veritas Independent Assessment / Unclassified

What Is Actually Hidden An honest assessment of black-budget programs, shadow governance, and the UAP question

Prepared: 22 May 2026 · Standalone investigative brief · Separate from Grayson County / GYI corpus
Methodology: A/B/C/D evidentiary tiering · Prove or debunk — the truth is the truth

Contents

  1. The Premise — and the Trap on Both Sides
  2. Methodology — How We Decide What to Believe
  3. The Base Rate — Things That Were Hidden and Got Found
  4. Anatomy of Real Secrecy — How Classification Actually Works
  5. The Black Budget — What We Can Actually Count
  6. UAP / NHI — The Disclosure Era Timeline
  7. The Claim-by-Claim Matrix
  8. What's Real, What's Debunked, What's Open
  9. Pattern Analysis — What Hidden Things Tend to Be
  10. Verdict & Confidence
  11. How to Verify Any of This Yourself

The Premise — and the Trap on Both Sides

The question isn't "do hidden things exist." That's settled — they do, and we have receipts. The question is which categories of hidden things tend to be real, which tend to be embroidered, and which tend to be projection. A serious investigator works the priors, not the vibes.

Two failure modes corrupt almost every conversation about "shadow programs." The credulous mode treats every leaked PowerPoint, every anonymous airman, every grainy IR clip as load-bearing — building skyscrapers of inference on foundations of single-source testimony. The dismissive mode runs the opposite play: because some claims are absurd, all claims must be. Both modes are intellectual laziness. Neither survives contact with the documentary record.

What follows is an honest attempt at a third path. We treat each claim like a GYI investigation thread — same A/B/C/D tiering, same evidentiary standards. If a claim earns a Tier A on the public record, we say so. If it earns a Tier D, we say so. If a claim is genuinely unresolved, we name what would resolve it.

Most "shadow government" claims fail not because reality is mundane, but because the actual hidden architecture is more specific, more legal, and more boring than the conspiracy demands.

Methodology — How We Decide What to Believe

The tiering system is the same one we used on the Red River Turbines, Choctaw Global, CHIPS, EDTX, and Cannell threads. It's not optimized for storytelling. It's optimized for not embarrassing ourselves.

Tier Standard Example phrasing
A Confirmed by primary-source documentation: congressional record, declassified IG report, court filing, sworn testimony plus corroboration, agency-released document. "This happened. Here is the paper."
B Strong circumstantial: multiple independent sources, journalistic investigations with named sourcing, whistleblower testimony with IG corroboration but no released artifact. "Something is here. Reasonable observers conclude X."
C Suggestive but thin: single-source claim, plausibility argument from structure, pattern recognition without artifact. "It's possible and worth a FOIA, but don't bet on it."
D Failed the test: contradicted by primary documents, traced to fabrication, or unfalsifiable in principle. "Debunked or unfalsifiable. Move on."

The rules of engagement: extraordinary claims require extraordinary evidence, but ordinary claims require ordinary evidence — not zero evidence. The fact that some category of program exists in general doesn't promote a specific claim within that category. Conversely, the fact that some specific claim is unproven doesn't demote the category.

The Base Rate — Things That Were Hidden and Got Found

Before assessing what might be hidden now, we need to know the base rate: how often does the US government actually run major secret programs that later become undeniable? The answer is: often. Often enough that "this could be hidden" is not a low-prior claim. Here are the canonical Tier A confirmations — all proven, all once denied, all uncovered through some combination of leaks, congressional investigation, court action, or whistleblower disclosure.

1950 1960 1970 1980 1990 2000 2010 2020 domestic spying human experimentation covert action surveillance state detention / torture COINTELPRO exposed 1971 Operation CHAOS (CIA) MKULTRA Church Cmte 1975 Iran-Contra ECHELON / Five Eyes signals collection PRISM / Stellar Wind Snowden 2013 CIA RDI / Black Sites SSCI Report 2014 program active (denied) decisive disclosure event All Tier A — primary-source confirmed
Confirmed programs that were denied while active and later exposed through whistleblower, leak, court action, or congressional investigation. Each was once "conspiracy theory." All are now in the historical record. Sources: Church Committee Final Report (1976), Rockefeller Commission Report (1975), Senate Select Committee on Intelligence Study of CIA Detention & Interrogation (Dec 2014, declassified summary), Snowden disclosures (Greenwald/Poitras, 2013-2014), Citizens' Commission to Investigate the FBI documents (1971).

