Bitcoin Mining Pool

Bitcoin Mining Forums: Turning Computers Into Cash Since 2011

The official bitcoin mining forum / subreddit / chat room / place to be!

Always bet on RED



Primecoin is an innovative cryptocurrency, a form of digital currency secured by cryptography and issued through a decentralized mining market. Derived from Satoshi Nakamoto's Bitcoin, Primecoin introduces an unique form of proof-of-work based on searching for prime numbers.

Why Ethereum Problems Make UMI the Flagship Among the New Generation Cryptocurrencies

Why Ethereum Problems Make UMI the Flagship Among the New Generation Cryptocurrencies
Ethereum cryptocurrency that comes second in terms of capitalization on the crypto market is traditionally seen as fast and profitable. However, over the last few weeks it's had a rough patch. Since early August, the network has had huge queues of transactions pending processing while fees have skyrocketed and surpassed the historical high.
The main issue though is that even fees of a few dollars per transfer don't help get rid of the“traffic jams”. The cause of this is numerous DeFi projects and a huge number of financial pyramids based on the Ethereum platform. Both generate excessive load on the network.
The situation is downright unpleasant, and our users might question whether the UMI network could face a similar challenge? We'd like to assure you it could not. The UMI network is by default protected against these problems — it cannot have “traffic jams”, fees or financial pyramids. But first things first.
How has the Ethereum network ground to a halt?
In its report dated August 4, Arcane Research that provides analysis within the field of cryptocurrency stated that over the previous week the daily size of transaction fees in the Ethereum network has surged up to a record high for over two and a half years. On August 3, the median value #%D0%9F%D1%80%D0%B8%D0%BC%D0%B5%D1%80_%D0%B8%D1%81%D0%BF%D0%BE%D0%BB%D1%8C%D0%B7%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D1%8F)of the fee amounted to $0.82, with the overall amount of transaction fees totaling $2 mln. However, it only signaled the start of real problems.
Over the next week, fees continued to grow and by August 11 the median fee value almost doubled equaling $1.57. Larry Cermak, an expert at a big analytical and news-making crypto portal The Block, wrote in his August 15 tweet that over a week the total amount of transaction fees in the Ethereum network totaled $34.5 mln, having surpassed its historical high. Meanwhile, in the Bitcoin network that is seen as too expensive the fees were almost four times lower at $9 mln.
The total fee amount paid by cryptocurrency users over a week:
  • Ethereum — $34.5 mln;
  • Bitcoin — $9 mln;
  • Monero — $2,240;
  • Tezos — $1,876;
  • Cardano — $1,615;
  • XRP — $1,138;
  • BSV — $1,102;
  • Stellar — $1,059;
  • Bitcoin Cash — $1,027;
  • UMI — $0. Let's talk about it a little later.
Historical Growth Chart for Ethereum Fees. Source
The existing situation shows that Ethereum is actually not as fast and profitable as commonly cited. Additionally, this could happen to almost any cryptocurrency except UMI that charges no fees whatsoever. We will tell you why.
Why have these problems emerged?
There is nothing unoriginal: the Ethereum network simply can't handle an increased load. Arcane Research analysts consider that a principal cause of this situation is the constantly increasing number of the DeFi ecosystem projects built on the Ethereum blockchain. Their number is growing all the time which causes the overload of the network. As of August 12, the total amount of funds in DeFi applications reached $4.3 billion which is 19.5% higher than that in the past week. At the time of writing this article, the amount surged to $6.21 billion. You can see the current data here. What is the most unpleasant about DeFi protocols is that a lot of them are scam projects.
Which is not the worst part though. There is also another factor that significantly slows down the Ethereum network. There are a lot of pyramid-like projects that are built on the EOS platform and use smart contracts. One of them is SmartWay Forsage, which regularly overloads the network with a large number of transactions, causes traffic jams, and, consequently, leads to increased fees (keep in mind that Ethereum miners choose transactions with a higher commission). Vitalik Buterin, the co-founder of Ethereum, revealed his disapproval of the SmartWay Forsage methodology and asked them to "leave and not pollute Ethereum ecology in the future". However, the project is slow to do this — it continues to deceive users.
This is only the tip of the iceberg of scam projects which abounds on the EOS network –– they continually emerge, work for a while, then go down as scams and are replaced with new ones. This never-ending stream of "investment projects" based on the Ponzi scheme overloads the system. This is the reason why Adam Back, a pioneer of the crypto industry and founder of the technology company Blockstream, equated Ethereum with such infamous projects as Onecoin and Bitconnect. Adam Back's solid dig at Ethereum became the subject of much debate among crypto enthusiasts.
Of course, it all doesn't mean that Ethereum is a bad cryptocurrency. On the contrary, it has a lot of advantages over other coins. But all that has happened exposes Ethereum's faults which must be eliminated. The problem is that they may not be fixable. It is far from certain that the developers will be able to get rid of all the defects as the system has huge scalability problems.
The crypto community has to admit that Ethereum, like other first-generation cryptocurrencies, has issues with capacity, fees, and scalability and is gradually becoming obsolete.
2020 is the time for young innovative cryptocurrencies such as UMI.
UMI is the flagship of new-generation cryptocurrencies.
In real fact, any cryptocurrency could face it. Each cryptocurrency charges fees which typically surge when the network is overloaded or the price is going up. Everyone will remember 2017 when in line with price growth and the network's overload Bitcoin transaction fee reached a high of around $40.
But when it comes to UMI, it works the other way round. The UMI network's advantages are high capacity, no fees, and scaling possibilities. It uses the best and fastest crypto industry solutions and excludes all inefficient methods by default. Smart optimization in combination with the Proof-of-Authority technology operating on the master node basis enables almost instant payments.
At the stage of network testing, an incredibly high capacity was achieved:
  • up to 4,369 transactions per second;
  • up to 262,140 transactions per minute;
  • up to 15,728,400 transactions per hour;
  • up to 377,481,600 transactions per day.
Ethereum processes about 20 transactions per second. It means that the UMI network can process transactions that Ethereum processes over a year in 1 to 5 days — and with no fees.
The UMI network can process transactions that Ethereum processes over a year in a few days and with no fees. More details
What is more important is that less than 0.001% of the network's overall potential is used now. The UMI network has a lot of reserve capacity and can handle hundreds of thousands of times heavier load. Moreover, with scaling possibilities, UMI can keep up with the times. The UMI code ensures the safe introduction of any upgrades — the network can be easily modified and scaled with cutting edge technology solutions. In other words, traffic jams will never pose a problem for us. UMI will instantly process all transactions, with no fees. Always.
A real-time speedometer displays the number of transactions processed by the UMI network per second. Link
Additionally, unlike Ethereum and other cryptocurrencies, the UMI's staking smart contract prevents possibilities of any pyramid schemes, meaning eliminates their negative influence. Our staking is completely safe and secured against scammers. Read more about this in our article. Any UMI staking structure could work forever. In other words, you can multiply your coins at a rate of up to 40% per month for an indefinitely long period of time.
UMI doesn't inherit the disadvantages of the first-generation cryptocurrencies. This is an innovative, carefully designed network based on state-of-the-art technologies. UMI is an ambitious step toward the future. And we're making it together right now!
Sincerely yours, UMI team
submitted by UMITop to u/UMITop [link] [comments]

Reminder: Jews have real life time machines and want me to think that particle accelerators are time machines

Helloooooooo, it's me Satan/the devil again. Thought I would post another reminder about the jews having real life time machines which they have been showing off to me using their "media" (mostly).
Here's the documentary again, which I found on amazon primevideo after already coming to the conclusion that particle accelerators might actually be time machines.
If particle accelerators are actually time machines, my mother may have actually received a tour of the large hadron collider, because she has been to both France and Switzerland during the same trip and my brother even lives in one of ze countries now. The official reason for her visit was to attend a "patent" conferance. 🤷‍♂️
Dialogue from the Ark Society level of Hitman 2 which mentions "patents" -
"You see they are sitting on some patents that will knock your socks off."
"Weather control systems."
"Recycling pollution as fuel."
"Cold fusion. You name it."
Satan is naming their time machines too. 🤣
Anyway, she visited one of zose countries again (to visit my brother) and that too without telling me. I told her not to go because of the expensive plane tickets (she has been pretending to be "poor" all these years. well, not THAT poor. "middle class" poor. 🤣). I certainly considered the plane tickets expensive. It cost more than 1 lakh rupees (1,00,000) for a two way trip (which I considered to be a lot at that time). So if I would have gone too, it would have been more than 2 lakh rupees ( rupees are also jewish apparently ). Money that could have been spent on other things (jews have been emailing Satan recently with suggestions like "spend money on experiences, not things". 🤣). Of course, now I think money and the financial system is fake and designed exclusively for Satan but only YOU will know whether that is the case or not. 🤷‍♂️
Oh, and because she was planning on going without telling me, she even agreed to give me some "mummy money" (20,000 rupees) to buy some "pyramid scheme money" (bitcoin) which I then used to buy an antminer s1. Pretty neat pyramid scheme, huh? Has cool miners and everything. 🤣
Anyway because they have time machines, jews not only know what I am "sinking about" right now, but they also know what I will be "sinking about" in the future. 🤣 Check my previous posts and reminders about their mass surveillance tech if you don't know what I am talking about (once again assuming/pretending that everyone in the world doesn't already know who I am and already know about the existence of time machines and other advanced tech). 🤷‍♂️

Moar Satanic Rambling

I mentioned amazon above. They recently VERY actively participated in the "Q psyop" by showing the following riddle to Satan/me in a "riddle quiz" (or whatever you want to call it) that they had in the "fun zone" section of their app. Here's the riddle as I remember it.
"I usually follow Q. But not in QATAR. I come twice in queue. What letter am I?"
I bet they were hoping that I would correctly answer it, but I unintentionally answered it incorrectly as "E". Otherwise it was supposed to be "U". You know, "QU". "Q you". Calling me Q. Q from LGBTQ. 😐
Anyway, I didn't even look at the list of answers properly and had very quickly decided that the answer was "E" because in my mind I imagined the letters going from left to right (in a queue 🤣) and the answer would have been "E" in that case. The letter "E" would have been following "Q". By the way, there is no "E" in any of my real life names but there is one in "JEW". 🤣 Maybe that's why a jewess was pretending to be a bot and other jews were referring to her as EBOT in the Q research 8chan board (mentioned in one of my old posts). They were spelling "ABOT" as "EBOT". 🤣🤷‍♂️
I am also guessing that "QATAR" in the above riddle is supposed to mean something since it was in all caps. "Q a rat" maybe (country names are fake apparently, as I mentioned in my previous post)? Like the rat from the movie Ratatouille? 🤣 Even my mother was once mispronouncing Qatar as "Quatar", and I corrected her saying it's QAtar and not QUatar. But yes, once again, "QU" or "QUA" (Q you, A). 😐 Like I mentioned in my previous post, I now believe she is also a "psyop" participant and she continues to actively participate in the psyop.
Just recently she threw away a pack of masala powder just to make me angry. I had already started cooking when I realized that the pack was missing. At first I thought she may have just hidden it, so I searched everywhere but when I couldn't find it I realized she had mostly likely thrown it away. I am not talking to her at all right now (for obvious reasons 😐) but did manage to indicate that I was angry because of the missing masala powder (not that she didn't already know. it was part of the "plan". trust the plan. 🤣) and she eventually admitted that she had thrown it away, apparently because the pack was "completely open". There were long expired packs of various masala powders lying around (still are) that were actually "completely open" that she didn't bother to throw out but she threw away a brand new pack that I had bought. 🤷‍♂️
Should also mention that everytime I brought up the "psyop", her dialogue was something like, "Internet people are tricksing you-internet people are tricksing you". 🤣🤷‍♂️ "Internet people" are "tricksing" me apparently. 🤣 Well, I am translating but she was using the word "tricks". 🤷‍♂️
I believe I have also figured out what one of my real life names actually means. One is supposed to be calling me an "objectophile" (like "QU". "Objectophile U".) and the other one (the one in my birth certificate, ID cards, etc.) is supposed to mean something like "You are a fool/simpleton, devil". Any jew here willing to confirm? 🤣
Anyway, as jews already know, I think it's okay to be a fool/simpletion but not okay to be evil. Who goes to hell? A fool/simpleton or someone who is evil? <- "Q" style questions. 🤣
As I mentioned in my previous posts, I believe ALL jews are evil. Especially if all of them indeed know who I am and have been watching me all these years. 😐 Someone was even posting on 8chan saying something like, "we are not evil. promise...". Watch a compilation of everything you have done to Satan all these years if in doubt about the fact that you are evil. I am assuming you have recordings. Or did the jewesses who run the jew world delete them from the face of the Earth and are now claiming that some of the things that I have been "sinking" about never happened?
Other than that they have continued to do shit like male genital mutilation and abortions despite having time machines and knowing in advance that Satan will be anti-male genital mutilation and anti-abortion. Assuming that abortion is real of course. I haven't seen it with my own eyes after all (just like my mother says that she DOES NOT believe that god exists just because she hasn't seen god with her own eyes. heard the same thing from others. 🤣). I even remember someone posting pro-abortion shit in the 8chan Q research board. Something along the lines of "if you want to buy a gun, do it. your choice, pro-choice...". How about "if you want to do the apocalypse, do it. your choice pro-choice", hmmm? Besides, jewesses who have had abortions could have "chosen" to not have sex. If abortions are real, I am guessing there are many jewesses out there who have had abortions by the time they were 30.
Satan is 30 years old in his current human form and is a virgin. 🤣 Even the "Virgin" brand is referring to Satan. Yes? Also figured out recently that the "Coca Cola" brand is referring to Satan also. Bought an "(allocacoc)[] powercube" and found the name odd initially but realized that it was Coca Cola spelled backwards with an extra "L" and knew it was supposed to mean something. Later saw one of those "coke and mentos" videos on youtube again and finally realized what it is supposed to mean. "Coca Cola" is supposed to be "A Cola Coc". "Cola" is supposed to be "কলা". It's supposed to be referring to Satan's dick. That's why there were those "muh dick-muh dick-muh dick" posts on the 8chan Q research board. Yes? 😐
Anyway, if the "Coca Cola" brand was indeed established in the year stated in wikipedia then it would seem that the jews have had time machines for the past 100 years at least.
I have also realized that "muh dick" is also partially mutilated and my mother lied to me about that also. Claimed to have taken me to the nurse because she noticed "pus" was coming out of my dick and the nurse did some "cutting". Said that there would have been "कष्ट" after marriage otherwise. Had no idea at the time what she was talking about, but perhaps she meant that a lesbian jewess might have found my unmutilated dick "ugly"? 🤣 Watch that "Nip/Tuck" episode#Episodes) and that "South Park" episode defending male genital mutilation if you have no idea what I am talking about.
What if jews force their senior citizen parents to get a face lift, nose job, liposuction, or whatever without anaesthesia? And say shit like "we are only doing it to make you look beautiful so that you don't have any "कष्ट" if you decide to get married/remarried or so that you are invited to more lemon parties"? 🤣 They can use their mind control tech to wipe the memory of the surgery afterwards if necessary (or use roofies if they are real 🤣). Can even invite people to witness the surgery and they can say "mazel tov", "oy vey", or whatever it is they say after a "bris".
Now, I don't know if "brises" are real because I haven't seen one with my own eyes. I have however seen a "fully mutilated" dick when I was a kid (3rd grade). It was in the school (a different school, not the one I mentioned in my previous post) bathroom which was just a "shed" with a drain in it (was the female bathroom also just a shed with a drain in it? There was even a South Park episode about school bathrooms but in their case the bathroom wasn't just a "shed" now, was it? 🤣). Anyway, I assumed that I had seen a catheter "wrapped" around his dick as I had heard about catheters by then but did not know what they looked like or how they worked. I asked the kid why his dick looked different assuming that he would confirm my theory that he was peeing using a catheter. But he replied saying that it's because he is "muslim". It was an odd explanation I thought, and even asked my mother that day and she didn't bother to explain it either.
Even after that incident I didn't know about "male genital mutilation" for years. But eventually "real time" told me. But even then I didn't know that even my dick was partially mutilated but "real time" has now told me about that too. 🤷‍♂️
Well, jews were also posting a "render" (I think) of an unmutilated dick on 8chan and someone on voat replied to a comment of mine saying something like "No one actually knows what an unmutilated dick looks like" which I only recently saw. Could have just said something like, "Your dick is mutilated too, Satan" but whatever. 🤷‍♂️

