Growthfroth

Investors: Are you ready for a replay of the

Dotcom Bust of 2000?

They say the stock market is frothy, that tech stock prices are not justified by earnings. While that may be true, the revenue sources of the tech industries are
even more frothy!

DEFINITION

Growthfroth, n.:

Unsustainable revenue increases generated by forcing poorly understood products and services into a credulous market.

syn., n: Theft.

“Are our members actually getting what they came here for? That question stopped being asked for too long. We were chasing growth.
When you chase growth, you get it, but then you lose it.

— Whitney Wolfe Herd, founder of Tinder and Bumble

 

The tech industries have been forcing sessions, clicks, page views — anything that will let them gather information about users’ habits, beliefs, relationships and vulnerabilities.

We call the whole thing “Silibandia”

A global nation consisting of Silicon Valley plus the broadband and media industries plus their feeders in the dark webbotnet buildingdata brokerageprivate equityventure capital and cybersecurity industries.

But things are changingSilibandia is about to hit the wall.
Both consumer and business markets are starting to catch on to the fact that they’ve been seen and treated by the tech industries as a bunch of chumps. Marks. Suckers.

You see signs of the change everywhere. Consumers are buying Linux laptops and using reliable, free software that doesn’t spy on them.

Businesses have historically been targets of FUD marketing –
Fear, Uncertainty and Doubt – which plays on their anxiety from unfamiliarity with computers.
But that has changed. Now the only remaining market that’s vulnerable to FUD marketing is
cybersecurity – because of the inherent fear around that subject. Cybersecurity is an LBI: a Lip Balm industry. Makers of lip balm have been sued for selling a product that deliberately worsens chapped lips, in order to build dependency.

The addictive “lip balm” of the cybersecurity industry is CTBG – security “solutions” (non solutions) based on
Catch-The-Bad-Guys assumptions. Experienced managers know that security in a physical office building isn’t achieved by asking the lobby receptionist to identify the bad guys – right?
Instead, they ask the receptionist to get some ID from visitors, and making sure everyone going past the lobby has an employee or visitor badge.
That’s the ABE set of assumptions – Accountability Based Environments.

Both consumers and business decision makers are getting smarter about technology. Going forward, platforms will be built on much less costly and far more effective
accountability-based methods, built on AC technology.

AC was invented in the 1970s by the same British signals intelligence agency that decades earlier shortened World War II by cracking the German Enigma codes.
You use AC technology every day when you go to a website whose address starts with https://.

AC technology is essential to Blockchain and dozens of other things we use all the time.

Silibandia doesn’t want you to know about AC’s potential to solve a multitude of problems caused by pervasive lack of individual accountability.
It’s has taken a heroic effort on the part of Silibandia to keep hidden the fact that this AC technology is just as effective at making human beings accountable as it is at making browsers and other objects accountable.
If they let that cat out of the bag it would quickly let people control the use of information about themselves.

That in turn would end the main revenue stream of the multi-trillion dollar set of industries called Silibandia!

 

Silibandia has started to become concerned by this new awareness of AC-based accountability methods among both consumers and businesses.
They’ve gone so far as to concoct an identity system that uses in a truly convoluted way in order to preserve their access to theft of your personal information.
By the way, an of professional licensing will also answer the concerns of those who fear thatartificial general intelligence.

Don’t get caught with your hard earned investment capital tied up in Growthfroth tech companies. Get out before this next bubble pops and leaves a frothy mess all over your portfolio!!

Frothy tech is about to yield to Authenticity Enabled tech, where real value is provided to customers and where sustainable profits replace visions of trillion dollar IPOs.

Learn more by signing up for our FREE half hour course entitled

Stay Informed. Stay Ahead.

“No problem can withstand the assault of sustained thinking.”

                                                                                                                                                 — Voltaire

🔒 YOU own the information that identifies YOU.
The operation of this website is governed by the ordinances of the City of Osmio, including its Privacy Ordinance.
View Privacy Ordinance

No Tracking Pixels or Beacons

Today's internet has become infested with hidden trackers — tiny “pixel beacons,” scripts, and device tracking tools designed to follow you without your knowledge.

As a Member Enterprise of The Authenticity Alliance, the operator of this website uses no tracking pixels, no beacons, and no covert identity-reporting mechanisms of any kind.

If we want to know something about you, we’ll ask — we won’t spy.
Learn About Spyfree

What is Authenticity™?

The word “Authenticity™” identifies a digital or physical space of “accountable anonymity” in which people enjoy both privacy for themselves and accountability from others.

Authenticity™ is the condition that exists in a space where there are

  • Digital Signatures Everywhere backed by
  • Measurably Reliable Identity Certificates that are
  • Owned by their Users and which provide
  • Privacy via Accountable Anonymity.

 

Learn about digital signatures and identity certificates in this short video →

What is The Authenticity Alliance?

We are an Authenticity Growers Cooperative

Similar to familiar agricultural cooperatives in the physical world, The Authenticity Alliance is a network of enterprises and individuals whose purpose is to “grow” Authenticity and bring it to the digital world.

Each Authenticity Enterprise—that is, each Member Enterprise of the Alliance—solves a particular inauthenticity problem in its chosen target market or audience.

What Does The Authenticity Alliance Do?

The Alliance brings together independent enterprises that share a common mission: creating spaces of accountable anonymity where digital signatures, reliable identity certificates, and privacy protection work together to solve real-world inauthenticity problems.

WHO is the Authenticity Alliance?

The Authenticity Alliance is comprised of two groups working together to promote trust and transparency across digital ecosystems.

  • Enterprises: Authenticity Enterprises that provide Authenticity solutions for the inauthenticity pains in a specific market or industry.
  • Individuals: People who understand the problems of inauthenticity that plague the world’s information systems and who want to help implement and promote Authenticity™ principles.

Authenticity Enterprises

Each is an Enterprise Member of The Authenticity Alliance

Individual Enterprise in The Authenticity Alliance

Customers and members of an Authenticity Enterprise are automatically eligible to become Individual Members of The Authenticity Alliance.You may also join directly as an individual Member here.