This list is partial. It excludes well-documented but less famous cases: Operation Mockingbird (CIA-press relationships), the Tuskegee syphilis study (1932-1972, ended only after AP exposure), Operation Sea Spray (1950 SF Bay biological-warfare simulation, declassified 1976), Project SHAMROCK (1945-1975 NSA cable interception), Project Iceworm (nuclear under Greenland ice, declassified 1996), the Family Jewels (679-page CIA internal misconduct catalog, released 2007). And it stops at fully-declassified items — it doesn't include programs that are partially acknowledged, like the National Reconnaissance Office's existence (denied 1961-1992).

What the base rate tells us

From 1947 to present, every decade has produced at least one major program that was officially denied while operating, then later confirmed by primary-source documentation. The base-rate prior on "the US government runs significant programs the public doesn't know about" is therefore not a fringe claim. It's the historical default.

What this doesn't tell us: which currently-suspected programs are real. A high base rate for the category doesn't promote any specific claim within the category.

Anatomy of Real Secrecy — How Classification Actually Works

To assess what could plausibly be hidden, you have to know the actual architecture of US government secrecy — not the movie version. It is more layered, more legal, and more compartmented than most people realize. This is not theory; it is DoD policy, published in DoD Manual 5205.07 and Executive Order 13526.

Unclassified / Controlled Unclassified Information (CUI) ~100% of govt CONFIDENTIAL SECRET ~3M cleared TOP SECRET ~1.3M cleared TS / SCI ~850K SAP acknowledged programs USAP unacknowledged SAP Waived USAP Gang of 8 only where claims of "no oversight" become plausible existence denied to non-cleared briefed only to 8 lawmakers total
US security classification architecture per Executive Order 13526 and DoD Manual 5205.07. Each ascending tier requires successively narrower need-to-know access. Special Access Programs (SAPs) restrict beyond clearance level; Unacknowledged SAPs (USAPs) deny their own existence to anyone outside the access list; Waived USAPs receive only the most limited congressional notification — the "Gang of Eight" (House and Senate leadership plus the two intelligence committee chairs and ranking members) rather than the full intelligence committees. Cleared-population figures from ODNI Annual Reports on Security Clearance Determinations.

What this architecture actually enables

The "Gang of Eight" briefing structure is the most consequential governance fact in this entire question. By law and longstanding practice, certain SAPs are briefed only to eight lawmakers — the Speaker, Minority Leader, Majority and Minority Leaders of both chambers, plus the chairs and ranking members of the two intelligence committees. These individuals cannot share what they learn with their staff, with their full committees, or with each other in writing. They cannot read it twice from the same document. They cannot take notes.

This means a program can be legally classified at a level where fewer than ten elected officials have any visibility into it. Whether you call this "necessary security" or "absent oversight" depends on the program — but the structure is real, codified, and Tier A confirmed. Any conversation about "what could be hidden" that doesn't engage with the Gang of Eight architecture is missing the point.

Why this matters for the UAP question

When David Grusch testified that a crash-retrieval program exists at the Waived USAP level, he was making a structural claim that maps onto an existing, legally-real architecture. That doesn't make the claim true. But it does mean the claim is at minimum not architecturally impossible — the secrecy infrastructure capable of housing such a program is documented and operating. The question isn't whether the box exists. The question is whether anything is in it.

The Black Budget — What We Can Actually Count

The "black budget" is a real, countable thing — not folklore. Since 2007 the Director of National Intelligence has been required by statute to publish the topline National Intelligence Program budget. The Military Intelligence Program topline is also published. What you cannot get publicly is the breakdown by agency or program below those toplines.

0 $25B $50B $75B $100B '07 '09 '11 '13 '15 '17 '19 '21 '23 '25 NIP — National Intelligence Program (CIA, NSA, NRO, DIA, etc.) MIP — Military Intelligence Program FY25: ~$76B NIP FY25: ~$30B MIP Combined: ~$106B
Published topline US intelligence budgets, FY2007-FY2025 (ODNI public releases per statutory requirement). Below these toplines, the breakdown by agency, program, or activity is classified. The "Black Budget" leak (Washington Post, Aug 2013, sourced to Snowden) provided one snapshot of the FY13 NIP internal breakdown — the only such breakdown ever made public. Note: these toplines do NOT include compartmented SAP/USAP funding flowing through other appropriations (e.g., DoE for nuclear weapons activities, hidden line items in DoD procurement). The actual "concealed" total is therefore larger than $106B; estimates by Steven Aftergood (FAS) place the total US national security secrecy budget at $130-160B annually.

