Turmoil of doubt

We all have it, at times and some more often we doubt. Whenever I see such doubt I think back to a story that I heard in primary school. It was about Lakshmi and the greedy beggar. You might have guessed it, or perhaps you know the story. The beggar just wants in the end one coin more and ends up with nothing. This is a setting we know where it goes, but now let’s change the premise. I could end up with $3.7 billion over 3-5 years of Google, Amazon or Huawei buys my IP. I could optionally make $250,000 if I publish an idea of intrusion I have. An idea they all overlooked and could give a certain wall street player the insight on certain patents that would be accepted within 30 days. With this method I speculatively could make another 3 million, yet that would also mean that I can no longer rely on the larger amount to ever become mine. What would you do? The small amount now or hoping for the best? I am not breaking any laws, because I am showing a flaw, two actually and the law has close to no chance of finding substantiative evidence. So I am basically in the clear. So what to do?

Well, I am also a story teller, so here goes (it was a simple riddle).

Between a larger technology firm and a patent office is a link, they mail and they take all the precautions. The messages go from router 1 to router 2 via what some might know a router table. Now no matter what the path is, at some point it will go via router N1. That is how the beans take the high or low road. So I got the idea to place a listener to ANY router one jump away from Router N1, so it could be almost anywhere. That place we call Router X0, it was my idea for the Hop+1 solution. There is a second part, this part means we need to get to that router somehow, whether it is internal solutions of intrusion. The idea was to replace the CF card in that router with an identical one, but there is one difference, it might state 64MB, but it has 256GB and one small internal component sets the 64MB apart and the rest is a floating drive. The floating drive has its own dynamic and it installs a small program in the memory of Router N1, that program will copy EVERY packet directed to Router 2 towards Router X0. There is almost no chance to detect it, when someone resets it, the program is gone, the evidence is gone. The memory card will unless dissected not show anything and there too is nothing to show what is going on, the CF card will know when it can forward packets to the end station when it can hide in other traffic, unless a System administrator reads the ENTIRE log, there is nothing to see. The receiver now has a collection of packets of traffic from Router 1 to Router 2, which also includes a message that Patent acceptance was achieved, the Wall Street Firm now has an advantage to place the right options and stock ahead of all the others and when the rest catches on the larger profits are raked in. 

A setting of not so speculative anticipation of profit and when the deed is done, both routers are reset and the evidence is gone forever. There is one remaining part, that is the CF card, yet id that went to an empty mobile station that might not be the problem, the only issue is getting the card back, leave no evidence behind. These System administrators are often underpaid, so that might not be an issue either. 

An idea that I had when I was wondering how Sony was transgressed upon, because there was no way that North Korea had that level of know how. In this setting it was an internal setting, optionally a disgruntled employee, but it was all speculative from my side, it felt more realistic than North Korea with its lack of technology. 

So will I doubt? Yup, I will remain hopeful the three true innovators will take my IP, if not, ah well. Still time to make it all public domain, what Wall Street tends to call pubic domain, not sure why but there you have it. Have a great Monday!

Leave a comment

Filed under Finance, IT, Science

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.