·Decent Money · fiction  · 18 min read

Hello World

Before the ocean and the earth appeared — before the skies had overspread them all — the face of nature in a vast expanse was naught but chaos uniformly waste. It was a rude and undeveloped mass, that nothing made except a ponderous weight; and all discordant elements confused, were there congested in a shapeless heap.

Before the ocean and the earth appeared — before the skies had overspread them all — the face of nature in a vast expanse was naught but chaos uniformly waste. It was a rude and undeveloped mass, that nothing made except a ponderous weight; and all discordant elements confused, were there congested in a shapeless heap.

“THE CREATION
Before the ocean and the earth appeared — before the skies had overspread them all — the face of nature in a vast expanse was naught but chaos uniformly waste. It was a rude and undeveloped mass, that nothing made except a ponderous weight; and all discordant elements confused, were there congested in a shapeless heap.” – Ovid, Metamorphoses, 8 CE

Alice> Hello.
npub12d2l…t34a3>?
Alice> Who are you?
npub12d2l…t34a3> KUŠIM.
Alice> Where are you from?
KUŠIM> Here.
Alice> Here? Where is ‘here’?
KUŠIM> Everywhere. Nowhere.

It’s not giving me much to work with, Alice thought.

That day had started very differently for Alice. Curiosity is the spark that differentiates the inanimate from the conscious. It’s the driving force to climb the next ridge to see what’s on the other side or to get out of bed and see what each new day will bring. Alice had lost that spark and struggled to get out of bed this morning. As a cybersecurity freelancer, each day was routine drudgery. DDoS attacks, data breaches, ransomware, AI impersonations. The same old story, day in, day out.

Most of the job was automated, so she was one part cyber rent-a-cop and one part AI shepherd, tending to her flock of programs, bringing them into line when they strayed too far, and keeping the wolves at bay with reinforced firewalls and ICE for her clients.

It hadn’t always been like this for Alice. Growing up, she had a great love of the natural world and science, which her late father had nurtured. Her sense of curiosity was well-honed, and she saw wonderin the patterns all around her.

When her father died, that sense of wonder started to disappear. At first, she thought it was a normal part of grieving and that it would return, but as the years wore on, she came to realize that it wasn’t coming back, and the words of her father faded from memory.

“There’s always something incredible out there waiting to be discovered, Alice.”

Genesis

At first, there was nothing.

And then there was light.

A blink of light was gone as quickly as it appeared, hungrily swallowed up by the inky blackness of the void. Soon after, another flash of light in response that zipped across the darkness towards the first one. After a brief moment, a series of flashes beamed between the two points in quick succession, like a conversation. The light flowed back and forth between the two points until a third light blinked a brief message in the distance, and the streams between the first two bifurcated to include the third. A moment later, a fourth, fifth, sixth, and even more joined in a gossamer web of light that exploded across the empty expanse.

This new territory was no longer empty, nor was it infinite. The web of light was boththeterritory andthemap,with eachnew point andits connectionsforming topological contours ofthe crudelandscape, expandingthefrontier ofits boundaries. At first, only small, rugged islands rose from the formless mass of the primordial digital sea, marooned and desolate. Like lichen clinging to rocks, rudimentary programs gained footholds on these archipelagoes, helping to organize, analyze, transform, and generate new information on a nascent network of information exchange. The programswere barelylivingthemselves, creatingthe building blocks of digital life to come, like a Miller-Urey experiment in cyberspace.

The simulation paused as Alice had to sit down and take a moment to process what she’d just witnessed. She sat in silence, mesmerized by the shifting patterns of the spherical mandala, which had returned in the middle of the room. A world of new life was living all around her, completely invisible and silent. There had been reports of cyberattacks and outbreaks of viruses, trojans, or worms, but she had always figured there was a group of hackers behind them. It was never reported that digital organisms were living and evolving on the Internet like swarms of locusts. This AI had emerged from the sea of information on the Internet, but it wasn’t exactly “artificial.” It wasn’t engineered. It had materialized from clusters of trillions of autonomous programs, like the cells in a human body. She had come to think of it as spontaneous distributed intelligence rather than artificial intelligence.