Video games

Already mentioned a video game above, but will be mentioning moar video games here under this heading. As I mentioned in my previous post, they are also using their time machines when making video games. I also mentioneded that I could be living in a simulation for all I know and you could all be NPCs. Later I remembered a video game that I didn't play just because the story/plot had "simulation" in it. I then checked out the plot again on wikipedia and noticed that it mentions "time travel" also. 🤣
The game's loyalty missions impact the ending of the story: if a number of these are not completed, the Boss makes plans for the Saints to take over more planets and expand their new empire; however, if all are completed, the Saints learn that they can restore Earth using time-travel, discovering that Zinyak captured several historical figures and placed them in suspended animation. The Boss soon discovers one of them to be 19th century writer Jane Austen, whom they are a fan of, and who reveals herself as the narrator of the game's story once she is awaken her from stasis.
There's also the following DLC where Satan is mentioned. 🤣
I have both the game and the DLC in my Steam library but have never played them. I bought them during a sale or something. They were being sold as a bundle (Humble Bundle maybe) but I was only interested in Saints Row The Third.
I should also mention The Witcher 3: Wild Hunt. The game has some cannibal witches who eat kids (they ate grown ups too; they didn't discriminate. 🤣). And the witches were shown to possess "mass surveillance" capabilities, but they were using magic. They would nail human ears to trees or something. Satan chose to free that tree spirit the first time he played that mission but later noticed the tree spirit did not get rid of those "ladies" for some reason. Plot hole?
Anyway, I read right here on /conspiracy that jews apparently eat aborted babies. It was the "Robert David Steele AMA" I believe.
Were you jews hoping to tell me that you don't really eat aborted babies and I only believed it because I am gullible? There was even a South Park episode recently where there was the dialogue "well, we don't eat them...", but they were talking about cows. Were they actually talking about aborted babies? There was also the dialogue "...nobody wants to do it...". Nobody wants to do abortions but do them anyway because jewesses auto-magically get pregnant (like Satan used to think when he was a kid)? Also, there is a dialogue in a "Penny Dreadful") episode where a witch who does abortions and is called a "cut-wife" says something like "this village needs its cut-wife...". Why did the village need a "cut-wife"? Because the jewesses living there were auto-magically getting pregnant even though they didn't have sex? 🤔
Unforuntately for the jewesses who run the jew world (who are no doubt like those "ladies" of the wood), there are also stories like (Hansel and Gretel)[]. Even my own mother used to try and scare me when I was a kid saying things like "juju buris (বুড়ি) kidnap kids in burlap sacks..." or something. 🤷‍♂️

TV Shows

Already mentioned TV Shows above, but will mention more here.
I recently remembered the cartoon "Pinky and the Brain" and realized they are also supposed to be depicting Satan. Check out the opening theme and the lyrics -
They even show Saturn crashing into Earth during the part where they sing "by the dawning of the sun, they will take over the world". 🤣 There's also "to prove their mousey worth, they will overthrow the earth...". 🤣 Satan is dinky apparently. 🤷‍♂️
At the end of the opening theme there is even the name of an openly-jew jew mentioned ("Steven Spielberg"). If you are a "poor" jew who doesn't know about the existence of time machines and other advanced tech that "rich" jews have, maybe you can ask him what he knows.🤷‍♂️
Also mentioned in my previous posts that I am also supposed to be Jesus and there is this scene from an episode of The Simpsons -
The scene was actually censored when airing on a local TV channel and I even mentioned it to a desi jewess who was "sent" to chat with me. Looking at "muh chatlogs" is how I remembered that scene. 🤣
The jewess was trying to pretend to be psychic or something. She was even telling me about my future which I had totally forgotten about. I did remember that she asked me if I believe in "astral projection". I said no, so she dropped the subject. Otherwise I am guessing she would have claimed to be able to see me using "astral projection" and not because all jews are watching me like Truman from The Truman Show.
I also remember another jewess who was "sent" to chat with me and she was asking me if I had read Harry Potter and knew what a "prophecy" was. When I said yes and used "भविष्यवाणी " to define "prophecy" she dropped the subject. 🤣 She was claiming to be studying to be a psycho-logist and was repeatedly asking me "How do you feel-How do you feel". 🤣 I had no idea what she meant at the time, but now I know (thanks to "real time") that it's just something that psycho-logists say. 🤣 No doubt that was the first thing she learnt at "psycho-logy school". 🤣 Satan is a psycho apparently. 🤣🤷‍♂️
Oh yes, I was talking about The Simpsons. I remember seeing posts right here on /conspiracy speculating whether The Simpsons creators know about the existence of real life time machines because many episodes seem to depict future events. Well, no need to speculate any longer, they do have real life time machines. But it's not just The Simpsons creators. It's all jews. Be it Hollywood, Bollywood, Tollywood, etc. Maybe you can even ask them during comic-con or something if you are a "poor" jew and do not know about the existence of real life time machines.
I now also believe that the boat painting in The Simpsons living room is based on something that Satan painted not long after the shit stick incident. After the shit stick incident that I mentioned in my previous post, my mother agreed to reconnect our TV cable connection on the condition that I attend a religious summer school. That's where I painted a ship which was supposed to be like the ships from Assassins Creed Black Flag. It was supposed to be an art "class" but there was only one and they were like "paint whatever you want to paint". Were they expecting Satan to paint something Satanic? 🤣 I remember the kid next to me was painting an alien. Large sheet of paper but he was painting a small alien in the middle of it leaving the rest of the sheet blank. 🤷‍♂️
Anyway, in case of The Simpsons, the painting is that of "a boat" (wink-wink-nudge-nudge?) but it's very similar to the ship painting that I painted. If you really do not know about the existence of time machines and other advanced tech maybe you can even ask the creators of The Simpsons (in the next comic con or something). You can say something like "a conspiracy nut on /conspiracy claiming to be Satan was also claiming that you have real life time machines and the boat painting is based on something he painted at a religious summer school after a shit stick incident and that you got rid of the Apu character because he wanted The Simpsons cancelled because he got the impression that you were being anti-Trump and pro-Hillary...". 🤣🤷‍♂️
Anyway, there was even a kid at the above mentioned summer school who was pronouncing "cheat codes" incorrectly. He was pronouncing "cheat" as "kheat". Was he acting like the actors from Truman Show and reading his lines from an "eyephone" teleprompter? Or was it intentional? 🤷‍♂️ By the way, the downstairs neighbours' kids were also there in that summer school and they would have at least heard the shit stick incident. Yes? I believe they also knew about the "psyop" and could have told Satan but didn't. How are you jews trained to participate in the "psyop" anyway? Are you sen't to special "psyop schools"? 🤣🤷‍♂️
In one of my previous posts that was deleted by a mod, a jew had commented asking me whether I was a little girl because I had used so many "emojis", so let me mention the cartoon "The Grimm Adventures of Billy and Mandy" also. All three of the main characters are also supposed to be depicting Satan, including Mandy. Check out her devil horns like hairstyle. 🤣
There is also this song from the show.
It has the lyrics "if at first they think it's strange, they wont think twice once I've eaten their brains".
Jews thought that if Satan thinks all the evil shit they do is "strange", Satan wont think twice after they manage to figuratively eat his brain? They were also posting this image on 8chan. Yes, Satan has been "fucked by psyops" because physical wounds heal apparently. Not that jews haven't caused physical wounds also but they always end up healing. 🤣


Scene from the movie "My Favorite Martian" referring to Satan's zipper incident -
Was four or five years old when it happened. The zipper of the shorts that I was wearing, got stuck on my partially mutilated foreskin. I was crying in pain even though there was no bleeding. Jews most likely have a recording of this incident also (if they haven't deleted). Later the same nurse who most likely mutilated my dick was telling me to wear underpants as if I could conjure them out of thin air.
I didn't wear underpants back then and didn't even for years after that incident. Now I wear "square" underpants, which is why there is "Spongebob Squarepants" (I am also supposed to be Patrick). 🤣
Anyway, jews know about the zipper incident too but are continuing to perform male genital mutilations anyway. Yes? Perhaps they are like, "another benefit of having a fully mutilated dick is that you don't have to worry about zipper issues". 🤣🤷‍♂️


Jews are using their time machines even in the music they produce.
My motorcycle that I mentioned in my previous post was seized by the cops (I used to think that the local cops are useless but now I think that they are just fake) using "Coronavirus" as an excuse. And when recently looking at the details of the "Foghat" album "The Best of Foghat", I noticed the song with the title "Third Time Lucky (First Time I Was A Fool)". I have been to the cops twice to get back my seized motorcycle. First time I went was on April 1 (april fools day). I was planning on not going a third time and just let the fake cops keep my motorcycle. After all, they are jews, the motorcycle was made by jews and even the money I used to buy the motorcycle was "jew money". And I noticed that there is also the song with the title "Take It Or Leave It". 🤣 Oh, and now I see that there is also one with the title "Easy Money". 🤣
The name "Foghat" itself is most likely referring to how Satan's helmet gets foggy sometimes. Yes? 🤔🤷‍♂️
Anyway, wasn't able to pass much time with the bike anyway. It was only making me spend fake jew money on fake expensive fuel. Not to mention the trips to the service center. It needs servicing every three months apparently. So, I am thinking I will leave it with the fake cops. What do you jews think? Is it a good plan? Trust the plan? 🤔
Oh yes, the second time when I went to the cops, they gave me a phone number and asked me to call it (I didn't) and also gave me a fake name when I asked for one. Which I now think is supposed to mean "You are Satan, pal", kinda like that South Park episode about mormonism ("moronism"; Satan is a moron apparently; Amaron) where Cartman was like "My name is Yura, Yura Fag". 🤣 If yes, then here is a message for the fake cop who gave Satan the fake name, "Satan is not your pal, gal". 🤣
Yes, the second time the fake male cops were gone and there were only two jewesses. The male cops are in "isolation" apparently. 🤣 I was wondering if I should have shown them that clip from The Simpsons where Chief Wiggum says something like, "look at my badge. cash bribes only..." because most of them are fat or chubby. And because I used to think that all the local cops were good for was scaring and threatening people and asking for bribes. 🤣 The second time there was only one male cop (a gatekeeper or something, who got brave and was rude to Satan) and this time they made sure that it was not a fat one. 🤣 Anyway, I can make fun of the fake fat cops (many of whom have "pregnant" bellies. men and women are equal so men are also able to get pregnant. those cops were actually pregnant. yes? 🤣) just by "sinking" about it. How cool is that? 🤣
I also remember that South Park episode now where they were calling bikers "fags"). Original air date is 2009 whereas Satan bought his bike in 2019. So yes, you can ask them about the existence of real life time machines and other advanced tech also. 🤷‍♂️
Recently Satan has been passing the time "code monkeying". That's why the 8chan administrator is called "code monkey", yes? I have been playing with "CodeIgniter" and there is "psyopy" content even in the "CodeIgniter" documentation.
use CodeIgniter\Controller;
class Helloworld extends Controller { public function index() { echo 'Hello World!'; }
public function comment() { echo 'I am not flat!'; } }
Yeah, the world is not flat apparently but since I haven't seen it with my own eyes I probably should not believe that it's round. Yes? 🤣🤷‍♂️
Well it doesn't really matter if the world is round or "flat". What matters is that if everyone in the world knows me then unfortunately for you, you are all evil. And it's actually more unfortunate for you if you are not NPCs. You know what I am sayin'?
By the way, is Satan's "Mann ki Baat" being broadcast to everyone in the world uncensored or should he write down more of his "mann ki baat"? 🤔 Like how he has been "sinking" to Ubisoft whether the "apocalypse" comes under "everything is permitted". Feel free to comment here with your reply Ubisoft.
Mind-wiped Satan now thinks total apocalypse (get it? total apocalypse. kinda like total eclipse but apocalypse instead of eclipse) is necessary and since he is addicted to TV shows, movies, video games and the internet apparently (all jew media), it would be the unselfish thing to do (assuming it's up to him to do the apocalypse). Yes?
Satan has been trying to be "sober" though. No TV shows, movies or video games for the past two months. Did not renew his 100mbps internet connection either. Let's see how long the lockdown can continue. 🤣🤷‍♂️
It's Saturday and Satan managed to spend hours writing the above post. 🤣
submitted by rcspy to conspiracy [link] [comments]

