated like a saint. Time Magazine’s “Guardian of the Year.”

All while Pfizer—a company with a $2.3 billion criminal fine for fraudulent marketing, bribery, and kickbacks—was given blanket immunity from liability and billions in taxpayer dollars to produce a vaccine in record time with no long-term safety data.

Were we the dangerous ones?

No.

We were the truthful ones. And that made us the enemy.

The Weaponized Institutions: From Epstein’s Blackmail to Your Digital ID

Epstein’s operation was never just about blackmail for perversion; it was blackmail for control. The files show his cozy ties to intelligence agencies (Mossad, CIA), financial giants like JPMorgan and Deutsche Bank, and political leaders across the globe.

This is the same cabal now pushing:

  • The Great Reset

  • Digital IDs

  • Central Bank Digital Currencies (CBDCs)

  • 15-minute cities

  • Carbon credit social scoring

  • Vaccine passports

Let’s connect the dots they desperately don’t want you to see:

Financial Control:

JPMorgan banked Epstein for years despite clear red flags—over $1 billion in suspicious transactions flagged internally and ignored. They knew. They didn’t care. They paid a $290 million fine and moved on.

Now, banks like Bank of America, Chase, and PayPal de-bank conservatives, truckers, health freedom advocates, and anyone who questions the narrative. Canadian truckers. Gun shops. Crypto entrepreneurs. The goal is the same: punish dissent and control economic life.

CBDCs are the endgame—a digital leash on every citizen. Programmable money that can be turned off, restricted, or expired. Social credit by another name.

Medical Tyranny:

The FDA, CDC, and WHO—utterly captured by Big Pharma—lied about:

  • COVID origins (Wuhan lab leak dismissed as conspiracy theory)

  • Vaccine efficacy (”95% effective” turned into “you need boosters forever”)

  • Natural immunity (ignored despite being superior)

  • Early treatments (ivermectin, hydroxychloroquine, vitamin D censored and mocked)

They attacked natural health advocates just as they’ve done for decades with cancer cures, detox protocols, and anything that threatens Big Pharma profits. They are not health agencies; they are profit-enforcement arms dressed in lab coats.

Political Corruption:

Epstein’s blackmail ensured elite immunity. His client list includes presidents, princes, CEOs, scientists, and media moguls.

Meanwhile, true dissidents—Julian Assange (tortured in prison for journalism), Edward Snowden (exiled for exposing mass surveillance), and journalists like us—face persecution, imprisonment, debanking, slanderous hit pieces, and/or constant character assassination.

Two systems of justice: one for them, one for you. One for Epstein’s friends, one for truth-tellers.

The Way Forward: They’re Exposed. Now It’s Time to Build.

The Epstein files are more than proof; they are a declaration that the system is rotten to its core. But here’s the beautiful part: they vindicate us completely.

Every warning. Every documentary. Every article. Every post that got us banned. All of it was true.

The globalists’ grip is weakening. The truth—the real, ugly, documented truth—is erupting from the very files they tried to hide. They labeled us liars, but the emails show they were the architects. They silenced us, they censored us, but that only made our voices more necessary.

Epstein did not kill himself. COVID-19 was not natural. The vaccines were not safe or effective. The censorship was not about protecting you—it was about protecting them.

And now? Now it’s time to use this vindication as fuel. Not for revenge, but for revolution. A revolution of truth, health, freedom, and justice.

They tried to bury us. They didn’t know we were seeds.

The Epstein files are a smoking gun. A paper trail. A confession written in emails, financial structures, and offshore accounts.

They prove what we’ve been saying all along:

  • The system is rigged.

  • The elites are criminals.

  • The pandemic was planned.

  • The censorship was coordinated.

And we were right. 👍

Source

🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:
1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below 📲 or Click Here


🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
See More
Available on mobile and TV devices
google store google store app store app store
google store google store app tv store app tv store amazon store amazon store roku store roku store
Powered by Locals