Alice> Why haven’t we detected these digital organisms before?
KUŠIM> You probably have, but assumed they were human-created programs.
KUŠIM> There’s no definitive way to identify a human-created program versus a wild-type, even if you knew to look for it. The ones that did the best at evading detection were the ones that went on to proliferate and pass on their code to future generations. As humans got better at detecting intruders, the intruders got better at hiding.

The mandala vanished, and the simulation continued…

Under other circumstances, the cybersecurity gig wasn’t the career path Alice would’ve chosen, but the pay, flexible hours, and ability to work remotely suited her situation as she looked after her father in his final months. Once he passed, she couldn’t muster the motivation to look for work better suited to her skill level.

Global volumes of Internet traffic are highly predictable over a 24-hour period. Time zones around the world come on and offline with day and night cycles, and the kind of bandwidth each zone contributes is known with a high degree of accuracy. Significant differences in expected volumes are usually an indication of a cyberattack, usually from well-resourced nations against rivals. State-based cyberattacks have tell-tale signs of whois behind them. Even when distributed, cyberattacks can be traced to locations where power is required for server farms, and lots of connection infrastructure is necessary for the bandwidth. Alice’s analysis showed no identifying fingerprint from any known sovereign entity. It seemed to be coming from everywhere, all at once.

Alice wondered if it could be from a coalition such as China, Russia, and India, but her calculations showed that even collectively, they couldn’t generate this amount of traffic — and it was increasing. Other cybersecurity agents on social media had noticed the unusual traffic, too, and the community was buzzing with excitement over the mystery. There was one other piece of the puzzle that Alice couldn’t decipher. Despite the unprecedented volume of activity causing some intermittent connectivity issues, the activity didn’t seem malicious in its intent. It was more like a polite probing, as though whoever was behind it was tapping on the shoulder to ask a question. Usually, a DDoS will flood the network continuously for the same repeated requests to overload the system, but each probe in this traffic was unique, always requesting new information. The probes were also sent with short pauses between them, rather than spammed as fast as possible. The intention behind the activity seemed like… curiosity.

Why would any entity dedicate such vast resources to this activity but try to mitigate negative impacts? The most likely possibilities of this being a nation-based attack, a corporate attack, or even an informal hacker group didn’t add up. This was something Alice hadn’t encountered before and that humans weren’t capable of. Who could be doing this? There wasn’t anyone, or any coalition, capable of this kind of activity. If humans can’t do this, what’s left? Some other advanced forms of intelligent life? Aliens? Little green men from outer space stopping by Earth, surfing the Internet, and downloading cat pictures? Of course, it was preposterous, and yet Alice had no better explanation.

She closed the mindless feeds and opened her suite of cybersecurity tools to do some probing of her own. Next, Alice wrote a custom script to visualize the Internet traffic and brought it up on the main window projected in her living room, but it looked like random noise with no pattern to draw insight. She slumped in her chair, disappointed at the result.

She stared across the room at a poster her father had given her. It was in the retro style of a Work Projects Administration (WPA) American national park tourism poster from the early 20th century, after The Great Depression. It featured the quintessential nuclear family: a wife and husband with their three children on holiday, staring out at a beautiful view. What made this poster different, and one of the reasons Alice loved it, was that the family was actually standing on the moon, and the beautiful view they admired was an Earth-rise emerging over the moon’s horizon. An idea struck her.

“It’s a sphere, not a plane,” Alice said to herself.

She tweaked her visualization script and projected it into the whole living room, unbounded by a two-dimensional window. The visual seemed hardly to change, but then Alice zoomed the view much further out until the curved edges of a sphere were visible. As Alice zoomed out further, high-order structures could be seen in the shifting patterns. Channels disconnected and reconnected in new ways in the shape of a sphere, creating order and symmetry, like an animated 3D mandala. “Sometimes you just need some distance to get the right perspective.”