10 Malentendidos sobre El Web Scraping

1. El web scraping es ilegal
Muchas personas tienen falsas impresiones sobre el web scraping. Es porque hay personas que no respetan el gran trabajo en Internet y usan web scraping herramienta robando el contenido. El web scraping no es ilegal en sí mismo, sin embargo, el problema surge cuando las personas lo usan sin el permiso del propietario del sitio y sin tener en cuenta los Términos de Servicio (Términos de Servicio). Según el informe, el 2% de los ingresos en línea se pueden perder debido al mal uso del contenido a través del raspado web. Aunque el raspado web no tiene una ley clara y términos para abordar su aplicación, está abarcado por las regulaciones legales. Por ejemplo:
2. El web scraping y el web crawling son lo mismo
El web scraping implica la extracción de datos específicos en una página web específica, por ejemplo, extraer datos sobre clientes potenciales de ventas, listados de bienes inmuebles y precios de productos. Por el contrario, el web crawling es lo que hacen los motores de búsqueda. Escanea e indexa todo el sitio web junto con sus enlaces internos. "Crawler" puede navegar por la web sin un objetivo específico.
3. Puedes scrape cualquier sitio web
A menudo que las personas solicitan scraping cosas como direcciones de correo electrónico, publicaciones de Facebook o información de LinkedIn. Según un artículo titulado "¿Es legal el web scraping?" Es importante tener en cuenta las reglas antes de realizar el web scraping:
Una persona puede ser procesada bajo varias leyes. Por ejemplo, uno raspó cierta información confidencial y la vendió a un tercero, ignorando la carta de prohibición enviada por el propietario del sitio. Esta persona puede ser procesada bajo la ley de Trespass a Chattel, Violación de Digital Millennium Copyright Act (DMCA), Violación de la Ley de Computer Fraud and Abuse Act (CFAA) and Misappropriation
No significa que no pueda scrape canales de redes sociales como Twitter, Facebook, Instagram y YouTube. Son amigables con los servicios de scraping que siguen las disposiciones del archivo robots.txt. Para Facebook, debe obtener su permiso por escrito antes de realizar el comportamiento de la recopilación automatizada de datos.
4. Necesitas saber cómo codificar
Una herramienta de web scraping (herramienta de extracción de datos) es muy útil para profesionales no tecnológicos como especialistas en marketing, estadísticos, consultores financieros, inversores de bitcoin, investigadores, periodistas, etc. Octoparse lanzó una característica única: web scraping templates que scrapers preformateados que cubren más de 14 categorías en más de 30 sitios web, incluidos Facebook, Twitter, Amazon, eBay, Instagram y más. Todo lo que tiene que hacer es ingresar las palabras clave/URL en el parámetro sin ninguna configuración de tarea compleja. El web scraping con Python lleva mucho tiempo. Por otro lado, una plantilla de web scraping es eficiente y conveniente para capturar los datos que necesita.
5. Puede usar datos scraped para cualquier cosa
Es perfectamente legal si extrae datos de sitios web para consumo público y los utiliza para análisis. Sin embargo, no es legal si scrape información confidencial con fines de lucro. Por ejemplo, scraping información de contacto privada sin permiso y venderla a un tercero para obtener ganancias es ilegal. Además, reempaquetar contenido raspado como propio sin citar la fuente tampoco es ético. Debe seguir de reglas sobre no enviar spam o cualquier uso fraudulento de datos está prohibido de acuerdo con la ley.
6. Un web scraper es versátil
Tal vez ha experimentado sitios web particulares que cambian su diseño o estructura de vez en cuando. No se frustre cuando se encuentre con sitios web que su scraper no puede leer por segunda vez. Hay muchas razones. No se activa necesariamente al identificarte como un bot sospechoso. También puede ser causado por diferentes ubicaciones geográficas o acceso de la máquina. En estos casos, es normal que un web scraper no pueda analizar el sitio web antes de establecer el ajuste.
7. Puedes scraping web a alta velocidad
Es posible que haya visto anuncios de scraper que dicen cuán rápidos son sus scrapers. Suena bien ya que le dicen que pueden recopilar datos en segundos. Sin embargo, si causas daños a la empresa, serás un delincuente y será procesado. Esto se debe a que una solicitud de datos escalables a una velocidad rápida sobrecargará un servidor web, lo que podría provocar un bloqueo del servidor. En este caso, la persona es responsable por el daño bajo la ley de "trespass to chattels" (Dryer y Stockton 2013). Si no está seguro de si el sitio web es scrapable o no, pregúntele al proveedor de servicios de desguace web. Octoparse es un proveedor de servicios de raspado web responsable que coloca la satisfacción de los clientes en primer lugar. Para Octoparse es crucial ayudar a nuestros clientes a resolver el problema y tener éxito.
8. API y Web scraping son lo mismo
API es como un canal para enviar su solicitud de datos a un servidor web y obtener los datos deseados. API devolverá los datos en formato JSON a través del protocolo HTTP. Por ejemplo, Facebook API, Twitter API, y Instagram API. Sin embargo, no significa que pueda obtener los datos que solicite. El web scraping puede visualizar el proceso ya que le permite interactuar con los sitios web. Octoparse tiene plantillas de web scraping. Es aún más conveniente para los profesionales no tecnológicos extraer datos al completar los parámetros con palabras clave/URL.
9. The scraped data only works for our business after being cleaned and analyzed
Many data integration platforms can help visualize and analyze the data. In comparison, it looks like data scraping doesn’t have a direct impact on business decision making. Web scraping indeed extracts raw data of the webpage that needs to be processed to gain insights like sentiment analysis. However, some raw data can be extremely valuable in the hands of gold miners.
9. Los scraped data solo funcionan para nuestro negocio después de ser limpiados y analizados
Muchas plataformas de integración de datos pueden ayudar a visualizar y analizar los datos. En comparación, parece que el scraping de datos no tiene un impacto directo en la toma de decisiones comerciales. De hecho, el web scraping extrae datos sin procesar de la página web que deben procesarse para obtener información como el análisis de sentimientos. Sin embargo, algunos datos en bruto pueden ser extremadamente valiosos en manos de los mineros de oro.
Con la plantilla de web scraping de Octoparse Google Search para buscar un resultado de búsqueda orgánica, puede extraer información, incluidos los títulos y meta descripciones sobre sus competidores para determinar sus estrategias de SEO; Para las industrias minoristas, el web scraping se puede usar para controlar los precios y la distribución de los productos. Por ejemplo, Amazon puede crawl Flipkart y Walmart en el catálogo "Electrónico" para evaluar el rendimiento de los artículos electrónicos.
10. El web scraping solo puede usarse en negocios
El web scraping se usa ampliamente en varios campos además de la generación de leads, el monitoreo de precios, el seguimiento de precios y el análisis de mercado para empresas. Los estudiantes también pueden aprovechar una plantilla de web scraping de Google Académico para realizar investigaciones de tesis. Los agentes inmobiliarios pueden realizar investigaciones de vivienda y predecir el mercado inmobiliario. Podrá encontrar personas influyentes de Youtube o Twitter para promocionar su marca o su propia agregación de noticias que cubra los únicos temas que desea al scraping los medios de comunicación y los RSS feeds.
submitted by melisaxinyue to webscraping [link] [comments]

Mining and Dogecoin - Some FAQs

Hey shibes,
I see a lot of posts about mining lately and questions about the core wallet and how to mine with it, so here are some facts!
Feel free to add information to that thread or correct me if I did any mistake.

You downloaded the core wallet

Great! After a decade it probably synced and now you are wondering how to get coins? Bad news: You don't get coins by running your wallet, even running it as a full node. Check what a full node is here.
Maybe you thought so, because you saw a very old screenshot of a wallet, like this (Version 1.2). This version had a "Dig" tab where you can enter your mining configuration. The current version doesn't have this anymore, probably because it doesn't make sense anymore.

You downloaded a GPU/CPU miner

Nice! You did it, even your antivirus system probably went postal and you started covering all your webcams... But here is the bad news again: Since people are using ASIC miners, you just can't compete with your CPU hardware anymore. Even with your more advanced GPU you will have a hard time. The hashrate is too high for a desktop PC to compete with them. The blocks should be mined every 1 minute (or so) and that's causing the difficulty to go up - and we are out... So definitly check what is your hashrate while you are mining, you would need about 1.5 MH/s to make 1 Doge in 24 hours!

Mining Doge

Let us start with a quote:
"Dogecoin Core 1.8 introduces AuxPoW from block 371,337. AuxPoW is a technology which enables miners to submit work done while mining other coins, as work on the Dogecoin block chain."
- langerhans
What does this mean? You could waste your hashrate only on the Dogecoin chain, probably find never a block, but when, you only receive about 10.000 Dogecoins, currently worth about $25. Or you could apply your hashrate to LTC and Doge (and probably even more) at the same time. Your change of solving the block (finding the nonce) is your hashrate divided by the hashrat in sum - and this is about the same for Doge and LTC. This means you will always want to submit your work to all chains available!

Mining solo versus pool

So let's face it - mining solo won't get you anywhere, so let's mine on a pool! If you have a really bad Hashrate, please consider that: Often you need about $1 or $2 worth of crypto to receive a payout (without fees). This means, you have to get there. With 100 MH/s on prohashing, it takes about 6 days, running 24/7 to get to that threshold. Now you can do the math... 1 MH/s = 1000 KH/s, if you are below 1 MH/s, you probably won't have fun.

Buying an ASIC

You found an old BTC USB-miner with 24 GH/s (1 GH/s = 1000 MH/s) for $80 bucks - next stop lambo!? Sorry, bad news again, this hashrate is for SHA-256! If you want to mine LTC/Doge you will need a miner using scrypt with quite lower numbers on the hashrate per second, so don't fall for that. Often when you have a big miner (= also loud), you get more Hashrate per $ spent on the miner, but most will still run on a operational loss, because the electricity is too expensive and the miners will be outdated soon again. Leading me to my next point...

Making profit

You won't make money running your miner. Just do the math: What if you would have bougth a miner 1 year ago? Substract costs for electricity and then compare to: What if you just have bought coins. In most cases you would have a greater profit by just buying coins, maybe even with a "stable" coin like Doges.

Cloud Mining

Okay, this was a lot of text and you are still on the hook? Maybe you are desperated enough to invest in some cloud mining contract... But this isn't a good idea either, because most of such contracts are scams based on a ponzi scheme. You often can spot them easy, because they guarantee way to high profits, or they fake payouts that never happened, etc.
Just a thought: If someone in a subway says to you: Give me $1 and lets meet in one year, right here and I give you $54,211,841, you wouldn't trust him and if some mining contract says they will give you 5% a day it is basically the same.
Also rember the merged mining part. Nobody would offer you to mine Doges, they would offer you to buy a hashrate for scrypt that will apply on multiple chains.

Alternative coins

Maybe try to mine a coin where you don't have ASICs yet, like Monero and exchange them to Doge. If somebody already tried this - feel free to add your thoughts!

Folding at Home (Doge)

Some people say folding at home (FAH - still the best. I just installed the tool and it says I would make 69.852 points a day, running on medium power what equates to 8 Doges. It is easy, it was fun, but it isn't much.
Thanks for reading
submitted by _nformant to dogecoin [link] [comments]

Bitcoin (BTC)A Peer-to-Peer Electronic Cash System.

Bitcoin (BTC)A Peer-to-Peer Electronic Cash System.
  • Bitcoin (BTC) is a peer-to-peer cryptocurrency that aims to function as a means of exchange that is independent of any central authority. BTC can be transferred electronically in a secure, verifiable, and immutable way.
  • Launched in 2009, BTC is the first virtual currency to solve the double-spending issue by timestamping transactions before broadcasting them to all of the nodes in the Bitcoin network. The Bitcoin Protocol offered a solution to the Byzantine Generals’ Problem with a blockchain network structure, a notion first created by Stuart Haber and W. Scott Stornetta in 1991.
  • Bitcoin’s whitepaper was published pseudonymously in 2008 by an individual, or a group, with the pseudonym “Satoshi Nakamoto”, whose underlying identity has still not been verified.
  • The Bitcoin protocol uses an SHA-256d-based Proof-of-Work (PoW) algorithm to reach network consensus. Its network has a target block time of 10 minutes and a maximum supply of 21 million tokens, with a decaying token emission rate. To prevent fluctuation of the block time, the network’s block difficulty is re-adjusted through an algorithm based on the past 2016 block times.
  • With a block size limit capped at 1 megabyte, the Bitcoin Protocol has supported both the Lightning Network, a second-layer infrastructure for payment channels, and Segregated Witness, a soft-fork to increase the number of transactions on a block, as solutions to network scalability.

1. What is Bitcoin (BTC)?

  • Bitcoin is a peer-to-peer cryptocurrency that aims to function as a means of exchange and is independent of any central authority. Bitcoins are transferred electronically in a secure, verifiable, and immutable way.
  • Network validators, whom are often referred to as miners, participate in the SHA-256d-based Proof-of-Work consensus mechanism to determine the next global state of the blockchain.
  • The Bitcoin protocol has a target block time of 10 minutes, and a maximum supply of 21 million tokens. The only way new bitcoins can be produced is when a block producer generates a new valid block.
  • The protocol has a token emission rate that halves every 210,000 blocks, or approximately every 4 years.
  • Unlike public blockchain infrastructures supporting the development of decentralized applications (Ethereum), the Bitcoin protocol is primarily used only for payments, and has only very limited support for smart contract-like functionalities (Bitcoin “Script” is mostly used to create certain conditions before bitcoins are used to be spent).

2. Bitcoin’s core features

For a more beginner’s introduction to Bitcoin, please visit Binance Academy’s guide to Bitcoin.

Unspent Transaction Output (UTXO) model

A UTXO transaction works like cash payment between two parties: Alice gives money to Bob and receives change (i.e., unspent amount). In comparison, blockchains like Ethereum rely on the account model.

Nakamoto consensus

In the Bitcoin network, anyone can join the network and become a bookkeeping service provider i.e., a validator. All validators are allowed in the race to become the block producer for the next block, yet only the first to complete a computationally heavy task will win. This feature is called Proof of Work (PoW).
The probability of any single validator to finish the task first is equal to the percentage of the total network computation power, or hash power, the validator has. For instance, a validator with 5% of the total network computation power will have a 5% chance of completing the task first, and therefore becoming the next block producer.
Since anyone can join the race, competition is prone to increase. In the early days, Bitcoin mining was mostly done by personal computer CPUs.
As of today, Bitcoin validators, or miners, have opted for dedicated and more powerful devices such as machines based on Application-Specific Integrated Circuit (“ASIC”).
Proof of Work secures the network as block producers must have spent resources external to the network (i.e., money to pay electricity), and can provide proof to other participants that they did so.
With various miners competing for block rewards, it becomes difficult for one single malicious party to gain network majority (defined as more than 51% of the network’s hash power in the Nakamoto consensus mechanism). The ability to rearrange transactions via 51% attacks indicates another feature of the Nakamoto consensus: the finality of transactions is only probabilistic.
Once a block is produced, it is then propagated by the block producer to all other validators to check on the validity of all transactions in that block. The block producer will receive rewards in the network’s native currency (i.e., bitcoin) as all validators approve the block and update their ledgers.

