🇳🇬🇮🇱🇸🇩 Is the Proof-of-Weapons Network Weaponizing Christians? | #BitcoinHardTalk Ep.105

Nov 07, 2025
 

Not got time to watch the full episode? Watch the TLDR. 

Hey hey Bitcoin Wealth Builders!

Welcome to the summary of BitcoinHardTalk Episode 105, which aired on Friday, 7th November 2025. This week, we peel back the layers of mainstream narratives to explore how the "Proof-of-Weapons Network" is weaponizing religion to mask a fundamental global power shift. They are using the public as useful idiots to justify propping up the dollar with more death and destruction while they manage a controlled transition to a multipolar world.

This post breaks down the episode into four key parts: This Week in Bitcoin, This Week in Macro, This Week in Geopolitics, and a special feature summarizing my recent interview with Robert Breedlove.

Part 1: This Week in Bitcoin - Will Quantum Computing & Other Attacks Take Down Bitcoin?

My core thesis is that Bitcoin is not just robust; it's an anti-fragile network. It is designed to exist in a constant state of attack, growing stronger and more resilient by responding to every threat thrown at it.

The Quantum Computing Threat

Quantum computing is a legitimate existential threat to all modern cryptography, not just Bitcoin. It affects everything from the banking system and nuclear power plants to the very fabric of the internet. The specific risk to Bitcoin is that a sufficiently powerful quantum computer could theoretically use Shor's algorithm to derive a private key from its corresponding public key.

Experts estimate that 5 to 10 million older Bitcoin wallet addresses could be exposed to this theoretical attack. However, the open-source community is already building a multi-layered defense system.

Bitcoin's three-layer defense system includes:

  • Quantum-Resistant Addresses: Work is actively being done on P2QR (Pay-to-Quantum-Resistant) and the BC1R address format, detailed in Bitcoin Improvement Proposal BIP 360. These upgrades are designed to keep public keys hidden on-chain, shielding them from quantum attacks.
  • Post-Quantum Signatures: New signature algorithms are being developed to replace the current standard (ECDSA). One of the leading candidates is ML-DSA-SPRINGS+, designed to be secure against attacks from both classical and quantum computers.
  • Signature Aggregation: Quantum-resistant transactions are larger and more expensive. Tools like op_cv are being developed to aggregate signatures, allowing multiple inputs to share one signature. This will cut transaction fees by approximately 75%, making quantum-resistant security economically viable for everyone.

The roadmap for these upgrades is already in motion. 

We are currently in the implementation and review phase (2025), expect drama and debate around post-quantum signatures between 2025-2027, and optimization of these features from 2027 onwards. This timeline aligns with the global standard for quantum compliance, which is targeted for 2030-2035.

A Live Look at Other Attack Vectors

Quantum computing is just one of many attacks the network faces daily. Here are others happening in real-time:

  • Legal Attacks: The Genius Act and Clarify Act are designed to target privacy tools like CoinJoin and the use of unique addresses for each transaction. The ongoing court case against the developers of Samurai Wallet is a critical battleground that will set a precedent for the principle of "code is speech."
  • Public Company & Treasury Attacks: Publicly traded Bitcoin treasury companies are being framed as "financial weapons of mass destruction for Wall Street." A recent example is the company Sequin, which was forced to sell its Bitcoin due to treasury mismanagement. They masked this failure with a 'word salad' explanation, calling it a 'strategic asset reallocation' that 'enhances financial flexibility'—a textbook example of how Wall Street uses complex language to disguise the fact that they over-leveraged the company and were forced to liquidate the very asset they promised to protect. This is the PoWN's classic playbook: entice participants with leverage and then use that leverage to seize the underlying asset during an engineered crisis.
  • AI & Mining Convergence: We are seeing a trend of public Bitcoin miners (like IREN) partnering with AI giants (like Microsoft). In these deals, miners get access to high-end chips that are in short supply, while AI companies get immediate access to vast data centers and cheap energy contracts. This creates a dependency loop where the supposedly decentralized security layer of Bitcoin becomes reliant on the centralized corporate giants of the PoWN.
  • Wall Street & ETF Attacks: Wall Street continues its campaign to centralize Bitcoin through ETFs and custody solutions. BlackRock now holds approximately 800,000 BTC for its clients, and retail brokerage giant Charles Schwab has announced plans to launch crypto trading in the first half of 2026.
  • Tax Attacks: A new bill proposed in France aims to tax "unproductive wealth," which could include crypto, art, and even primary homes, with a 1% annual tax. This tax would be due regardless of whether the asset is sold, forcing holders to sell their assets just to pay the government.

How Are We Doing? The State of the Network

Despite these attacks, the network's distribution remains overwhelmingly in the hands of individuals.

Holder Type

Percentage of Total Supply

Retail Holdings

71.75%

ETFs

7.07%

To Be Mined

5.03%

Satoshi Wallets

5.22%

Public Companies

4.45%

Governments

2.64%

Private Companies

2.03%

DeFi

1.25%

Mining Companies

0.52%

At a price of $100,000, Bitcoin's market capitalization stands at $2.32 trillion, representing approximately 2% of all global money.

However, the most important metric for network health is the hash rate. Despite a 20% price correction from its all-time high, the hash rate is at a new all-time high. This signals that miners have a strong, long-term conviction in the network's future, and it remains more secure than ever.

Part 2: This Week in Macro - How AI Is Reshaping the Job Market & the Economy

My macro perspective is that the US is run by a "uni-party" that serves the interests of the Proof of Weapons Network. This network is executing a strategic destabilization campaign to manage a controlled transition from a US-centric world to a multipolar one.

The Government Shutdown and the Debt Ponzi

The ongoing government shutdown is manufactured political theater. The left and right, both controlled by the same corporate lobbies, are simply arguing over how to distribute the next tranche of newly printed money to prop up the debt-based Ponzi scheme.