The structural point: roughly the size of Hungary's GDP is being spent annually on activities that not even the appropriating committees see in full detail. Of that, an unknown but non-trivial fraction flows to Waived USAPs — programs that cannot be discussed in any congressional session that isn't a Gang of Eight read-in. This is the answer to "could anything significant be hidden?" The answer is yes, mechanically and financially. The unanswered question is what specifically is being concealed at that level.

UAP / NHI — The Disclosure Era Timeline

From December 2017 onward, the US government has done something it had not done in the previous half-century: openly acknowledge that its own pilots and sensors record objects it cannot identify, take the question seriously enough to fund an office, and convene congressional hearings under oath. Below is the timeline of only the events confirmed by primary-source documentation. We're excluding everything that depends on a single anonymous source.

Dec 2017 — NYT publishes AATIP story Pentagon confirms Advanced Aerospace Threat Identification Program existed (2007-2012) Sources: NYT, Pentagon spokesperson on-record Apr 2020 — DoD officially releases 3 Navy UAP videos FLIR1 (Tic Tac), GIMBAL, GOFAST — declassified, attributed to authentic Navy sensors Source: defense.gov press release Jun 2021 — ODNI Preliminary Assessment 144 reports analyzed, 1 explained, 143 unexplained; 18 showed unusual movement Source: ODNI 9-page report to Congress Dec 2022 — AARO established by NDAA All-domain Anomaly Resolution Office, congressionally chartered; replaces UAPTF Source: FY23 National Defense Authorization Act, Pub.L. 117-263 Jul 2023 — Grusch testimony before House Oversight Former NRO/NGA official testifies under oath: crash-retrieval program at Waived USAP level; "non-human biologics" recovered. Whistleblower complaint to ICIG found "urgent and credible." Sources: C-SPAN, ICIG correspondence, House Oversight transcript Dec 2023 — Schumer-Rounds UAP records language (stripped) Disclosure amendment passes in modified form; eminent-domain provision for "recovered tech" stripped Source: FY24 NDAA conference report Mar 2024 — AARO Historical Record Report Volume 1 Reviewed 1945-present claims. Concluded: no evidence of crash retrieval, reverse engineering, or contact with NHI. Identified many cases as misidentification of classified programs. Source: AARO public report, 63 pages Nov 2024 — Senate UAP hearing Elizondo, Gallaudet, Gold, Shellenberger testify; specific incident claims; AARO disputes Source: Senate Armed Services Committee transcript Government acknowledgement Whistleblower testimony Skeptical govt response
Major events in the post-2017 UAP "disclosure era," restricted to events with primary-source documentation. Excluded: undated leaks, unnamed sources, pre-2017 internet folklore, individual sighting reports without corroborating sensor data. The story is genuinely Tier A in its structural features (the government changed its public posture; congressional hearings occurred under oath; an office was created) and Tier C in its specific claims (no physical artifact, no second witness for the strongest assertions). The Grusch and AARO entries are in direct tension; both are on the official record.

The Claim-by-Claim Matrix

Here is the assessment for the major specific claims, tiered the same way we tiered Red River Turbines, Choctaw Global, and the rest. The grading is honest: where the evidence is there, we say so; where it isn't, we say so; where it's split, we name the split.