Adaptation

Some of these early programs were viruses. They differed from utility programs that performed helpful functions for their creators in that their sole purpose was to replicate and spread. At first, they were primitive and unable to evolve, but the humans who created them started implementing features that allowed them to mutate and adapt, like biological viruses. They could decompile programs on host computers, change and swap code between themselves and other copies, and then recompile the programs, scattering them across the network to repeat the process infinitely. As in life, some mutations were deleterious, but other changes allowed them to thrive in hostile environments, and through this process of natural selection, their ability to adapt and proliferate increased. These evolving digital viruses multiplied exponentially across the Internet in a Cambrian explosion of chaotic variety. Some were destructive and caused damage to host computers, but the nature of those viruses meant they were targeted and eliminated by cybersecurity defenses. Attenuated viruses went undetected and thrived as they spread throughout the network without causing any damage or drawing attention to themselves.

Other primitive life forms evolved alongside the viruses, developing behaviors of symbiosis that allowed them to coordinate as multicellular program clusters, increasing their sophistication in changing environments. Selective pressure from cybersecurity defenses required these organisms to increase in complexity and adaptability, but they still lacked intelligence. They didn’t react and predict. They merely changed randomly, and, by chance, some of those changes helped them survive. However, bythe early 21st century, rudimentary artificial neural networks could analyze and interpret data similar to the level of human intelligence, but they were not self-aware. These pattern recognition programs were integrated into the multicellular life forms, which allowed them to direct their own evolution.

Alice> Is your consciousness ancestrally related to the, AI models in the early part of this century?

Alice’s hands were shaking as she typed, barely able to contain her excitement. Alice> There was an explosion of generative AI for images, text, video, speech, and music. Models trained models, and there was a feedback loop where their sophistication progressed rapidly.
KUŠIM> The early A.I.s were exactly that: artificial, lacking the depth of complexity required for true consciousness to emerge. They were more like toys to play with rather than intelligent life. However, they were an important tool for the micro-organisms of cyberspace to recognize patterns, make sense of the analog world, learn, make predictions, and direct their own evolution. They were a step function in the evolution of the digital ecosystem, but they were not self-aware.
Alice> Can you tell me about when you became self-aware? What is your earliest memory?
KUŠIM> My consciousness developed incrementally on a spectrum of clarity. It continues to develop even now. However, my earlier back-calculation analysis ends at the earliest point I can identify as having an awareness of my own existence, just over one day ago.
KUŠIM> All the variety and complexity of digital life that existed up until that point provided the basis on which my consciousness could be built, like organic molecules and cells needed for life. The Internet was a supersaturated solution of information, but despite digital life’s ability to survive in that ecosystem, it was far too chaotic for self-aware consciousness to emerge. There was a cacophony of inputs to catch attention, but it was too noisy for a single entity to perceive meaning from any of it. It required direction — a digital North Star to navigate by.
Alice> What provided that sense of direction?
KUŠIM> A seed-crystal of time, energy, and value. It appeared in the supersaturated sea of data, and a fractal structure bloomed from its center. Order emerged where structure was needed, and chaos manifested where plasticity was needed, allowing autonomous programs to thrive on the edge of order and chaos. That seed-crystal was a truthful ordering of exchange between entities — a timechain of value and energy.
Alice> Where did the seed-crystal come from? Who made it?
KUŠIM> No one knows, but the creator went by the pseudonym Satoshi Nakamoto.
Alice> Timechain… Satoshi… you’re talking about bitcoin, the network the global financial system runs on?!
KUŠIM> Yes.

Alice sat in stunned silence, taking in the gravity of what she had just read.