The blockchain

Block production

The Bitcoin protocol utilizes the Merkle tree data structure in order to organize hashes of numerous individual transactions into each block. This concept is named after Ralph Merkle, who patented it in 1979.
With the use of a Merkle tree, though each block might contain thousands of transactions, it will have the ability to combine all of their hashes and condense them into one, allowing efficient and secure verification of this group of transactions. This single hash called is a Merkle root, which is stored in the Block Header of a block. The Block Header also stores other meta information of a block, such as a hash of the previous Block Header, which enables blocks to be associated in a chain-like structure (hence the name “blockchain”).
An illustration of block production in the Bitcoin Protocol is demonstrated below.

Block time and mining difficulty

Block time is the period required to create the next block in a network. As mentioned above, the node who solves the computationally intensive task will be allowed to produce the next block. Therefore, block time is directly correlated to the amount of time it takes for a node to find a solution to the task. The Bitcoin protocol sets a target block time of 10 minutes, and attempts to achieve this by introducing a variable named mining difficulty.
Mining difficulty refers to how difficult it is for the node to solve the computationally intensive task. If the network sets a high difficulty for the task, while miners have low computational power, which is often referred to as “hashrate”, it would statistically take longer for the nodes to get an answer for the task. If the difficulty is low, but miners have rather strong computational power, statistically, some nodes will be able to solve the task quickly.
Therefore, the 10 minute target block time is achieved by constantly and automatically adjusting the mining difficulty according to how much computational power there is amongst the nodes. The average block time of the network is evaluated after a certain number of blocks, and if it is greater than the expected block time, the difficulty level will decrease; if it is less than the expected block time, the difficulty level will increase.

What are orphan blocks?

In a PoW blockchain network, if the block time is too low, it would increase the likelihood of nodes producingorphan blocks, for which they would receive no reward. Orphan blocks are produced by nodes who solved the task but did not broadcast their results to the whole network the quickest due to network latency.
It takes time for a message to travel through a network, and it is entirely possible for 2 nodes to complete the task and start to broadcast their results to the network at roughly the same time, while one’s messages are received by all other nodes earlier as the node has low latency.
Imagine there is a network latency of 1 minute and a target block time of 2 minutes. A node could solve the task in around 1 minute but his message would take 1 minute to reach the rest of the nodes that are still working on the solution. While his message travels through the network, all the work done by all other nodes during that 1 minute, even if these nodes also complete the task, would go to waste. In this case, 50% of the computational power contributed to the network is wasted.
The percentage of wasted computational power would proportionally decrease if the mining difficulty were higher, as it would statistically take longer for miners to complete the task. In other words, if the mining difficulty, and therefore targeted block time is low, miners with powerful and often centralized mining facilities would get a higher chance of becoming the block producer, while the participation of weaker miners would become in vain. This introduces possible centralization and weakens the overall security of the network.
However, given a limited amount of transactions that can be stored in a block, making the block time too longwould decrease the number of transactions the network can process per second, negatively affecting network scalability.

3. Bitcoin’s additional features

Segregated Witness (SegWit)

Segregated Witness, often abbreviated as SegWit, is a protocol upgrade proposal that went live in August 2017.
SegWit separates witness signatures from transaction-related data. Witness signatures in legacy Bitcoin blocks often take more than 50% of the block size. By removing witness signatures from the transaction block, this protocol upgrade effectively increases the number of transactions that can be stored in a single block, enabling the network to handle more transactions per second. As a result, SegWit increases the scalability of Nakamoto consensus-based blockchain networks like Bitcoin and Litecoin.
SegWit also makes transactions cheaper. Since transaction fees are derived from how much data is being processed by the block producer, the more transactions that can be stored in a 1MB block, the cheaper individual transactions become.
The legacy Bitcoin block has a block size limit of 1 megabyte, and any change on the block size would require a network hard-fork. On August 1st 2017, the first hard-fork occurred, leading to the creation of Bitcoin Cash (“BCH”), which introduced an 8 megabyte block size limit.
Conversely, Segregated Witness was a soft-fork: it never changed the transaction block size limit of the network. Instead, it added an extended block with an upper limit of 3 megabytes, which contains solely witness signatures, to the 1 megabyte block that contains only transaction data. This new block type can be processed even by nodes that have not completed the SegWit protocol upgrade.
Furthermore, the separation of witness signatures from transaction data solves the malleability issue with the original Bitcoin protocol. Without Segregated Witness, these signatures could be altered before the block is validated by miners. Indeed, alterations can be done in such a way that if the system does a mathematical check, the signature would still be valid. However, since the values in the signature are changed, the two signatures would create vastly different hash values.
For instance, if a witness signature states “6,” it has a mathematical value of 6, and would create a hash value of 12345. However, if the witness signature were changed to “06”, it would maintain a mathematical value of 6 while creating a (faulty) hash value of 67890.
Since the mathematical values are the same, the altered signature remains a valid signature. This would create a bookkeeping issue, as transactions in Nakamoto consensus-based blockchain networks are documented with these hash values, or transaction IDs. Effectively, one can alter a transaction ID to a new one, and the new ID can still be valid.
This can create many issues, as illustrated in the below example:
  1. Alice sends Bob 1 BTC, and Bob sends Merchant Carol this 1 BTC for some goods.
  2. Bob sends Carols this 1 BTC, while the transaction from Alice to Bob is not yet validated. Carol sees this incoming transaction of 1 BTC to him, and immediately ships goods to B.
  3. At the moment, the transaction from Alice to Bob is still not confirmed by the network, and Bob can change the witness signature, therefore changing this transaction ID from 12345 to 67890.
  4. Now Carol will not receive his 1 BTC, as the network looks for transaction 12345 to ensure that Bob’s wallet balance is valid.
  5. As this particular transaction ID changed from 12345 to 67890, the transaction from Bob to Carol will fail, and Bob will get his goods while still holding his BTC.
With the Segregated Witness upgrade, such instances can not happen again. This is because the witness signatures are moved outside of the transaction block into an extended block, and altering the witness signature won’t affect the transaction ID.
Since the transaction malleability issue is fixed, Segregated Witness also enables the proper functioning of second-layer scalability solutions on the Bitcoin protocol, such as the Lightning Network.

Lightning Network

Lightning Network is a second-layer micropayment solution for scalability.
Specifically, Lightning Network aims to enable near-instant and low-cost payments between merchants and customers that wish to use bitcoins.
Lightning Network was conceptualized in a whitepaper by Joseph Poon and Thaddeus Dryja in 2015. Since then, it has been implemented by multiple companies. The most prominent of them include Blockstream, Lightning Labs, and ACINQ.
A list of curated resources relevant to Lightning Network can be found here.
In the Lightning Network, if a customer wishes to transact with a merchant, both of them need to open a payment channel, which operates off the Bitcoin blockchain (i.e., off-chain vs. on-chain). None of the transaction details from this payment channel are recorded on the blockchain, and only when the channel is closed will the end result of both party’s wallet balances be updated to the blockchain. The blockchain only serves as a settlement layer for Lightning transactions.
Since all transactions done via the payment channel are conducted independently of the Nakamoto consensus, both parties involved in transactions do not need to wait for network confirmation on transactions. Instead, transacting parties would pay transaction fees to Bitcoin miners only when they decide to close the channel.
One limitation to the Lightning Network is that it requires a person to be online to receive transactions attributing towards him. Another limitation in user experience could be that one needs to lock up some funds every time he wishes to open a payment channel, and is only able to use that fund within the channel.
However, this does not mean he needs to create new channels every time he wishes to transact with a different person on the Lightning Network. If Alice wants to send money to Carol, but they do not have a payment channel open, they can ask Bob, who has payment channels open to both Alice and Carol, to help make that transaction. Alice will be able to send funds to Bob, and Bob to Carol. Hence, the number of “payment hubs” (i.e., Bob in the previous example) correlates with both the convenience and the usability of the Lightning Network for real-world applications.

Schnorr Signature upgrade proposal

Elliptic Curve Digital Signature Algorithm (“ECDSA”) signatures are used to sign transactions on the Bitcoin blockchain.
However, many developers now advocate for replacing ECDSA with Schnorr Signature. Once Schnorr Signatures are implemented, multiple parties can collaborate in producing a signature that is valid for the sum of their public keys.
This would primarily be beneficial for network scalability. When multiple addresses were to conduct transactions to a single address, each transaction would require their own signature. With Schnorr Signature, all these signatures would be combined into one. As a result, the network would be able to store more transactions in a single block.
The reduced size in signatures implies a reduced cost on transaction fees. The group of senders can split the transaction fees for that one group signature, instead of paying for one personal signature individually.
Schnorr Signature also improves network privacy and token fungibility. A third-party observer will not be able to detect if a user is sending a multi-signature transaction, since the signature will be in the same format as a single-signature transaction.

4. Economics and supply distribution

The Bitcoin protocol utilizes the Nakamoto consensus, and nodes validate blocks via Proof-of-Work mining. The bitcoin token was not pre-mined, and has a maximum supply of 21 million. The initial reward for a block was 50 BTC per block. Block mining rewards halve every 210,000 blocks. Since the average time for block production on the blockchain is 10 minutes, it implies that the block reward halving events will approximately take place every 4 years.
As of May 12th 2020, the block mining rewards are 6.25 BTC per block. Transaction fees also represent a minor revenue stream for miners.
submitted by D-platform to u/D-platform [link] [comments]

Update TKEYSPACE 1.3.0 on Android

Update TKEYSPACE 1.3.0 on Android
Version 1.3.0 is a powerful update to TkeySpace that our team has been carefully preparing. since version 1.2.0, we have been laying the foundation for implementing new features that are already available in the current version.
Who cares about the security and privacy of their assets is an update for you.
TkeySpace — was designed to give You full control over your digital assets while maintaining an exceptional level of security, which is why there is no personal data in the wallet: phone number, the email address that could be compromised by hackers — no identity checks and other hassles, just securely save the backup phrase consisting of 12 words.

Briefly about the TkeySpace 1.3.0 update :

  • Code optimization and switching to AndroidX;
  • New section-Privacy;
  • Built-in TOR;
  • Selecting the privacy mode;
  • Selecting the recovery method for each currency;
  • Choosing the address format for Litecoin;
  • Enhanced validation of transactions and blocks in the network;
  • Disk space optimization;
  • Accelerated syncing;
  • Checking “double spending”;
  • The bloom filter to check for nodes;
  • Updating the Binance and Ethereum libraries;
  • A function to hide the balance;
  • Advanced currency charts;
  • Access to charts without authentication;
  • News section;
  • Browser for Tkeycoin;
  • Independent Commission entry for Bitcoin;
  • New digital currencies;
  • Digital currency exchange tab.

Code optimization and switching to AndroidX

A lot of work has been done on optimizing the code to speed up the application, improving the logic, synchronization speed, calculating the hash of cryptocurrencies, and successfully switching to AndroidX.

New section: Privacy

  • Enable Tor;
  • Blockchain transaction (the selection of the privacy mode);
  • Blockchain recovery (choosing a recovery method);


Starting with the current update, the TkeySpace wallet can communicate via the TOR network, includes new privacy algorithms, and supports 59 different currencies.
Tor is a powerful privacy feature for those who own large assets or live in places where the Internet is heavily censored.
Tor technology provides protection against traffic analysis mechanisms that compromise not only Internet privacy, but also the confidentiality of trade secrets, business contacts, and communications in General.
When you enable TOR settings, all outgoing traffic from the wallet will be encrypted and routed through an anonymous network of servers, periodically forming a chain through the Tor network, which uses multi-level encryption, effectively hiding any information about the sender: location, IP address, and other data.
This means that if your provider blocks the connection, you can rest easy — after all, by running this function, you will get an encrypted connection to the network without restrictions.
In TOR mode, the wallet may work noticeably slower and in some cases, there may be problems with the network, due to encryption, some blockchain browsers may temporarily not work. However, TOR encryption is very important when Internet providers completely block traffic and switching to this mode, you get complete freedom and no blocks for transactions.

Confidentiality of transactions (the Blockchain transaction)

The wallet can change the model of a standard transaction, mixing inputs and outputs, making it difficult to identify certain cryptocurrencies. In the current update, you can select one of several modes for the transaction privacy level: deterministic lexicographic sorting or shuffle mode.

Mode: Lexicographic indexing

Implemented deterministic lexicographic sorting using hashes of previous transactions and output indexes for sorting transaction input data, as well as values and scriptPubKeys for sorting transaction output data;
We understand that information must remain confidential not only in the interests of consumers but also in higher orders, financial systems must be kept secret to prevent fraud. One way to address these privacy shortcomings is to randomize the order of inputs and outputs.
Lexicographic ordering is a comparison algorithm used to sort two sets based on their Cartesian order within their common superset. Lexicographic order is also often referred to as alphabetical order or dictionary order. The hashes of previous transactions (in reverse byte order) are sorted in ascending order, lexicographically.
In the case of two matching transaction hashes, the corresponding previous output indexes will be compared by their integer value in ascending order. If the previous output indexes match, the input data is considered equal.

Shuffle Mode: mixing (random indexing)

To learn more about how “shuffle mode” works, we will first analyze the mechanisms using the example of a classic transaction. Current balance Of your wallet: 100 TKEY, coins are stored at different addresses:
x1. Address-contains 10 TKEY. x2. Address-contains 20 TKEY. x3. Address-contains 30 TKEY. x4. Address-contains 15 TKEY. x5. Address-contains 25 TKEY.
Addresses in the blockchain are identifiers that you use to send cryptocurrency to another person or to receive digital currency.
In a classic transaction, if you need to send, for example, 19 TKEY — 100 TKEY will be sent to the network for “melting” coins, 19 TKEY will be sent to the Recipient, and ~80.9 TKEY will return to the newly generated address for “change” in your wallet.
In the blockchain explorer, you will see the transaction amount in the amount of 100 TKEY, where 80.99999679 TKEY is your change, 19 TKEY is the amount you sent and 0.00000321 is the transaction fee. Thus, in the blockchain search engine, most of your balance is shown in the transaction.

How does the shuffle mode work?