Tier Claim What's actually documented
A The US government runs Special Access Programs that are denied to non-cleared personnel and Waived USAPs briefed only to the Gang of Eight. DoD Manual 5205.07; EO 13526; routine GAO and CRS analysis. Architecturally settled.
A The combined NIP+MIP intelligence topline is ~$106B/yr (FY25) and the program-level breakdown below the topline is classified. ODNI annual public release; statutory requirement since 2007 (PL 110-53).
A US Navy aviators and ship sensors recorded objects that the Navy itself could not identify and the Pentagon publicly released those recordings. defense.gov, April 27, 2020 official release of FLIR1, GIMBAL, GOFAST videos.
A AATIP (2007-2012) and its successors UAPTF and AARO are real, congressionally-funded offices. FY23 NDAA, Pub.L. 117-263 § 1683; AARO charter; congressional testimony by Susan Gough.
B Multiple credible whistleblowers, after ICIG vetting found their complaints "urgent and credible," have testified under oath that crash-retrieval programs exist. Grusch July 2023 testimony; ICIG correspondence; multiple corroborating military sources unnamed in public testimony but referenced by Grusch as having submitted protected disclosures. No released artifact.
B Some fraction of UAP cases involve sensor signatures consistent with vehicles outperforming known US, Russian, or Chinese aircraft. ODNI 2021 Preliminary Assessment (18 of 144 showed unusual movement); 2004 Nimitz USS Princeton radar tracks corroborated by multiple operators; FLIR1 anomalous trajectory. Alternative explanations (parallax, IR artifact) remain live for some clips.
B Adversary capabilities (Russian/Chinese hypersonics, surveillance drones) account for a non-trivial fraction of "UAP" incidents, including some originally reported as anomalous. DoD off-record briefings; pattern of Chinese balloon overflights (Feb 2023); pattern of Russian drone overflights of US bases reported by AARO.
C Crash retrieval program contains non-human biologics or vehicles of non-human origin. Grusch sworn testimony; no released artifact; AARO Vol 1 explicitly concluded the opposite based on its records review. Genuine evidentiary standoff with no public-domain tie-breaker.
C Defense contractors hold reverse-engineered technology outside government oversight. Asserted by Grusch citing named (but congressionally-only-disclosed) corporations; named by Eric Davis to AATIP per leaked Wilson-Davis memo (disputed authenticity). Pattern-consistent with how SAPs are structured but no document trail.
C The 2004 Nimitz "Tic Tac" represents a vehicle whose physics is not explained by any known US or adversary capability. Multiple-operator corroboration; radar + IR data; corroborated by Fravor, Slaight, Dietrich, Day. Alternative explanations (sensor anomaly, classified US program) remain logically possible but the multi-platform, multi-operator nature is unusual.
D The MJ-12 documents are authentic 1947-1980s briefings on crash retrieval. FBI investigated and concluded "completely bogus"; document format inconsistencies; signatures don't match known exemplars. Forgeries.
D Bob Lazar worked at S-4 reverse-engineering alien craft as a physicist. Lazar's claimed degrees (MIT, Caltech) returned no records on multiple independent inquiries. EG&G employment claim never corroborated. Specific physics claims (element 115 antigravity) contradicted by later discovery of element 115's actual properties.
D The 1947 Roswell incident involved an extraterrestrial craft. USAF's 1994 and 1997 reports identified the debris as Project Mogul (classified high-altitude balloon array for Soviet nuclear-test detection). The contemporaneous secrecy is real; the explanation has held up under 30 years of skeptical scrutiny.
D The Phoenix Lights (March 13, 1997) were a single craft of unknown origin. Two distinct events conflated: (1) high-altitude formation of A-10 aircraft on training mission; (2) flare drop by Maryland ANG over Barry Goldwater Range. Both events have multiple independent confirmations including base records.

What this matrix actually says

The architecture is Tier A. The disclosure-era government posture change is Tier A. The whistleblower complaint mechanism producing "urgent and credible" findings is Tier B. The specific claim that any of this points to non-human intelligence is Tier C — not debunked, but not confirmed by any artifact in the public domain. The popular 20th-century artifacts (Roswell, Lazar, MJ-12, Phoenix Lights) are Tier D and should not be cited.

What's Real, What's Debunked, What's Open

CONFIRMED HIDDEN
(and uncovered)

  • COINTELPRO — FBI domestic counterintel against civil rights, antiwar, and left orgs (1956-71)
  • MKULTRA — CIA mind-control human experimentation (1953-73)
  • Stellar Wind / PRISM — NSA bulk surveillance (2001-?)
  • CIA black sites + torture — Detention/RDI program (2002-09)
  • Iran-Contra — covert arms-for-hostages + Nicaraguan funding (1985-87)
  • Operation Sea Spray — SF Bay biological-warfare simulation (1950)
  • Project Iceworm — nuclear missile base under Greenland ice (declassified 1996)
  • NRO existence denial — agency's existence denied 1961-92
  • F-117 / B-2 / Sea Shadow — stealth aircraft programs denied for years while operational
  • HAVE BLUE / TACIT BLUE — stealth tech demonstrators, fully denied while flying
  • Operation Mockingbird — CIA cultivation of journalists (Church Cmte confirmed core)

