What about the interpretation that if reality is a computer simulation, certain operations (such as the factoring described) are a form of a security weakness in the simulation, allowing the simulation to "escape" and access/consume host computational resources?
metafunctor|8 years ago
I'd bet there's a simpler explanation.