It is very pleasant that you answered the questions posed, although in a bit non-professional form.
Since you leave simple question regarding cryptography based on vibrations of the iron of an atom unanswered, means you simply do not have an answer.
If you are a real professional, you should know that Shannon's theory has nothing to do with the vibration of atoms, and references to Wikipedia are forbidden in any scientific community due to the possibility of information correction by anyone. But we have several times asked you to give these references to cryptography using atoms of iron. No one asks you to disclose sensitive information, but if this is your know-how and part of your project related to encryption of transactions is completed, then without compromising the secrecy of your developments, you could show at least some result (installation photos, patent, practical experiments results). But you have nothing to say except insults. Believe it is not the best way to persuade investors to invest in a project in which the developer himself does not understand the topic clearly.
Below you may find our arguments:
1. To you as a mathematician: It is proved that the vibrations of the iron atom manifest certain regularities both in different layers and from the influence of external factors (T. Slezak et al., Phonons at the Fe (110) Surface // Physical Review Letters, 99, 066103 (7 August 2007)). This is not the best choice for generating random numbers because of the large correlation of the data.
2. To you as a physicist: To obtain information about the amplitude of oscillations, an expensive ultra-sensitive X-ray machine is needed, and for ultra-high speed digitization, transmission and storage of these data, appropriate low-noise amplifiers and analog-to-digital converters are required. Such system will cost millions of dollars. We really want to see the photo, even from afar.
3. To you as a protocol expert: If each transaction receives online data from a physical device, then the network speed will be times lower than the announced one and it will be the number one target for attacks and access denials, as well as the lack of decentralization.
4. To you as a network security specialist: If each transaction accesses a pre-generated offline array of recorded oscillations, the security of the entire network will tend to zero.
Lack of professional reaction to these arguments will only mean that these issues are not worked out by you at all and we will move on to the other 9 aspects of your project that cause questions from our team. We hope that further discussion be more polite and professional.
With best regards,
ScamBusters