

I also agree that there is something that superficially seems to be supernatural. However, I believe that the reason things appear to be supernatural is because all supernatural-looking events (i.e. all correct predictions about a room) are being presented as supernatural despite random guesses accounting for a lot of these. Whether or not these events are actually supernatural may be checked by the experiment I proposed in another reply. Please do tell me your thoughts on that experiment.

A Layer-3 (network-layer) blacklist risks cutting off innocent CGNAT and cloud users. What you’re proposing is similar to mechanisms that already exist (e.g., access control lists at the ISP level work by asking computer B which requests it wants to reject and rejecting those that originate from computer A). However, implementing any large-scale blocking effort beyond the endpoint (i.e. telling an unrelated computer C to blackhole all requests from computer A to computer B) would be too computationally expensive for a use case as wide and as precise as “every computer on the Internet”.
Also, in your post you mentioned, “A host would need to have a way to identify itself as authoritative, responsible for the IP address in question.” This already happens in the form of BGP though it doesn’t provide cryptographic proof of ownership unless additional mechanisms are in use (RPKI/ROA).