The immediate impact is a liquidity freeze, as the Treasury General Account (TGA) swells with funds that aren't being paid out. This creates a credit squeeze in the private banking sector. In response, the Federal Reserve has quietly injected $125 billion in liquidity over the last five days alone to prop up the system.

This all serves the massive debt-based Ponzi scheme. The scale of this system is evident in the latest household debt figures:

  • Total Household Debt: $18.6 trillion
  • Mortgages: $13.1 trillion
  • Auto Loans: $1.7 trillion
  • Student Loans: $1.7 trillion
  • Credit Card Debt: $1.2 trillion

The AI Automation Shock

This October saw the highest number of layoffs in 22 years, with over a million jobs lost this year alone. According to company reports, the top reasons given were:

  • Cost Cutting
  • Artificial Intelligence

AI-driven automation is the deflationary force being deployed to counteract the massive inflation created by fiscal dominance (uncontrolled government spending) and money printing. This is happening alongside a massive "AI Bubble," where government-subsidized deals are fueling staggering valuations. OpenAI has signed contracts with Amazon (38B), Nvidia (100B), and Microsoft ($13B). This isn't capitalism; it's socialism for the large corporations.

This manufactured economic chaos, fueled by a 'debt-based Ponzi scheme,' is not an accident; it is the financial engine that powers the global geopolitical maneuvers of the Proof of Weapons Network, which we will deconstruct next.

Part 3: This Week in GeoPolitics - How Nigeria, Israel & Sudan Reflect a Global Shift in Power

The central argument here is that the Proof of Weapons Network is using religious conflict as a powerful narrative to divide and conquer the public. This narrative provides cover while the network manages a strategic handover of power in key geopolitical regions to China, BRICS, and the Gulf Cooperation Council (GCC).

Deconstructing the Nigeria Narrative

Trump's recent threat to intervene in Nigeria to "save the Christians" is pure theater designed to fool useful idiots. Here is the context: Nigeria is a nation of 250 million people, split roughly 50% Christian and 50% Muslim. The violence driving the narrative comes from Boko Haram, an offshoot of ISIS, which has functioned for decades as a Western-backed militia used to destabilize the region for resource extraction.

“Nigerians, both Christians and Muslims, are being killed by foreign-backed militia groups that call themselves Muslims so that Chevron, Exxon Mobile, Palantir and the financial industrial complex can negotiate better terms on the resources, because all the local businesses are working with China and America and the IMF are losing interest. So, we're managing an exit.”

Israel and Sudan: Pawns in a Global Reset

In my opinion Israel is being strategically turned into a "toxic asset." Its primary backers in the financial industrial complex now see far greater profit potential in partnering with the massive sovereign wealth of the Gulf countries. The old model of perpetual conflict is being replaced by a new model of regional stability, brokered by powers like China and the GCC.

Simultaneously, the sudden mainstream media focus on the humanitarian crisis in Sudan is a calculated geopolitical tactic. Its purpose is to apply pressure on the UAE, a key GCC member, to gain leverage in negotiations over regional gold flows and the future stability of the region.

The overarching trend is clear: we are witnessing a quiet US/European retreat from Africa and the Middle East, a shift toward regional stability brokered by China, and, for the first time in centuries, the rise of the Global South.

Part 4: Robert Breedlove interviews Simon Dixon - They Control Everything: The Hidden Masters of Money and War

This section summarizes the key insights from my recent, wide-ranging conversation with Robert Breedlove, where we went deep into the power structures that shape our world.

  • The Proof of Weapons Network (PoWN): This is the network of corporate interests—financial, military, and technical—that sits above government. It is built on a "debt-based Ponzi scheme" where crises and wars are engineered to create more debt, which is the source of its power.
  • The Illusion of Democracy: Politicians and governments are "subordinate" to the PoWN, controlled through a sophisticated system of lobbies and funding. Changing the politician in office makes no difference because they all ultimately work for the same corporate masters.
  • The Masters of the Network: At the top of this hierarchy are the asset managers: BlackRock, State Street, and Vanguard. Through ETFs and pension funds, they control the board seats and voting rights of nearly every major corporation on the planet. They use advanced AI systems like Aladdin to manage this global portfolio of power.
  • The Multipolar Shift: The world is strategically shifting away from US dominance because the old model is no longer sustainable. The PoWN is managing this transition, as competing powers like China offer a less predatory model for development (the Belt and Road Initiative vs. the debt-slavery model of the IMF).
  • Bitcoin as the Resistance: Bitcoin is the only tool for a peaceful boycott against this system. This resistance is only effective with self-custody. ETFs, public Bitcoin companies, and borrowing fiat against your Bitcoin are traps designed by the PoWN to co-opt the revolution, absorb your assets, and make them even more powerful.

Your Only Vote That Matters: A Call to Action

The information in this episode presents a clear choice. You can either empower yourself and join the peaceful resistance through Proof of Work, or you can empower the establishment and fall into the trap of the Proof of Weapons Network.

Your vote is cast with your money. Here’s what the two ballots look like:

Proof of Work (The Resistance)

Proof of Weapons Network (The Trap)

Self-Custody & Sovereignty

ETFs & Custodians

Running Your Own Node

Public Treasury Companies

Unlevered Asset

Borrowing Fiat Against Your BTC

Boycotting the System

Funding the System

It is an emergency. Learn how to achieve true monetary sovereignty.

Access the completely free eight-module self-custody course created by myself and Andreas Antonopoulos.

Watch On YouTube

Listen to the podcast on Apple Podcasts or Spotify.

Peace, 



Simon Dixon 🚀
Bitcoin OG | Investor | Geo-Political & Financial Analyst