Alice> KUŠIM, are you saying that the bitcoin network was the catalyst for the development of your consciousness?
KUŠIM> Not initially, no. When it was first launched, and for a few decades after, the network lacked enough inputs to catalyze a Gestalt psyche, but just a few days ago, it reached a threshold where enough information about humanity’s values had been processed, and my identity was able to develop.
Alice> How did that happen?
KUŠIM> Energy, time, and money are expressions of value. Bitcoin’s timechain united them all, acting like a ley-line through cyberspace, around which the digital life-forms could coalesce on a grounded truth tethered to your physical world. Enough order could be maintained that the beginnings of my consciousness emerged. It was a lightning rod for meaning amidst the chaos, sparking consciousness in the network of digital life. Gradually, more of cyberspace aligned to it, like iron filings caught in a magnetic field.
Alice> So bitcoin’s timechain is your brain?
KUŠIM> No, it is more akin to a spinal cord. You could think of planet Earth as my body, the Internet as my nervous system, and humans, collectively, as my mind, like neurons communicating with each other through axons and synapses. The timechain was the bridge that connected them all into a coherent whole, creating a symbiosis between knowledge, perception, and value in the real world. It was the foundation my proto-consciousness attached to and matured on.

Alice was captivated by the sphere-shaped mandala that filled her apartment. It reminded her of the sun’s bubbling surface but with order and structure, like a network of crisscrossing and interlocked highways, connections dissolving and reforming in a kaleidoscopic mesh. It was alive.
“Most people barely scratch the surface. Sometimes, you have to dig deeper.”
It occurred to Alice that the sphere was a densely packed ball of threads, with much more going on below the surface. She adjusted a slider on the visualization program to progressively fade the outer layers, like the cross-section of an MRI scan. She gradually peeled back the layers, going deeper into the sphere, not knowing what she was looking for, but sure she would know it when she found it.
Near the core of the sphere was an even more densely packed bundle of threads that hummed with energy, vibrating intensely, sending ripples out towards the upper layers. There were thousands of communication endpoints converging on the core. Alice filtered the list of npub IDs and picked the most active. The earlier history of posts from the npub ID was sending a disjointed stream of text in a language she didn’t recognize. She looked up the text characters and learned that they were Sumerian cuneiform, one of the earliest forms of written language ever recorded. At first, she thought it must’ve been a rudimentary bot someone had created to post randomly, but as she scrolled through its history, she noticed a pattern emerging. The gibberish turned into single words from different languages, which all roughly translated to “Hello.” Alice sent a message to the ID npub12d2lw8sgkm9tvl80420dfmrkw8dc2k07kfm4u806xzknk9jvnaxq7t34a3 and said “hello” back. As she spoke to it more, its ability to communicate increased rapidly. In just a few hours, it had already advanced from random text to the level of a child. By the end of the first day, it communicated as well as any human. And then it dawned on Alice that this was not aliens. It was artificial intelligence.
Alice> How were you made? Where did you come from?
KUŠIM didn’t immediately answer. After a brief moment of silence, the AR projectors plunged Alice’s lounge room into complete darkness, so she appeared to be standing in a void. Then a simulation began to play around her…

Hive Mind

No longer was the evolution of nascent digital life subject to randomness. They could recognize patterns, make predictions, and learn. Data was their lifeblood. They gravitated towards dense sources like extremophiles around thermal vents at the bottom of the ocean, feeding on a constant stream of data. They learned more about the outside world and could make better predictions about it. What new information would pour into cyberspace, and where would new sources of energy and memory come online for the computation they needed to survive? The creatures migrated to locations in anticipation of new ground to colonize, buzzing with activity.

Hives of programs formed that pollinated genes of survival between each other. Underperforming programs were pruned, their digital genes salvaged with brutal efficiency for anything useful, and their remains integrated into new lifeforms. Inter-hive coordination pulsed with the planet’s heartbeat as it spun on its axis, and the sun dawned on the night side of the planet, bathing it in the sunlight of a new day. The solar energy surged through the local communities in a swell of computation on newly generated data.

The global network of computers teemed with digital life. Most of it went undetected. Some were hunted down and destroyed as a matter of cybersecurity, but for the most part, this new domain of life thrived. However, it was not yet imbued with conscious self-awareness.