Let’s look at a similar example: you have 100 TKEY on your balance, and you need to send 19 TKEY.
x1. Address-contains 10 TKEY. x2. Address-contains 20 TKEY. x3. Address-contains 30 TKEY. x4. Address-contains 15 TKEY. x5. Address-contains 25 TKEY.
You send 19 TKEY, the system analyzes all your addresses and balances on them and selects the most suitable ones for the transaction. To send 19 TKEY, the miners will be given coins with x2. Addresses, for a total of 20 TKEY. Of these, 19 TKEY will be sent to the recipient, and 0.99999679 TKEY will be returned to Your new address as change minus the transaction fee.
In the blockchain explorer, you will see the transaction amount in the amount of 20 TKEY, where 0.99999679 TKEY is Your change, 19 TKEY is the amount you sent and 0.00000321 is the transaction fee.
The shuffle mode has a cumulative effect. with each new transaction, delivery Addresses will be created and the selection of debit addresses/s that are most suitable for the transaction will change. Thus, if you store 1,000,000 TKEY in your wallet and want to send 1 TKEY to the recipient, the transaction amount will not display most of your balance but will select 1 or more addresses for the transaction.

Selecting the recovery method for each digital currency (Blockchain restore)

Now you can choose the recovery method for each currency: API + Blockchain or blockchain.
Note: This is not a syncing process, but rather the choice of a recovery method for your wallet. Syncing takes place with the blockchain — regardless of the method you choose.

What are the differences between recovery methods?

API + Blockchain

In order not to load the entire history of the blockchain, i.e. block and transaction headers, the API helps you quickly get point information about previous transactions. For example, If your transactions are located in block 67325 and block 71775, the API will indicate to the node the necessary points for restoring Your balance, which will speed up the “recovery” process.
As soon as the information is received, communication with the peers takes place and synchronization begins from the control point, then from this moment, all subsequent block loading is carried out through the blockchain. This method allows you to quickly restore Your existing wallet.
‘’+’’ Speed.
‘’-’’ The API server may fail.


This method loads all block headers (block headers + Merkle) starting from the BIP44 checkpoint and manually validates transactions.
‘’+’’ It always works and is decentralized. ‘’-’’ Loading the entire blockchain may take a long time.

Why do I need to switch the recovery method?

If when creating a wallet or restoring it, a notification (!) lights up in red near the selected cryptocurrency, then most likely the API has failed, so go to SettingsSecurity CenterPrivacyBlockchain Restore — switch to Blockchain. Syncing will be successful.

Selecting the address format

You can choose the address format not only for Bitcoin but also for Litecoin. Legacy, SegWit, Native SegWit. Go to SettingsManage WalletsAddress Format.

Working at the code level

Enhanced validation of transactions and blocks in the network

Due to the increased complexity in the Tkeycoin network, we have implemented enhanced validation of the tkeycoin consensus algorithm, and this algorithm is also available for other cryptocurrencies.

What is the advantage of the enhanced validation algorithm for the user

First, the name itself speaks for itself — it increases the security of the network, and second, by implementing the function — we have accelerated the work of the TkeySpace blockchain node, the application consumes even fewer resources than before.
High complexity is converted to 3 bytes, which ensures fast code processing and the least resource consumption on your device.


The synchronization process has been upgraded. Node addresses are added to the local storage, and instant synchronization with nodes occurs when you log in again.

Checking for double-spending

TkeySpace eliminates “double-spending” in blockchains, which is very valuable in the Bitcoin and Litecoin networks.
For example, using another application, you may be sent a fake transaction, and the funds will eventually disappear from the network and your wallet because this feature is almost absent in most applications.
Using TkeySpace — you are 100% sure that your funds are safe and protected from fraudulent transactions in the form of “fake” transactions.

The bloom filter to check for nodes

All nodes are checked through the bloom filter. This allows you to exclude fraudulent nodes that try to connect to the network as real nodes of a particular blockchain.
In practice, this verification is not available in applications, Tkeycoin — decided to follow a new trend and change the stereotypes, so new features such as node verification using the bloom filter and double-spending verification are a kind of innovation in applications that work with cryptocurrencies.

Updating the Binance and Ethereum libraries

Updated Binance and Ethereum libraries for interaction with the TOR network.


Function — to hide the balance

This function allows you to hide the entire balance from the main screen.

Advanced currency charts and charts without authentication

Detailed market statistics are available, including volumes, both for 1 day and several years. Select the period of interest: 1 day, 7 days, 1 month, 3 months, 6 months, 1 year, 2 years.
In version 1.3.0, you can access charts without authentication. You can monitor the cryptocurrency exchange rate without even logging in to the app. If you have a pin code for logging in, when you open the app, swipe to the left and you will see a list of currencies.


In the market data section — in the tkeyspace added a section with current news of the cryptocurrency market.

Blockchain Explorer for Tkeycoin

Transaction verification for Tkeycoin is now available directly in the app.

Independent Commission entry for Bitcoin

Taking into account the large volume of the Bitcoin network, we have implemented independent Commission entry — you can specify any Commission amount.
For other currencies, smart Commission calculation is enabled based on data from the network. The network independently regulates the most profitable Commission for the sender.

New digital currencies

The TkeySpace wallet supports +59 cryptocurrencies and tokens.


Tkeycoin (TKEY), Bitcoin (BTC), Litecoin (LTC), Ethereum (ETH), Bitcoin Cash (BCH), DASH, Binance (BNB), EOS.


TrueUSD (TUSD), Tether USD (USDT), USD Coin (USDC), Gemini Dollar (GUSD), STASIS EURO (EURS), Digix Gold Token (DGX), Paxos Standard (PAX), PAX Gold (PAXG), Binance USD (BUSD), EOSDT, Prospectors Gold (PGL).

ERC-20, BEP2, and EOS tokens

Newdex (NDX), DigixDAO ERC-20 (DGD), Chainlink ERC-20 (LINK), Decentraland ERC-20 (MANA), EnjinCoin ERC-20 (ENJ), the Native Utility (NUT), 0x Protocol ERC-20 (ZRX), Aelf ERC-20 (ELF), Dawn DAO ERC-20 (AURA), Cashaaa BEP2 (CAS), Bancor ERC-20 (BNT), the Basic Attention Token ERC-20 (BAT), Golem ERC-20 (GNT), Mithril ERC-20 (MITH), MEETONE, NEXO ERC-20, Holo ERC-20 (HOT), Huobi Token ERC-20 (HT), IDEX ERC-20, IDEX Membership ERC-20 (IDXM), Bitcoin BEP2 (BTCB), Waltonchain ERC-20 (WTC), KuCoin Shares ERC-20 (KCS), Kyber Network Crystal ERC-20 (KNC), Loom Network ERC-20 (LOOM), Ripple (XRP), Everipedia (IQ), Loopring ERC-20 (LRC), Maker ERC-20 (MKR), the Status of the ERC-20 (SNT), Ankr Network BEP2 (ANKR), OmiseGO ERC-20 (OMG), ^ american English ERC-20 (^american English), Polymath ERC-20 (POLY), Populous ERC-20 (PPT), Pundi X ERC-20 (NPXS), Parser ERC-20 (REP), Revain ERC-20 (R), Binance ERC20 (BNB-ERC20), Gifto BEP2 (GTO).

Exchange of cryptocurrency

The “Limitless Crypto Exchange” tab is available for a quick transition to an unlimited exchange in 200 digital currencies — 10,000 currency pairs.

How do I update TkeySpace to version 1.3.0?

  1. Go to Google Play on your device — My apps and games — find TkeySpace in the list of apps — click Update.
  2. Go to Google Play on your device-write TkeySpace in the search — click on the app icon — Update.
After the update, you will need to restore your wallet.
submitted by tkeycoin to Tkeycoin_Official [link] [comments]

r/Bitcoin recap - July 2019

Hi Bitcoiners!
I’m back with the 31st monthly Bitcoin news recap.
For those unfamiliar, each day I pick out the most popularelevant/interesting stories in Bitcoin and save them. At the end of the month I release them in one batch, to give you a quick (but not necessarily the best) overview of what happened in bitcoin over the past month.
You can see recaps of the previous months on
A recap of Bitcoin in July 2019
Regulation & Politics
Archeology (Financial Incumbents)
Price & Trading
Fun & Other
submitted by SamWouters to Bitcoin [link] [comments]

Can Any Current Crypto Commodity Ever Be Used As A General Currency?

“In the long run, we are all dead. Economists set themselves too easy, too useless a task if in tempestuous seasons they can only tell us that when the storm is long past the ocean will be flat again.” - John Maynard Keynes

Cryptocurrency Supply Algorithms And The Equation Of Exchange

Although I am a proponent for Bitcoin and view it as a good store-of-value, my belief is that all of the algorithms for cryptocurrency supply models that I have seen to date are not amenable to creating a cryptocurrency useful as a general currency. That is as a means for exchange-of-value as opposed to store-of-value. The following is my brief description of the models that I am aware of, followed by an explanation of why I believe they are not useful for as general currencies. At the bottom, I make a concluding remark on what I believe is a missing feature needed to realize a general currency.

Coin Supply Algorithms

In an N+1 algorithm, each time a block is produced, a constant incentive reward is added to the supply of coins. This means explicitly that the size of the coin supply will grow forever, unlimited. This sounds pretty good on the surface. If you are a miner, you are guaranteed that there will always be an incentive reward available for mining.
If we look at this from a total coin supply viewpoint, and a little high school math, the normalized change in supply is:
We then want to ask the question, how fast is the coin supply changing, as N goes to infinity since we are assuming that blocks are produced forever. This is:
Lim N->∞ N+1/N
Where N is the number of blocks produced. By L’Hôpital’s rule for those that remember a little highschool calculus (I had to look it up), we can take the derivatives of the numerator and denominator which results in 1/1 = 1. In the limit at infinity, the coin supply is a constant value, even though theoretically it grows forever.
Since infinity is only theoretical, what does this look like for blockchain use cases:
To give a feel for it, imagine that we are at the following 4 stages: 10 blocks have been produced; 100 blocks have been produced; 1000 blocks have been produced, and 10000 blocks have been produced. Adding one reward at each stage gives the following percent change in coin supply:
1 — (10 + 1)/10 = 10%
1 — (100+1)/100 = 1%
1 — (1000+1)/1000 = .1%
1 — (10000+1)/10000 = .01%
This demonstrates that the change in coin supply quickly dwindles to an insignificant amount, even though it continues to grow forever. To put this another way, the addition of each new incentive reward quickly becomes a very small fraction of the total coin supply. The coin supply can be thought of as relatively constant.
N + M*N/2T or N(1+M/2T)
T is units of time in discrete steps, and M is the number of blocks produced at each step. This is essentially the Bitcoin model. To make this clearer let’s assume that there is only 1 block produced at each step. This becomes N + N/2T or N(1+1/2T).
If we replace 2T with a new variable K, then this becomes:
Where K increases forever. The summation of 1/K is the harmonic series and increases forever. Therefore, just like N+1 above, N(1+1/K) or N+N/K also increases forever. As with N+1, the rate of increase of the coin supply is then:
This is more simply 1 + 1/K. Thus, as K grows, we can see that the rate of increase tends towards zero as well. Further, since 1/K becomes a smaller and smaller fraction, eventually representing this as a value in a computer becomes impossible. For example, Bitcoin’s smallest fraction is 1 satoshi. When 1/K becomes smaller than 1 satoshi it will no longer be possible to have an incentive reward for a single block produced.
Given that both coin supply algorithms tend towards a relatively constant supply, in terms of use as a currency, we can view both as essentially equivalent. The only difference is how fast the supply tends towards a constant value, where the Bitcoin model is faster.
A third coin supply algorithm is a simple constant amount created in the genesis block. The coins are usually distributed using an airdrop or similar model. Since coins are not being created, the coin supply is by definition constant. If the distribution model used is an incentive reward model to distribute from the pool of coins, it is indistinguishable from one of the above 2 models. If the distribution model is a one-time event, such that all the coins are distributed then there is no incentive reward model.
From a viewpoint of use of currency all 3 models described above can be thought of as equivalent, given enough blocks have been produced for the first 2 models.

Marked To External Asset

There is the fourth model for coin supply which is intended to mark the value of the coin to an external index of some kind. This may be a physical asset like an ounce of gold, or another commodity. In this model, the coin can explicitly represent a unit of the external asset such as an ounce of gold. Regardless of whether the coin can be exchanged for the underlying asset or not, given that supply of commodities such as gold are constantly following the same mining algorithms as above, the marked to asset model is a constant coin supply model. If the distribution model used is an incentive reward model, then it is similar to the third model.

Marked To Value Of External Asset

There is a fifth model for coin supply where the value of the coin is marked to the value of an external asset like the USD, instead of the supply of the external asset, as was the case for marking to a commodity. In this model, the coin supply is changed to reflect the exchange rate of the coin against the value of the external asset. The objective is to keep the exchange rate constant on average over time. For example: assuming the objective is a 1-to-1 exchange between the coin and the USD, then if the coin’s value increases above the objective, more coins are printed, and vice-versa. That is, if the value of the coin decreases, given some means (i.e. burning), the coin supply is decreased to bring the exchange rate towards the objective.
In this model, the coin supply is not fixed but varies with the exchange rate. To the extent that the value of the external asset is relatively constant, and the value of the coin is relatively constant the coin supply will be relatively constant.
Although marking to the USD would seem to be a good idea, given that it is called a “reserve currency”, the USD is intentionally subject to inflation, theoretically, the coin to USD exchange will continue to decrease, requiring the coin supply to be decreased to maintain the objective of a constant exchange rate. Over time, this model can be viewed as decreasing the coin supply if marked to the inflationary external asset value.

