The chromopill

This was originally a Substack post. I would like to congratulate zxq9 on contracting me as his new star columnist. This is a major milestone for his publication, and you should all be proud of him.


Every system that works rests upon a foundation of useful lies.

There are three stages in understanding this

  1. Blue pill: believes the useful lies.
  2. Red pill: sees why the useful lies are lies.
  3. Green pill: sees why the useful lies are useful.

Step 2 is the worst place to be. This is where the likes of Richard Dawkins and Michael Malice find themselves. It’s where the postmodernists found themselves during the high deconstructive phase.

If you fail to take the green pill then you turn into an anti-theist, a bitwit, a lolbert, or a woketard. And nobody likes those people.

On the other hand, if all you take is the green pill, then you glow in the dark, which increases your risk of being involved in a car accident.

I stole the nomenclature from Norman Wildberger. Wildberger discovered a new area of math called chromogeometry. You start by considering three planar geometries:

  1. Blue geometry: this is the Euclidean geometry you learned about in high school
  2. Red geometry: this is a (special) relativistic geometry
  3. Green geometry: this is the red geometry rotated by 45 degrees

Each geometry is interesting on its own. However, the real magic comes when you consider all three at once. That is chromogeometry. Likewise, to be chromopilled is to understand all three pills simultaneously, and that’s where you see the real magic.

By the way, if you aren’t familiar with Norman Wildberger, familiarize yourself. I’m going to be referencing him a lot. Wildberger is to math what Satoshi was to money. And Wildberger is still alive, and still producing new shit. Links below.

The metaphor works on many levels, especially if you understand chromogeometry (which you will if you subscribe). For instance, the green pill is in a sense just a different perspective on the red pill.

Examples of people I perceive to be chromopilled: Craig Cannon, Minor Dissent, Eric Weinstein, James Lindsay, Peter Thiel.

There is a utility to the redpilled people. The red pill is a necessary step to the green pill, then to the chromopill. More importantly though, a preponderance of redpills is a sign that the useful lies are no longer believable. Which means you need better lies.

So our mission is to develop better lies.

There’s two areas where I focus my attention on developing better lies:

  1. Entropism. Craig Cannon and I have created a chromopilled theology called Entropism. We’ll talk about Entropism more in the future. If you’re impatient, check out Cannon’s Rumble (link below), particularly the mutual capacity for violence video.
  2. QAnal. QAnal (short for “rational analysis”) is my divine intellect fork of CIA mathematics. We’ll talk more about QAnal in the future. If you’re impatient, check out my Rumble (link below)

While I still have you, let me convince you of the point I started with: every system that works rests upon a foundation of useful lies.

We’ll start with a quote from a nigger who didn’t write his own compiler:

If you have ever done any security work and it did not involve the concept of network of trust, it wasn’t security work. It was masturbation.

Let me give a concrete example.

Right now I’m typing stuff in to Substack. My connection is “secure” (whatever that means). I can tell because I see the little lock symbol next to the URL in Firefox.

The lock symbol means that

  1. My browser is actually talking to Substack’s server, not an impostor.
  2. Man-in-the-middle attacks are impossible, or at least very difficult.

Crucially, I trust the little lock symbol.

But what does the little lock symbol mean?

It means

[~] % openssl s_client -connect doctorajaykumar.substack.com:443 -showcerts
CONNECTED(00000005)
depth=2 C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root
verify return:1
depth=1 C = US, O = "Cloudflare, Inc.", CN = Cloudflare Inc ECC CA-3
verify return:1
depth=0 C = US, ST = California, L = San Francisco, O = "Cloudflare, Inc.", CN = sni.cloudflaressl.com
verify return:1

Roughly this means

  1. Cloudfare trusts Substack
  2. Cloudflare trusts Cloudflare
  3. Baltimore CyberTrust Root trusts Cloudflare
  4. Firefox trusts Baltimore CyberTrust Root
  5. I trust Firefox

By the transitive property, I trust Substack.

The word “Root” there is important. There are a small number of “Root Certificate Authorities”. Their public keys are either pre-installed on your computer or ship with your web browser. Root Certificate Authorities are trustworthy by definition. And as we all know

This is an example of a useful lie. It’s obviously false if you think about it for literally one second. But it’s believable enough to allow things like e-commerce and online banking to exist. That’s the measure of a useful lie.

There are examples of this system being abused in the obvious way. The government of Kazakhstan requires you to install their root certificate in order to connect to the internet. Lenovo (a Chinese company) was caught selling PCs with pre-installed CCP root certificates. For the lemmings, this means they can read all your traffic.

Nonetheless, these violations of trust are rare enough that the myth of “secure HTTP” is still believable. People feel comfortable using HTTPS to do online banking. People have even been known on occasion to suggest that we should vote online.

Every security system works this way. It’s fucking stupid, but it works.

It’s not just security systems. If you care to look around, you’ll see this structure everywhere. Literally fucking everything with a logical structure works this way. It just goes by different names depending on the field.

Security works this way: nodes trust nodes which trust nodes which ultimately trust root nodes. In security this structure is called web of trust.

The law seems to at least sort of work this way: lawyers trust courts which trust higher courts which trust SCOTUS who allegedly trusts some linear combination of precedent plus the Constitution. I don’t know what this structure is called in the law. Probably some faggy Latin phrase.

Computing works this way: procedures trust procedures which trust procedures which ultimately trust compilers. This is why it’s important to write your own compiler. In computing this structure is called modularity.

Math works this way: theorems trust theorems which trust theorems which ultimately trust axioms. Implicitly there’s some vague poorly-defined trust in “logic” that supposedly makes this entire exercise “rigorous”. In math this structure is called axiomatics.

Axiomatics is retarded for many reasons (future post). One reason is that axiomatics is merely an instance of this more general and sharper idea.

This sharper and more general idea is called a rewrite system.

A rewrite barrier is one of the layers in the rewrite system. An example of a rewrite barrier is the little lock symbol

The lock symbol takes a very complicated cryptography scheme and rewrites it into a binary: is this website good or bad?

According to Firefox, my Substack is good, whereas this malicious website is bad:

I’ll have a lot more to say about rewrite systems in the future. It is the central idea in both QAnal and Entropism.

For now, I hope you learned something.


Every operation, calculation, and concept, no matter how arbitrarily complex, reduces to adding integers together. There are no new concepts in QAnal. Everything is just putting lipstick on adding integers together.

— Dr. Ajay Kumar PHD, The Founder.

The Founder loves you.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.