top of page


Code Security and Hardware Security
The code is designed around the Math Physics 12 order of operations of the total 19, see: Lead Edge Ash Tree Reflex.
Where if a physical chip has physical elevation compared to a different area of the chip or silicon board components, the code accounts for traditional coding security techniques to prevent intrusions that can alter current coding methods to cause physical damage by intervention of component performances that are of physics or mechanical nature. The optimization in the innovation only comes with new hardware design that allows for electron binary pulse flow for calculations to single pulse by the 12 Orders of Operations meaning the design and material or traditional silicon Atom Nuetron blueprints would have to be aligned by the sigma of the 12 order of operations then create the atom to start forming new silicon and other components.
​
bottom of page