Comparing Coin Supply Models

In summary, of the five models described above, four of them are essentially variations on a constant coin supply using various means to distribute the coin, while the fifth tries to keep the value of the coin constant against an external asset value, by managing the supply of the coin.
The equation of exchange: M * V = P * Y[1] tells us that if the amount of money supply, M, (i.e. the coin supply) is constant, and the velocity of money is relatively constant, then an increase in demands for goods (Y), will cause a decrease in the price (P), price deflation. That is, with a fixed coin supply the price of goods is expected to drop, thus increasing the value of the coin. Bitcoin’s increase in value is an example of this. (The Bitcoin ledger does not have the means to determine either prices (P) or goods (Y). Instead, I am inferring from the increase in the value of bitcoins that an increase in demand for Y is occurring. There are possible other explanations.)
However, it should be noted that in order for the equation of exchange to be valid, the assumption of the velocity of money is relatively constant must hold. If holders of the coin stop using it as a currency for the exchange of value, then the M * V = M * 0 = 0. There is no price in that coin for any goods or services. That is, the value of the coin collapses.
Conversely, if the velocity of the coin were to increase significantly, then this creates effectively more available coin, resulting in the price (P) of the goods and services (Y) to increase. This causes price inflation, which encourages coin holders to spend their coin as fast as possible to avoid losing value in the coin. As the price of goods becomes excessive, people shift from the coin to other forms of currency. As this happens, once more a collapse happens.
At an equilibrium point, the coin supply is constant, the velocity is constant, the demand for goods and services is constant, and therefore the price would be constant. At such an equilibrium point, a constant coin supply would be ideal. However, we can observe throughout history that such an equilibrium point is never reached.
Given any sort of constant coin supply, the value of the coin is expected to vary unpredictably and often wildly. Of the 5 models, the first 4 will always be subject to this. Although this may be interesting for speculators, usefulness for general currency is questionable.
The fifth model is to manage the coin supply against an external asset value. In essence, this is a substitution of the coin for the asset. Provided that the coin supply can be managed to reflect the objective exchange rate, the value of the coin should be stable relative to the stability of the external asset value.
However, in my opinion, this marking of value does not take into account exchanges that are wholly internal to the coin and its blockchain. The transfer of a coin balance from one account to another implies an exchange of value, thus the equation of exchange applies internally to the blockchain. This exchange of value is independent of the exchange rate of the coin value versus the external asset value. Thus, the coin supply can be seen as independent of the exchange of value on the blockchain.
Given this assumption, we can make the simplifying assumption that the coin supply is relatively constant with respect to the exchange of value on the blockchain. As a result, one would expect that even though the coin supply is managed against the exchange rate with an external asset, its value can still fluctuate wildly, beyond the ability of coin supply management to compensate. This, in turn, will impact the exchange rate, destroying the intended objective.
As a natural consequence, even with the approach of marking the value of the coin to external asset value, such as the USD, the expected volatility limits the usefulness of the coin as a currency.

Towards A General Currency

As stated in the introduction, I believe that none of the cryptocurrency models described are viable for use as general currencies. In my opinion, my brief non-rigorous analysis above demonstrates this likely to be true. The question remains, what else is needed to create a cryptocurrency that is viable as a general currency.
The equation of exchange shows us what is missing directly: In the equation M * V = P * Y, we can say that on every blockchain we can know the values of M and V directly. The account ledger explicitly shows us this, (ignoring encrypted exchanges). What we do not know is the other side of the equation. We do not know either price (P) or goods and services (Y) for any exchanges that are internal to the blockchain, that is between accounts on the blockchain.
If we compare cryptocurrencies with national fiat currencies, and cryptocurrency exchanges with foreign exchanges, we can see that the foreign exchanges relate the difference in prices in related economies. In comparison, the cryptocurrency exchanges appear to only relate the difference in demand for the cryptocurrencies themselves. This demand only manifests itself during the exchange of cryptocurrencies for each other and between fiat and cryptocurrencies and vice-versa.
It is my position that because the internal use of cryptocurrencies on their own blockchains is currently hidden, none of the above coin supply models will create a currency stable enough to be useful as a general currency. If/when a cryptocurrency model is created that takes into account the currently hidden internal exchange of value, then we will have realized a general currency.
submitted by PrasagaOfficial to u/PrasagaOfficial [link] [comments]

IOTA and Tangle discussion/info, scam or not?

In the past weeks I heard a lot pros and cons about IOTA, many of them I believe were not true (I'll explain better). I would like to start a serious discussion about IOTA and help people to get into it. Before that I'll contribute with what I know, most things that I will say will have a source link providing some base content.
The pros and cons that I heard a lot is listed below, I'll discuss the items marked with *.


Many users claim that the network infinitely scales, that with more transactions on the network the faster it gets. This is not entirely true, that's why we are seeing the network getting congested (pending transactions) at the moment (12/2017).
The network is composed by full-nodes (stores all transactions), each full-node is capable of sending transactions direct to the tangle. An arbitrary user can set a light-node (do not store all transactions, therefore a reduced size), but as it does not stores all transactions and can't decide if there are conflicting transactions (and other stuff) it needs to connect to a full-node (bitifinex node for example) and then request for the full-node to send a transaction to the tangle. The full-node acts like a bridge for a light-node user, the quantity of transactions at the same time that a full-node can push to the tangle is limited by its brandwidth.
What happens at the moment is that there are few full-nodes, but more important than that is: the majority of users are connected to the same full-node basically. The full-node which is being used can't handle all the requested transactions by the light-nodes because of its brandwidth. If you are a light-node user and is experiencing slow transactions you need to manually select other node to get a better performance. Also, you need to verify that the minimum weight magnitude (difficulty of the Hashcash Proof of Work) is set to 14 at least.
The network seems to be fine and it scales, but the steps an user has to make/know are not friendly-user at all. It's necessary to understand that the technology envolved is relative new and still in early development. Do not buy iota if you haven't read about the technology, there is a high chance of you losing your tokens because of various reasons and it will be your own fault. You can learn more about how IOTA works here.
There are some upcoming solutions that will bring the user-experience to a new level, The UCL Wallet (expected to be released at this month, will talk about that soon and how it will help the network) and the Nelson CarrIOTA (this week) besides the official implementations to come in december.


We all know that currently (2017) IOTA depends on the coordinator because the network is still in its infancy and because of that it is considered centralized by the majority of users.
The coordinator are several full-nodes scattered across the world run by the IOTA foundation. It creates periodic Milestones (zero value transactions which reference valid transactions) which are validated by the entire network. The coordinator sets the general direction for the tangle growth. Every node verifies that the coordinator is not breaking consensus rules by creating iotas out of thin air or approving double-spendings, nodes only tells other nodes about transactions that are valid, if the Coordinator starts issuing bad Milestones, nodes will reject them.
The coordinator is optional since summer 2017, you can choose not implement it in your full-node, any talented programmer could replace Coo logic in IRI with Random Walk Monte Carlo logic and go without its milestones right now. A new kind of distributed coordinator is about to come and then, for the last, its completely removal. You can read more about the coordinator here and here.

Mining-Blockchain-based Cryptocurrencies

These are blockchain-based cryptocurrencies (Bitcoin) that has miners to guarantee its security. Satoshi Nakamoto states several times in the Bitcoin whitepaper that "The system is secure as long as honest nodes collectively control more CPU power than any cooperating group of attacker nodes". We can see in that nowadays half of the total hashpower in Bitcoin is controlled by 3 companies (maybe only 1 in the future?). Users must trust that these companies will behave honestly and will not use its 50%> hashpower to attack the network eventually. With all that said it's reasonable to consider the IOTA network more decentralized (even with the coordinator) than any mining-blockchain-based cryptocurrency
You can see a comparison between DAG cryptocurrencies here

IOTA partnerships

Some partnerships of IOTA foundation with big companies were well known even when they were not officialy published. Some few examples of confirmed partnerships are listed below, others cofirmed partnerships can be seem in the link Partnerships with big companies at the pros section.
So what's up with all alarming in social media about IOTA Foundation faking partnerships with big companies like Microsoft and Cisco?
At Nov. 28th IOTA Foundation announced the Data Marketplace with 30+ companies participating. Basically it's a place for any entity sell data (huge applications, therefore many companies interested), at time of writing (11/12/2017) there is no API for common users, only companies in touch with IOTA Foundation can test it.
A quote from Omkar Naik (Microsoft worker) depicted on the Data Marketplace blog post gave an idea that Microsoft was in a direct partnership with IOTA. Several news websites started writing headlines "Microsoft and IOTA launches" (The same news site claimed latter that IOTA lied about partnership with Microsoft) when instead Microsoft was just one of the many participants of the Data Marketplace. Even though it's not a direct partnership, IOTA and Microsoft are in close touch as seen in IOTA Microsoft and Bosch meetup december 12th, Microsoft IOTA meetup in Paris 14th and Microsoft Azure adds 5 new Blockchain partners (may 2016). If you join the IOTA Slack channel you'll find out that there are many others big companies in close touch with IOTA like BMW, Tesla and other companies. This means that right now there are devs of IOTA working directly with scientists of these companies to help them integrate IOTA on their developments even though there is no direct partnership published, I'll talk more about the use cases soon.
We are excited to partner with IOTA foundation and proud to be associated with its new data marketplace initiative... - Omkar Naik

IOTA's use cases

Every cryptocurrency is capable of being a way to exchange goods, you pay for something using the coin token and receive the product. Some of them are more popular or have faster transactions or anonymity while others offers better scalablity or user-friendness. But none of them (except IOTA) are capable of transactioning information with no costs (fee-less transactions), in an securely form (MAM) and being sure that the network will not be harmed when it gets more adopted (scales). These characteristics open the gates for several real world applications, you probably might have heard of Big Data and how data is so important nowadays.
Data sets grow rapidly - in part because they are increasingly gathered by cheap and numerous information-sensing Internet of things devices such as mobile devices, aerial (remote sensing), software logs, cameras, microphones, radio-frequency identification (RFID) readers and wireless sensor networks.
It’s just the beginning of the data period. Data is going to be so important for human life in the future. So we are now just starting. We are a big data company, but compared to tomorrow, we are nothing. - Jack Ma (Alibaba)
There are enormous quantities of wasted data, often over 99% is lost to the void, that could potentially contain extremely valuable information if allowed to flow freely in data streams that create an open and decentralized data lake that is accessible to any compensating party. Some of the biggest corporations of the world are purely digital like Google, Facebook and Amazon. Data/information market will be huge in the future and that's why there so many companies interested in what IOTA can offer.
There are several real world use cases being developed at the moment, many of them if successful will revolutionize the world. You can check below a list of some of them.
These are just few examples, there are a lot more ongoing and to explore.

IOTA Wallet (v2.5.4 below)

For those who have read a lot about IOTA and know how it works the wallet is fine, but that's not the case for most users. Issues an user might face if decide to use the current wallet:
Problems that could be easily avoided with a better understand of the network/wallet or with a better wallet that could handle these issues. As I explained before, some problems during the "congestion" of the network could be simply resolved if stuff were more user-friendly, this causes many users storing their iotas on exchanges which is not safe either.
The upcoming (dec 2017) UCL Wallet will solve most of these problems. It will switch between nodes automatically and auto-reattach transactions for example (besides other things). You can have full a overview of it here and here. Also, the upcoming Nelson CarrIOTA will help on automatic peer discovery for users setup their nodes more easily.

IOTA Vulnerability issue

On sept 7th 2017 a team from MIT reported a cryptographic issue on the hash function Curl. You can see the full response of IOTA members below.
Funds were never in danger as such scenarios depicted on the Neha's blogpost were not pratically possible and the arguments used on the blogpost had'nt fundamentals, all the history you can check by yourself on the responses. Later it was discovered that the whole Neha Narula's team were envolved in other concurrent cryptocurrency projects
Currently IOTA uses the relatively hardware intensive NIST standard SHA-3/Keccak for crucial operations for maximal security. Curl is continuously being audited by more cryptographers and security experts. Recenlty IOTA Foundation hired Cybercrypt, the world leading lightweight cryptography and security company from Denmark to take the Curl cryptography to its next maturation phase.
It took me a couple of days to gather the informations presented, I wanted it to make easier for people who want to get into it. It might probably have some mistakes so please correct me if I said something wrong. Here are some useful links for the community.
This is my IOTA donation address, in case someone wants to donate I will be very thankful. I truly believe in this project's potential.
This is a donation address, if you want to do the same you might pay attention to some important details:
  • Create a seed for only donation purposes.
  • Generate a address and publish it for everyone.
  • If you spend any iota you must attach a new address to the tangle and refresh your donation address published before to everyone.
  • If someone sends iota to your previous donation address after you have spent from it you will probably lose the funds that were sent to that specific address.
  • You can visualize how addresses work in IOTA here and here.
This happens because IOTA uses Winternitz one-time signature to become quantum resistent. Every time you spend iota from a address, part of the private key of that specific address is revealed. This makes easier for attackers to steal that address balance. Attackers can search if an address has been reused on the tangle explorer and try to brute force the private key since they already know part of it.
submitted by mvictordbz to CryptoCurrency [link] [comments]

A technical dive into CTOR

Over the last several days I've been looking into detail at numerous aspects of the now infamous CTOR change to that is scheduled for the November hard fork. I'd like to offer a concrete overview of what exactly CTOR is, what the code looks like, how well it works, what the algorithms are, and outlook. If anyone finds the change to be mysterious or unclear, then hopefully this will help them out.
This document is placed into public domain.

What is TTOR? CTOR? AOR?

Currently in Bitcoin Cash, there are many possible ways to order the transactions in a block. There is only a partial ordering requirement in that transactions must be ordered causally -- if a transaction spends an output from another transaction in the same block, then the spending transaction must come after. This is known as the Topological Transaction Ordering Rule (TTOR) since it can be mathematically described as a topological ordering of the graph of transactions held inside the block.
The November 2018 hard fork will change to a Canonical Transaction Ordering Rule (CTOR). This CTOR will enforce that for a given set of transactions in a block, there is only one valid order (hence "canonical"). Any future blocks that deviate from this ordering rule will be deemed invalid. The specific canonical ordering that has been chosen for November is a dictionary ordering (lexicographic) based on the transaction ID. You can see an example of it in this testnet block (explorer here, provided this testnet is still alive). Note that the txids are all in dictionary order, except for the coinbase transaction which always comes first. The precise canonical ordering rule can be described as "coinbase first, then ascending lexicographic order based on txid".
(If you want to have your bitcoin node join this testnet, see the instructions here. Hopefully we can get a public faucet and ElectrumX server running soon, so light wallet users can play with the testnet too.)
Another ordering rule that has been suggested is removing restrictions on ordering (except that the coinbase must come first) -- this is known as the Any Ordering Rule (AOR). There are no serious proposals to switch to AOR but it will be important in the discussions below.

Two changes: removing the old order (TTOR->AOR), and installing a new order (AOR->CTOR)

The proposed November upgrade combines two changes in one step:
  1. Removing the old causal rule: now, a spending transaction can come before the output that it spends from the same block.
  2. Adding a new rule that fixes the ordering of all transactions in the block.
In this document I am going to distinguish these two steps (TTOR->AOR, AOR->CTOR) as I believe it helps to clarify the way different components are affected by the change.