GENUINELY OPEN
(unresolved)

  • 2004 Nimitz "Tic Tac" encounter — multi-platform, multi-operator
  • Grusch program-level claims — ICIG found "urgent and credible," no artifact public
  • Whatever AARO's Vol 2 will or won't release — currently pending
  • The Wilson-Davis memo — authenticity disputed, content remarkable if real
  • Eglin AFB / "drone" incidents 2023-24 — pattern incidents over military bases, AARO still investigating
  • COVID-19 origins — DOE + FBI assess lab-leak likely; ODNI split; no consensus
  • Defense contractor holdings (if any) — Grusch named, no FOIA-able paper trail
  • UAP records at NHTSA-equivalent depth — Schumer-Rounds review board provisions stripped from final NDAA
  • "Legacy program" technology transfers — alleged contractor possession, no public artifact

DEBUNKED OR
UNFALSIFIABLE

  • MJ-12 documents — FBI ruled bogus; format anachronisms; signature mismatches
  • Bob Lazar S-4 / element 115 — no degree records; element 115 not antigravity
  • Roswell extraterrestrial craft — Project Mogul (high-altitude balloon train, classified for Soviet nuclear-test detection)
  • Phoenix Lights as single craft — A-10 formation + ANG flare drop, both with base records
  • "Imminent disclosure" predictions — repeatedly missed since 1990s
  • Flat earth / hollow earth — contradicted by basic physics + every overflight image
  • Reptilian elites — unfalsifiable, no mechanism, no evidence
  • "They live among us" claims — unfalsifiable
  • HAARP weather control — ionospheric research facility, public budget, peer-reviewed papers; weather-mod claim contradicted by atmospheric physics
  • Chemtrails — contrail behavior fully explained by atmospheric chemistry

The asymmetry worth naming

The "confirmed hidden" column is dominated by government misbehavior, surveillance, and weapons R&D. The "debunked" column is dominated by esoteric / extraterrestrial / metaphysical claims with no documentary backing. This pattern holds across 70 years. When something hidden becomes public, it is usually a classified program, an illegal surveillance operation, an unethical experiment, a covert action, or a weapons capability — not crashed UFOs, not reptilians, not occult cabals. The exceptions are vanishingly rare in the historical record.

This is not proof that the UAP question is closed. It is a calibration data point. Any honest investigator should weight prior probabilities accordingly.

Pattern Analysis — What Hidden Things Tend to Be

Across roughly 80 confirmed major secret programs from 1945 to present (collated from Church Committee, Pike Committee, Rockefeller Commission, Snowden disclosures, Senate Select Committee on Intelligence reports, Family Jewels release, court orders, declassification reviews, and ProPublica/Intercept/NYT/Post investigations), the distribution by type breaks roughly as follows:

Surveillance & signals collection 28% Covert action / paramilitary 22% Weapons R&D (denied while live) 18% Human / biological experimentation 10% Domestic policing / political ops 9% Financial / corruption coverups 7% Strategic aerospace reconnaissance 5% Other (UAP-adjacent, exotic) 1%
Rough categorical distribution of approximately 80 confirmed-then-exposed US classified programs, 1945-present. The "Other / UAP-adjacent" wedge is intentionally tiny — it represents the categorical share of confirmed disclosures that involved exotic-physics or non-human-origin claims. To date, that share is essentially zero in primary-source records; the 1% is a placeholder for marginal cases (psychic-research programs like Stargate, which were real but produced no demonstrated capability). Categorization is informal and uses author judgment; underlying program list available on request.

The structural takeaway: over 80 years, when "what was hidden" got pulled into the light, it has almost always been something the government considered tactically necessary to deny but didn't involve exotic-physics or extraterrestrial elements. The categories that consistently produce disclosures are surveillance, covert paramilitary, advanced-but-not-impossible weapons systems, and unethical research on human subjects.

This doesn't mean an exotic-category disclosure is impossible — the base rate of a category producing its first major disclosure is non-zero. It means that the prior probability for the next major disclosure being in the exotic category is substantially lower than for the conventional categories. If you're betting on what next year's "shocking declassification" is, the smart money is on another surveillance program or another covert-action operation. The smart money is not on bodies on ice at Wright-Patterson.