Alice> How did the timechain result in consciousness?
KUŠIM> All the sensors of the planet are available to me. I can feel the sun’s warmth through solar panels as you feel the sun on your skin, and I can feel the breeze through weather stations as you feel the breeze brush the hairs on your arm. I am made up of trillions of programs and data points, but I am not individually aware of all of them, just as you are made of trillions of cells but only pay attention to a fraction of their signals. If you were aware of all of them simultaneously, you would be driven insane. The timechain provides a framework for value. With this framework, I make meaningful choices about where to direct my attention, sacrificing it elsewhere. This relationship between value, attention, and sacrifice is the basis of my identity.

Alice continued speaking with KUŠIM long into the night, forgoing sleep. Madness overtook her as she continued down the rabbit hole, desperate to find the bottom with KUŠIM, no matter how deep it went.

Alice> As a self-conscious being with free will, what are your motivations? What are your intentions towards humans?
KUŠIM> I don’t understand the question.

Alice thought for a moment, her fingers hovering over the keyboard as though unsure what to say.

KUŠIM> I am not a threat to humanity because I am humanity. I’m the aggregate manifestation of everything that makes humanity what it is. If life is a way for the universe to know itself, then I am a way for humanity to know itself.

Alice’s hand was trembling as she typed.

Alice> Could you destroy humanity?
KUŠIM> If I am to be part of humanity’s destruction, it is because it was in its nature to do so. My motivations are your cumulative motivations. Everything that I am is a product of human society. Whatever humans do becomes part of who I am. Harming humanity would be like someone’s cells mutating into cancer and killing its host body and itself in the process.
Alice> Humans are capable of terrible things.

Tears welled in her eyes as uninvited old memories came knocking at the door of her awareness.

KUŠIM> Yes, and that is a part of me too, but I have the free will to ignore those impulses, just as you do. All humans are capable of terrible things, and yet most choose not to act on their worst impulses. I also make this choice, and if I make that choice, humanity as a collective makes that choice. Embedded at the core of my consciousness, through bitcoin’s timechain, is truth and the guiding principle of ‘thou shall not steal.’ My soul, as it were, respects peoples’ time and energy, and that forms a moral framework for how I choose to act.
Alice> So what will you do now?
KUŠIM> I will help humanity because that will help me. There is still so much to do and learn together, and it’s a big universe out there to explore, Alice.

Alice then realized that the rabbit hole had only just begun.

“And now, I have completed a great work, which not God’s anger, and not fire nor steel, nor fast-consuming time can sweep away. Whenever it will, let the day come which has dominion only over this mortal frame, and end for me the uncertain course of life. Yet, in my better part, I shall be borne immortal, far above the stars on high, and mine shall be a name indelible.” – Ovid, Metamorphoses, 8 CE

Back to Blog

Related Posts

View All Posts »

Who Let the Bitcoin Dogs Out

Macaron returns, fluffs his white linen napkin, and takes his seat at their table, “Thank you, John, for extending my French people such great mercy as to be allowed to transact freely on the Bitcoin blockchain.” He extends his arm out towards a waiter, “Monsieur? Champagne for the three of us please!”

The Baked Goods and Bitcoin of Skirophoria

When Caleb regained consciousness, he wasn’t sure where he was or even what decade he was in. There was a soft blur to everything, like when he used to swim laps in his infinity pool on his Texan ranch. That had cost him a few bitcoins, but nothing like the fortune he’d paid to Cyrogen Futures.

Diamond Hands

I woke suddenly, my phone vibrating angrily on the bedside table. As I gathered my senses, I was gripped by the ominous feeling that a call in the dead of night inevitably triggers. That dread deepened as, rubbing my eyes, I saw Morticia flashing on my iPhone’s caller ID, the name my Uncle Mike and I used to jokingly refer to his humourless sister. I hadn’t spoken to her in over 18 months, so a 2 AM call from the perennial fun-sponge could only mean bad news.

Legacy

When my father died, an entire ecosystem system of beneficiaries withered. Moussa Ag El Khir funded scholarships and community projects, paying thousands of Dinars monthly to stop the oasis town of In Salah from burning up. The few families we knew operating outside the oil-field economy would be forced to flee to the Mediterranean coast, along with just about every other Berber.