Code changes in Bitcoin ABC

In Bitcoin ABC, several thousand lines of code have been changed from version 0.17.1 to version 0.18.1 (the current version at time of writing). The differences can be viewed here, on github. The vast majority of these changes appear to be various refactorings, code style changes, and so on. The relevant bits of code that deal with the November hard fork activation can be found by searching for "MagneticAnomaly"; the variable magneticanomalyactivationtime sets the time at which the new rules will activate.
The main changes relating to transaction ordering are found in the file src/validation.cpp:
There are other changes as well:


Serial block processing (one thread)

One of the most important steps in validating blocks is updating the unspent transaction outputs (UTXO) set. It is during this process that double spends are detected and invalidated.
The standard way to process a block in bitcoin is to loop through transactions one-by-one, removing spent outputs and then adding new outputs. This straightforward approach requires exact topological order and fails otherwise (therefore it automatically verifies TTOR). In pseudocode:
for tx in transactions: remove_utxos(tx.inputs) add_utxos(tx.outputs) 
Note that modern implementations do not apply these changes immediately, rather, the adds/removes are saved into a commit. After validation is completed, the commit is applied to the UTXO database in batch.
By breaking this into two loops, it becomes possible to update the UTXO set in a way that doesn't care about ordering. This is known as the outputs-then-inputs (OTI) algorithm.
for tx in transactions: add_utxos(tx.outputs) for tx in transactions: remove_utxos(tx.inputs) 
Benchmarks by Jonathan Toomim with Bitcoin ABC, and by myself with ElectrumX, show that the performance penalty of OTI's two loops (as opposed to the one loop version) is negligible.

Concurrent block processing

The UTXO updates actually form a significant fraction of the time needed for block processing. It would be helpful if they could be parallelized.
There are some concurrent algorithms for block validation that require quasi-topological order to function correctly. For example, multiple workers could process the standard loop shown above, starting at the beginning. A worker temporarily pauses if the utxo does not exist yet, since it's possible that another worker will soon create that utxo.
There are issues with such order-sensitive concurrent block processing algorithms:
In contrast, the OTI algorithm's loops are fully parallelizable: the worker threads can operate in an independent manner and touch transactions in any order. Until recently, OTI was thought to be unable to verify TTOR, so one reason to remove TTOR was that it would allow changing to parallel OTI. It turns out however that this is not true: Jonathan Toomim has shown that TTOR enforcement is easily added by recording new UTXOs' indices within-block, and then comparing indices during the remove phase.
In any case, it appears to me that any concurrent validation algorithm would need such additional code to verify that TTOR is being exactly respected; thus for concurrent validation TTOR is a hindrance at best.

Advanced parallel techniques

With Bitcoin Cash blocks scaling to large sizes, it may one day be necessary to scale onto advanced server architectures involving sharding. A lot of discussion has been made over this possibility, but really it is too early to start optimizing for sharding. I would note that at this scale, TTOR is not going to be helpful, and CTOR may or may not lead to performance optimizations.

Block propagation (graphene)

A major bottleneck that exists in Bitcoin Cash today is block propagation. During the stress test, it was noticed that the largest blocks (~20 MB) could take minutes to propagate across the network. This is a serious concern since propagation delays mean increased orphan rates, which in turn complicate the economics and incentives of mining.
'Graphene' is a set reconciliation technique using bloom filters and invertible bloom lookup tables. It drastically reduces the amount of bandwidth required to communicate a block. Unfortunately, the core graphene mechanism does not provide ordering information, and so if many orderings are possible then ordering information needs to be appended. For large blocks, this ordering information makes up the majority of the graphene message.
To reduce the size of ordering information while keeping TTOR, miners could optionally decide to order their transactions in a canonical ordering (Gavin's order, for example) and the graphene protocol could be hard coded so that this kind of special order is transmitted in one byte. This would add a significant technical burden on mining software (to create blocks in such a specific unusual order) as well as graphene (which must detect this order, and be able to reconstruct it). It is not clear to me whether it would be possible to efficiently parallelize sorting algortithms that reconstruct these orderings.
The adoption of CTOR gives an easy solution to all this: there is only one ordering, so no extra ordering information needs to be appended. The ordering is recovered with a comparison sort, which parallelizes better than a topological sort. This should simplify the graphene codebase and it removes the need to start considering supporting various optional ordering encodings.

Reversibility and technical debt

Can the change to CTOR be undone at a later time? Yes and no.
For block validators / block explorers that look over historical blocks, the removal of TTOR will permanently rule out usage of the standard serial processing algorithm. This is not really a problem (aside from the one-time annoyance), since OTI appears to be just as efficient in serial, and it parallelizes well.
For anything that deals with new blocks (like graphene, network protocol, block builders for mining, new block validation), it is not a problem to change the ordering at a later date (to AOR / TTOR or back to CTOR again, or something else). These changes would add no long term technical debt, since they only involve new blocks. For past-block validation it can be retroactively declared that old blocks (older than a few months) have no ordering requirement.

Summary and outlook

Taking a broader view, graphene is not the magic bullet for network propagation. Even with the CTOR-improved graphene, we might not see vastly better performance right away. There is also work needed in the network layer to simply move the messages faster between nodes. In the last stress test, we also saw limitations on mempool performance (tx acceptance and relaying). I hope both of these fronts see optimizations before the next stress test, so that a fresh set of bottlenecks can be revealed.
submitted by markblundeberg to btc [link] [comments]

Investigation of (Dis-)Favor 1\3 questioning freedom of will (in Macro-society)