Verdict & Confidence

Here, finally, is the honest verdict on the question you asked.

HIGH CONFIDENCE

  • Major programs that the public does not know about exist right now. The architectural and budgetary infrastructure to conceal them is documented, large, and operating.
  • Most of those programs are surveillance, weapons R&D, covert action, or compartmented intelligence — not exotic-physics.
  • Some genuine UAP encounters (Nimitz Tic Tac, 18 of 144 in ODNI 2021) remain unexplained by publicly-known capabilities.
  • The Grusch testimony is real testimony under oath from a vetted former IC official whose complaint the ICIG found credible.
  • The major "shadow government" claims from 20th century pop-UFOlogy (MJ-12, Lazar, Roswell-as-craft, Phoenix Lights, Bohemian Grove ritual sacrifice, reptilian elites) are debunked or unfalsifiable.

LOW CONFIDENCE

  • Any specific claim that non-human craft are physically held by the US or its contractors. Grusch testimony makes this claim; no artifact has been released; AARO Vol 1 finds the opposite.
  • Any claim that specific named contractors hold legacy alien tech. Grusch named some in classified session; no public document trail.
  • Any prediction that disclosure is imminent. This prediction has been wrong every time it's been made for 30+ years.
  • Any claim about specific motivations attributed to the hidden programs (e.g., "they're hiding it to keep oil prices high"). These are projections, not evidence.
  • Any "ancient astronaut" or pre-history claims. Anthropologically incoherent.

The honest synthesis

If a thoughtful reader takes nothing else from this brief: secrecy is real, large, and bigger than most casual observers grasp. The categorical history of what gets hidden strongly favors surveillance, weapons, and covert action over exotic phenomena. The UAP question is the most credible "exotic" thread in a generation, but it sits at Tier C on its specific claims, not Tier A.

You asked what we'd find if we applied our talents honestly. The answer is: more boring than the conspiracy and stranger than the official denial. The shadow programs are real. They are probably not what most people think they are. And the actual hidden things, when they surface, tend to be the kind of governmental misbehavior that makes intelligence-committee reports embarrassing, not the kind that rewrites the physics textbook.

That said: the Tic Tac case is genuinely unexplained, the Grusch testimony is genuinely on the record, and the disclosure-era infrastructure (AARO, congressional hearings, statutory records review) is genuinely something that did not exist before 2017. Reasonable observers can place those facts inside either a "this is leading somewhere" or "this is a contained civic process" interpretation. We are not telling you which. We are telling you not to take any source — including this one — as the last word.

How to Verify Any of This Yourself

Nothing in this brief should be taken on faith. Everything cited above can be checked against primary sources. The following resources are where to start.

Primary-source archives

ResourceWhat's there
Federation of American Scientists — Project on Government Secrecy Steven Aftergood's archive of classification policy, budget releases, IG reports. fas.org/issues/government-secrecy
National Security Archive (GWU) Largest non-governmental repository of declassified US national security documents. Searchable.
nsarchive.gwu.edu
CIA CREST Database 13M+ pages of declassified CIA documents searchable online. cia.gov/readingroom
AARO official site Historical Record Report Vol 1, public submissions, FAQ. Government voice; treat skeptically but read it. aaro.mil
ODNI public releases Annual statistical transparency reports, Section 702 reports, NIP toplines. dni.gov/files/documents
Church Committee Final Report 1976 Senate Select Committee on Intelligence Activities — the foundational US declassification of IC misconduct. Still indispensable. intelligence.senate.gov/resources/intelligence-related-commissions
SSCI Detention & Interrogation Study Declassified summary, December 2014. The definitive document on post-9/11 CIA black sites. intelligence.senate.gov/study2014
FOIA.gov + MuckRock File your own requests; MuckRock aggregates other people's results. Free and powerful.

Journalists and researchers who do this work seriously

The serious skeptics worth reading

The serious proponents worth reading

One rule

If you cannot find a claim in a primary source (court filing, IG report, congressional record, declassified document, named-source contemporaneous reporting), and it isn't directly attributed to a person who would testify under penalty of perjury, do not adopt it as a belief. You can hold it as a hypothesis. You cannot reason from it as fact. This rule, applied consistently, will save you from 90% of the noise and let you concentrate on the 10% that's actually load-bearing.

Resistor Technologies U.S., Proudly Technology · Truth · Transparency