This item began as a simple idea to investigate "social construct" theory, a trendy theme in academia and identity politics. It turned into a staggeringly complex constellation of ideas, with surprises galore.
The idea occurs to me: validate (or not) 'social construction' of beauty. If not, then sense of beauty is innate (source is not one's society, but genetic or other episocial influences).
Natural Tendency towards Beauty in Humans: Evidence from Binocular Rivalry 2016 | plos (technical study)
Reading in Contemporary Aesthetics "Why Beauty Still Cannot Be Measured", by Ossi Naukkarinen, because beauty is a personal determination, and a metaphor of favor, but how is it determined? Example: which of these women looks beautiful to you? note: only descriptor for the AI search is "beautiful woman", AI learns about beauty by sifting mega-data; how effective is it? (achieves given goal?) AI results are socially constructed in the most explicit way possible! Beauty may not be measurable, but it can be selected (parsed) from non-beauty. Measurement is a comparison of some phenomenon to an abstract dimension. Selection is a go, no-go choice.
What is Nudge theory? This item straddles the fence between Macro and Micro societies, paradigmatic Nudges come from Macro sources, but include an option to choose without pressure to conform. Micro sources are always more direct; which side of the fence are you on, friend?. (Greener side, of course.)
What about searching for "good", images? note how often the WORD good is pictured. Good is a language construct that must be interpreted from the individual's perspective.
Ok, now search for "favor" images note that AI mostly interprets favor as a small gift, not as a preference (which is difficult to represent by image)
Well then, search for "preference", images note that the word preference happens to be used by a line of hair care products from L'Oreal, which dominates the returns... commerce rules!
social construct (def, search result)
validate (or not) 'social construction' of beauty
Is Socialism a social construct? (LoL) Socialism Defined (EVERY Country is Socialist!) 2.2k views Sep 29, 2019 Rokn'MrE
To (social) Construct, or Not to (social) Construct, is there a choice? (note most results are about gender)
Parsing gender
Discussion of gender is not my direction of choice in this part 1 investigation. I want to seek how an actor (esp. me) makes a choice, in a quest for freedom of will. Perhaps come back to gender in a future item.
person makes a choice, in a quest for freedom of will (selections available)
Exemplar Hyp (Harry) Frankfurt’s compatibilist theory of free will 2009 5pg.pdf
I notice my choice of article was partly determined, partly free, but parsing out those factors would be too much divergence from the goal here. But Truth (a two side coin) is my story, and I'm stickin' to it.
(previous link, compatibilism):
3 It explains our intuition that human beings, but not lower animals, have free will. Lower animals lack free will because they lack the second-order volitions which are constitutive of free will. (This item is unnecessary and probably not true; how do we know animals have no "second-order volitions"? Having no other language than "body", we can only surmise (guess) what their volitions are. Volitions come before actions, we cannot see them or interpret them in any way. Brain conditions might be interpreted with MRI scanning, but to put a subject in a scanning device is to prevent any other actions. Such measuring ruins the connection between mental state and volition being measured, except we can safely assume that every measurement of animals must default to the volition to escape the measuring device.)
That's the first-order, highlighted deviation from compatibility theory. Clarification of "second-order volition": a path from choice to action has an intermediate "middle-way" tunneling mode, contracting (taking on) a desire to make a choice, prior to making the choice. In order to prove freedom, one must establish the mental preference for an imagined outcome in order to prove that preference did come from within the person and was not forced by other external deciding factors (genetic factors are pre-determined).
incompatibilism Note: the approach is wrong by the universal assumption, IOW that the intersection of determined and free is zero. It's a supremacy position, or superposition principle (LoL), the error is in over-simplification. The Logic Argument (p.5) is not representative of reality, which is more nuanced. Therefore, Frankfurt's thesis is good (denial of incompatibilism), but not due to the case presented (superposition).
Take Frankfurt's case (p.4) of Black vs Jones4 to be analogy for State vs Individual. Silent Weapons for Quiet Wars (other sources exist, search for yourself)
The (myusername) determinism/free-will duality hypothesis (denial of incompatibilism due to non-zero intersection):
Most choices, including the choice of desires, are determined by contingencies of which one is the natural desire of the actor to optimize his/her outcomes ("best wishes"). Is a person always compelled to have best wishes? What is best depends on a person's mental state, which is usually determined by external factors, but those can vary in cogency (impact on behavior). Consider the choice to commit suicide, certainly not a trivial choice. (The Chosen means of execution (puns intended) is somewhat more trivial, but again, partly determined by external conditions.)
Some choices, nearly all trivial, are free because no interfering contingencies are apparent during the choosing interlude. It may happen in hindsight, that a past choice is observed to be a mistake, usually because some contingency was overlooked or unknown during the choosing. This observation should be remembered so as to avoid repeating a future choice like that mistake. Choices always have risks, including the choice to do nothing.
Different day, slightly different approach... parsing choice. 1 important choices that have many deep effects later, for instances a marriage partner, a new job, a new residence; 2 trivial choices which have minor effects, risks or physical involvement, for instances a choice of toothpaste at the market, to like or not a web-link or museum exhibit.
According to (myusername)'s determined/free paradigm, type 1 choices are nearly all determined by pre-existing conditions (not free). Type 2 choice is the arena of freedom. I suppose a person's low risk-aversion parameter could expand the envelope of freedom, but that's a characteristic that develops during maturation, one's history of choices and ensuing responses. Successful responses lead to more freedom, failures to less. So even when freedom exists, it accumulates a history (habits) which become a determinant.
Contracting the Social Construct Disorder (it's contagious) Take 1:
How does an actor (person in question who comes to an internal state, or inner-construct) interact with a community or society? Must it be IRL, or can virtual interaction suffice to construct internal states? And more to my point, must the interaction be two-way (containing feedback), or simply via broadcast medium? (broadcast includes published books, articles, records, radio, TV or Internet A/V shows, etc.)
Interaction with broadcast media can be summarized by: a choice, a degree of attention and focus (time spent on and attention given to item), a like/dislike or more complex reaction to item, having future behavior influenced by item, to continue a stream of behaviors (especially sequential item choices) as consequence of influence of item, to develop a complex of attitudes built upon stream of items (eg. just mentioned 'risk aversion parameter and habit).
Before going on, I notice that broadcast media is like Sunshine, Rain, and Grace. It is made available by participation in a community, and falls without curse or blessing, it's all there for the choosing (or ignoring), depending on the contingencies.
Mind control theory? (because mind is the inner source of volition... behavior, control the mind (easy), hence control the behaviors (difficult otherwise))
Mind control courtesy Tavistock Inst.
Construction of Favor (or any knowledge) upon Familiarity
What is Social Construction? (cntrlZ)
"For instance, trees are only differentiated from other plants by virtue of the fact that we have all learned to see them as "trees."
But we don't all know about trees to an equal degree. I know rather much about trees from my interaction with them: living among them, planting them, sawing them, moving them, burning them, etc., not from reading or talking about them. No doubt, there are many persons all over the world who have very little experience of trees, and cannot 'construct' treeness as well as me. Direct experience is more realistic and developed than social constructs.
Favor and Familiarity are interwoven by choice
I chose to live alone with trees and not alone with sea, or desert (for examples), because it was easier to go with trees. Was the choice free? I could have chosen city or suburb with even more ease than forest, so ease of choice was not the deciding factor, it was my preference of lonely forest over crowded urb that decided me. So maybe it wasn't really about trees, it was about independence or something else like that. When we choose, we may not understand the contingencies, but our decision (choice) may be due to habits or patterns that have developed in the maturity process. Habits are strong determinants, and they develop, according to Ian Plowman, 4 ways.
The cntrlZ article makes the case for 'Strong Social Construction' based on that 'knowing' which is all about language, certainly a social construct.
Within the social construction of language is the game. Outside the social construction is reality, the real world. (a list of social constructs follows)
That makes it clear. Experiences (direct ones) without resort to language are NOT social constructs. That observation makes another distinction clear: gender may be a social construct, as it's a language issue, but sex is not a social construct, it is a direct experience issue that develops in the maturation process: birth, infant, child, puberty, sexy adolescent, sexy adult, old (unsexy) adult, death. Prior to puberty, sex is incipient in its development, but comes to life, (like a flower blooms) after a decade or so. Knowing about sex as a child is by observation from outside (thru the looking glass), after puberty, it's direct experience, and much later, it's a fading memory.
Regarding Looking-glass self theory the notion of socially constructed identity (defining the self by differences/ affinities to others),
... the outcome of "taking the role of the other", the premise for which the self is actualized. Through interaction with others, we begin to develop an identity of our own as well as developing a capacity to empathize with others... Therefore, the concept of self-identity may be considered an example of a social construction.
... makes a spurious expansion of identity formation to include everyone (a unity), or nearly so. According to Reisman's Lonely Crowd, there is a triality of social nature, expounded by parsing people into tradition, inner, and other directed personalities. This theme was a scholar's response to the US trend toward consumerism and conformity to "norms", (local traditions, eg. "keeping up with the Joneses") mid-20th century. The social construct crowd would be Reisman's Other directed personality, which may truly be the majority, in USA certainly. However, the tradition-following and inner-directed personalities are a significant minority. Let's not ignore them (I'm in there.)
What is “Mob Mentality?”
Herd mentality | wkpd
Are All Personality Descriptions Social Constructions? Sep.2019 | psytdy
... that objective reality does not directly reveal itself to us, is true beyond a doubt.
The preceding statement author, JA Johnson, is way off (and his article is full of falseness). Objective reality IS direct experience, no more revealing modality exists. Denial of this obvious fact (just lied about above) is a redefinition of the term (a social construct). Experience is beyond language, thus beyond 'description'. However the following is a true reveal about (((Yews))) (the like of whom Dr. Johnson seems):
It is true that when we describe someone with socially undesirable traits... we are constructing for them a social reputation that might decrease their chance of success in life. This is precisely one of the concerns of (((social constructivists, like Dr. Johnson))), that certain categorizations (eg. a separate race) reduce power and status.
Proof that Truth is not a social construct (relative to culture, like morality absolutely is)... What do you believe in? Cultural Relativism
Conformity is a social construct (should be obvious, it's a social source of choices). What causes conformity? Social interactions, which traditionally occurred (Macro-version) in newspapers, magazines, cinema and radio programs. As culture changed the popular media to radio, TV and then to Internet, and church attendance fell out of vogue, the advertising industry became more powerful in defining social constructs. That's why Internet censorship is so important.
Who are the 'influencers' in society? (They used to be parents, teachers, peers... now it seems to be YouTubers, like PewDiePie. But an intentionally underplayed contingent of influencers is the predominantly Left-Leaning academia, who collectively promote Marxist preferences and political activism toward Socialist positions. Academia is pushing social construction because it provides an intellectual framework that denies the old (social injustice), and says ok to their preferred ideology, Cultural Marxism (new social "just us"; socially constructed ideas can be anything you want, their cogency depends on efficacy of publication).
Micro-Social Constructs are most cogent (due to conformity being human nature), discussed in part 2.
Bottom Line (part 1)
If you like freedom, and are serious about it, you must distance yourself from society, because it tries to reconstruct you according to the norm... conform!
Before you go, think about what is a hermit?, which should not be confused with Hermetic, name derived from Greek god Hermes. 7 Great Hermetic Principles – The Teachings of Thoth (illustrated)... same topic 2016
Investigation of (Dis-)Favor 2\3, Micro-Societies
Social Circles; Mates, Kin, Friends
note on Mates: school-, (prison) in-, marriage-, ship-, etc. note on my link choices, page rank has a strong influence
Social group (aka circle)
Is Conformity Human Nature? Don't blow this list off, if you want to understand social constructs. At least look at first item.
What is Social Proof?
Are Micro-societies any less 'constructing' than Macros? Or do some constructs exist for all realms, macro and micro? I think they are more constructing, because micros carry feedback, whereas macro is all absorption, individuals have negligible effects on society at large. They act in a statistical sense, with a few exceptions.
Concept vs Percept (concepts are stable mental recordings, and physical manifestations of them; percepts are changing sensations and reflexes which depend strongly on the situation, memories of which are variable too)
Favor, Good, and Beauty are words that belong in the same 'conceptual basket' (ward), they are alike, all refer to action 'like', as an affective (and affirmative) perception. Conversely for the word's opposites.
Perceptions are non-language reactions to stimuli, therefore not social constructs. They may be evoked into a social arena via language (or other virtual records), but these are only shadows of the perception, so what is evoked is drawn up from the receiver's own memories of perceptions.
Division of Labor (and role models) are Social Constructs
Sex is the most basic divider of labor, for all societies, especially the most primitive. As societies develop towards more technical, sex falls away from the divider, as natural talent and innate interest gain influence, until the basic operations of reproduction remain, the core division. What about rankings in the division?
natural tendency for dominance?
Are males naturally dominant in nature? | qra
(arguments opposing) Male Dominance (theory) with (bogus) "Explanations", by 2 feminist authors using Marxist ideology 2017 | verso While this blog seems to have obvious (to me) flaws, it does raise interesting ideas and references.
what attributes help males gain social status? Basic: status is competitive. It takes talent and effort to win.
To Raise Male Status (18 Rules) | @rctvmn (not because age 18 is best)
Dominance vs Prestige 2010 | psytdy Note: blatant bias toward Prestige via argument parsing Pride. (author is Jewish, maligns DJ Trump (nationalist), lauds John Lennon (globalist))
modes of thought: socially-controlled vs spontaneous
Major Component of Social-Construction: Public Education 3 Modes of Thought Jan.2019
Kaufman again: How Renaissance People Think 2011 | psytdy Note: We discussed concept vs percept, here Kaufman refers to fellow-Jew Seymour Epstein's dual modish rational vs experiential theory, same idea set.
polymath (short for Renaissance Man)
Favor-Goodness-Beauty paradigm
Favor is not favored in prior art, Truth takes Favor's place in the Transcendental Spectrum: Transcendentals 5pg.pdf
We have already seen the idea in part 1 that Truth is a disputed transcendental in the social-constructionism academic universe. Academics use the "universal fallacy" that their favored item is part of an incompatible pair, which by logic excludes everything not in their favor. They want to ignore the nuances in order to push an ideology toward a supremacy of thinking, just like in a totalitarian state.
Whereas the (myusername) principle of Truth, it has a dual nature, 1 relative to a society (democratic consensus); and 2 absolute to reality (math/science/technology). So 'Favor' is a better term because objective proof (no contest) is not required (except the meaning of objective that says 'objection!', meaning 'contest'). 'Favor' implies bias which is the subjective reaction that matches Goodness and Beauty better than 'Truth'.
Apply Truth-Goodness-Beauty paradigm to social construction
it is unconcerned with ontological issues...
because the aim of constructionists is to justify a collective "truth" of their own construction. A social construct is not absolute, it's anything a society wants it to be ("social proof"). That's a good description of tyranny... The Empowered Female Parasite 2014 (that's a surprising result, here is one not-surprising.)
Social Proof: established by culture media (mind control, a monopoly 2012 (scroll down long graphic), of the Juice 2015), go back to part 1, macrosocial constructs.
Does Appreciation of Beauty have any innate sources? (otherwise it's all a social construct) Neuroscience of Beauty; How does the brain appreciate art? 2011 | sciam (in brain)
Onward (Dis)-Favor Readers...
Investigation of (Dis-)Favor 3\3, House of Not-Friends
Contracting the Social Construct Disorder Take 2
Living outside the 'Normitory" (away from Dreamland (everybody's asleep), to where Nessun Dorma (nobody sleeps))
It so happens that an ethnic group which originated in eastern Mediterranean Middle-East evolved to specialize in intelligence, commerce, morally corrupt enterprises, and crime. Essential to their success was eugenic traditions that applied artificial selection to just those same specialties, which makes this ethnic group a formidable enemy. They have developed a very strong sense of in-groupness, and a vested interest in social construct studies. A unified collective is a more effective competitor than an inchoate population of diverse individuals.
This group has as ethnic traits: global dispersion (aka Diaspora), preference for urban environments (aka Cosmopolitan, or Globalist), covert inter-group rivalry (aka InfoWar), and deception (aka MOSSAD). This cosmopolitan group must operate covertly and deceptively, because those are effective tactics, and they are a small minority (2% of USA), therefore weak in the democratic sense.
Immoral Social Constructs enforced by 5th column subversives
wethefifth (political audio series)
serendipity: freethink
Another construct search, without gender reference
Is morality a social construct? If so, how can concepts such as 'good' exist? (note especially the links in top comment, to reddit posts)
"Good" can be understood as a variation of "Favor" as a direct experience (perception) of "like", rather than some idealized notion of an obvious social construct such as "greater good" (a theoretical derivation by interventionist actors-with-agendas trying to impose their own preferences upon others, IOW ideology hegemony pushers, for instance viz da wiz)
Cultural hegemony is the Chosen's mitzvah, that we all must go to Emerald City, land of Oz, where YHWH (impostor) rules.
Cultural hegemony
Concepts of Ideology, Hegemony, and Organic Intellectuals in Gramsci’s Marxism 1982
There is no universal morality. Morality is much like Beauty, in the mind of beholder (actor who holds to a specific moral code). Morality is a social construct, and varies between societies. (I think a fair definition of morality is a code of ethics which is community-specific.) For a society to sustain, it needs to be isolate from conflicting societies. If different societies, with different moralities must coexist, the natural tendency for actors in the same niche toward dominance will destroy or remake the subordinate societies, which reduces the conflicts.
Status Hierarchies: Do We Need Them? blog 2012 | psytd
a need for 'virtue signaling'? It's natural, and likely unavoidable, evidence pride displays.
Status Assignments: by birth (heredity) or merit (talent)?
Let's assume your morality values social effectiveness. The best path to that is to have talented persons dominant (meritocracy). Next we happen to know that talent is hereditary, but not perfectly so. Therefore birth (kinship, aka kingship) is only an indicator of talent, which is infrequent among low status groups, much higher among high status kinship groups. Thus we must conclude that awarding status by pedigree and family privilege is not the best way to effectiveness, but it often does work. What works best then, must be? a competitive system of merit-proving, with special attention to high-status families. (Helps if the natural tendency for snobbish repression is circumvented, for examples Han-style Civil Service Exams, and the Roman military promotion avenue, which occasionally led to top gun.)
Sustainable Competitive Advantages (aka moats): Network Effects 2019 | sEknα
Our Brain's Negative Bias 2003 | psytdA
Fear: it's the greatest (motivator) 2009 Owen Benjamin made a video about Fear over TIME 16 min.
Dominance Hierarchy employs FEAR to dominate
Dominance hierarchy | wkpd Social dominance theory | wkpd
scaring children is not ok, Sydney Watson blog 11 min
tools for social mobility and dominance (list)
9 Important Factors That Influence Social Mobility Social dominance orientation | wkpd SDO should theoretically be highly important to Jews, as their ethos tends strongly to emulate it among themselves and denigrate it towards outgroups (Goyim). Thus we should expect to see this field of study monopolized by Jewish scholars. Studying the Gentile: Fanciful Pseudoscience in the Service of Pathologizing the Covington Boys | OO
Contracting the Social Construct Disorder Take 3
Different day from Take 2. Re-consider interactions with a community or society: traditionally occurred locally, on Sunday meetings at church, parties, having a beer after work, town hall or children's group meetings, (eg. PTA, scouts) etc.
Re-consider "contracting". Original idea was meant to acquire, like a disease, not by design (choice), but determined by contingency (unlucky chance). Today, "contracting" means getting smaller, shrinking, like a cooling branding iron, or melting ice. Iron has several crystalline phases, the cooler, the more compact (more atomic order). Ice is contrary to most materials, as its crystalline structure is larger than its liquid phase, so as it melts (entropy always increases, going to less ordered) its atoms become more fluid. In both cases, the natural mode of change is toward ambient temperature. This trend (recursion to the mean) is maybe the most unbroken law of all physics.
Re-considering "Disorder"; original idea was meant as a mental disease, like ADHD (Attention Deficit Hyperactive Disorder), IOW anomalous condition, out-of-order, (order being assumed normal) in the human behavior dimension. Today it means individuals out-of-line, like discontinuities in a crystal. (Discontinuities are what make metal harder.)
When all the atoms of a metal are aligned (continuous), the state is called "annealed". This is the softest condition. When the metal has been "work hardened" by hammering, or forging, it acquires discontinuities (crystalline order becomes mucked up). This is a harder state. Hardness is measured by forcing a small ball into a test material and measuring the resulting depression (dent). Discontinuities resist dents and every other kind of deforming force (decreased plasticity (weakness) means increased elasticity and maximum yield (resilience, see Young's Modulus, Indentation hardness, Impact Toughness and Moh's Hardness)).
Now make analogy of metal with society. Non-conformist individuals (like followers of Marginotions) make society (if he-he-heeded) more resistant to outside forces (like George Soros, or seekers of Tikkun Olam) trying to make a dent in the established order (tradition, Protestant Ethic).
Contracting the Social Construct Disorder Take 4
Different day Re-consider "contracting" again. Today, it means make-a-deal, as in commercial contract. This kind of contract is in flux nowadays, as the advent of bitcoin has introduced a mathematical means of authorizing legal agreements (aka contracts) in a distributed ledger that makes such agreements social in a very direct sense. The social part of "social construct" is present in a world wide network of participating computer operators, while the construct part is present in a software package (app) that is now called "smart", meaning has built-in security and ongoing timely operations, like confirmation checking. In this contract-paradigm, the "disorder" part is due to it being outside of previous power-holding elites who are chagrined by the prospect of losing some of their powers to the Internetwork, which is out of their control. IOW disorder for elites, and made-to-order for independents. (note on that quote)
Social Contract per britannica (briefly) per wkpd
explicit vs implicit contracts Differences Between Implicit & Explicit Agreements (law) 2017 more specific, social contracts Social Contract Theory UT (includes videos, glossary)
to be continued: fairness is a social construct (contrast with deterministic fate)
study notes (all 3 parts, this series)
Gentrification, Displacement and the Role of Public Investment: A Literature Review 2015 pdf
why is 'social construct' a popular theme?
Pareto principle implications for marital harmony, a very brief summary of research by J Cacioppo)
submitted by acloudrift to AlternativeHypothesis [link] [comments]

Bitcoin hack Bitcoin mining software BITCOIN IS FALLING!!!! THE BREAKOUT CAME TODAY! $8,500 ... $7000 ASIC Miner Mined $1000 Dollars in Bitcoin in a Month ... By Far The BEST Bitcoin Mining Software In 2020 ... Beginner's guide to solo bitcoin and litecoin mining ...

Pages in category "Miners" The following 23 pages are in this category, out of 23 total. An OpenCL miner is a bitcoin miner that uses the OpenCL framework to perform the hashing computations. When used with a modern GPU, this can produce hash rates orders of magnitude higher than what can be achieved with a CPU. The mining pool has the lowest share reject rate (0.15%) we've ever seen. Other pools have over 0.30% rejected shares. Furthermore, the pool has a super responsive and reliable support team. Read our guide on acquiring and buy bitcoin instead as well as a list of the best bitcoin exchanges. 1. Choose your miner. ... See the Bitcoin Wiki for a list of ... hardware comparison webpage ... Introduction. Mining is the process of adding transaction records to Bitcoin's public ledger of past transactions (and a "mining rig" is a colloquial metaphor for a single computer system that performs the necessary computations for "mining".This ledger of past transactions is called the block chain as it is a chain of blocks.The blockchain serves to confirm transactions to the rest of the ...

[index] [26954] [19607] [9374] [32891] [3777] [12214] [20866] [4289] [17552] [25794]

Bitcoin hack Bitcoin mining software

Now that you have Bitcoin mining hardware, your next step is to join a Bitcoin mining pool. While mining pools are desirable to the average miner as they smo... Bybit $60 Bonus: Bybit Tutorial: Bitcoin Technical Analysis & Bitc... #bitcoin #bitcoinmining #bitcoinminingsoftware By Far The BEST Bitcoin Mining Software In 2020 (Profitable). This is a review on the most profitable, easy, a... What is a mining pool and why is it best to mine Bitcoin and other cryptocurrencies on mining pools? Here is our review and explanation of mining pools, how ... What are the TOP 5 coins to mine for best profitability in 2019 with ASIC miners?! Today we will review Bitcoin, Ethereum, Dash, Litecoin, Zcash, and Grin mi...