Avoid scams – don’t use bitcoin ATM when someone asked you

Report on Filecoin And PoC Projects

Report on Filecoin And PoC Projects
Author: Gamals Ahmed, CoinEx Business Ambassador
ABSTRACT
A Blockchain is a continuously growing record, called blocks, which are linked and secured using cryptography such as hashing. Each block contains a hash pointer as a link to the previous block, a timestamp and transaction data. Filecoin is a decentralized storage network that turns cloud storage into an algorithmic market. The market runs on a blockchain with a native protocol token (also called Filecoin), which miners earn by providing storage to clients. The first section of report is demonstrate the filecoin which is a decentralized storage system used to encrypt files that we need to share it through blockchain platform. The second section is explain briefly blockchain Proof of Concept (POC) which is a process of locate whether a Blockchain project idea can be feasible in a real-world situation, need of proof of concept and blockchain proof of concept stages.
1.Introduction
Filecoin is a protocol token whose blockchain runs on a novel proof, called Proof-of-Space time, where blocks are created by miners that are storing data. Filecoin protocol provides a data storage and retrieval service via a network of independent storage providers that does not rely on a single coordinator, where: (1) clients pay to store and retrieve data, (2) Storage Miners earn tokens by offering storage (3) Retrieval Miners earn tokens by serving data.
Filecoin is a decentralized storage network that turns cloud storage into an algorithmic market. The market runs on a blockchain with a native protocol token (also called Filecoin”), which miners earn by providing storage to clients. Conversely, clients spend Filecoin hiring miners to store or distribute data. As with Bitcoin, Filecoin miners compete to mine blocks with sizable rewards[1].
Filecoin mining power is proportional to active storage, which directly provides a useful service to clients (unlike Bitcoin mining, whose usefulness is limited to maintaining blockchain consensus). This creates a powerful incentive for miners to amass as much storage as they can, and rent it out to clients. The protocol weaves these amassed resources into a self-healing storage network that anybody in the world can rely on. The network achieves robustness by replicating and dispersing content, while automatically detecting and repairing replica failures. Clients can select replication parameters to protect against different threat models. The protocol’s cloud storage network also provides security, as content is encrypted end-to-end at the client, while storage providers do not have access to decryption keys. Filecoin works as an incentive layer on top of IPFS [1], which can provide storage infrastructure for any data. It is especially useful for decentralizing data, building and running distributed applications, and implementing smart contracts [2].
Filecoin[2] based on IPFS[3] proposes a completely decentralized distributed storage network where customers and storage miners request services and submit orders to the storage and retrieval markets. And the miner provides a service to view matching quotes to initiate a transaction. The protocol guarantees the integrity of data storage by copying proofs and space-time certificates. The Filecoin protocol writes the order book, token transactions, and integrity challenge response records to the blockchain.
1.1 Blockchain
Blockchain is a characteristic data structure formed by combining data blocks in a chain order inchronological order[4], and cryptographically guarantees decentralized, non-tamperable, unforgeable distributed shared ledger system.
Figure 1 Blockchain Structure
1.2 Elementary Components in Filecoin
The Filecoin protocol builds upon four novel components :
  1. Decentralized Storage Network (DSN): We provide an abstraction for network of independent storage providers to offer storage and retrieval services.
  2. Novel Proofs-of-Storage: We present two novel Proofs-of-Storage,(1) Proof-of Replication allows storage providers to prove that data has been replicated to its own uniquely dedicated physical storage. Enforcing unique physical copies enables a verifier to check that a prover is not deduplicating multiple copies of the data into the same storage space, (2) Proof-of-Space time allows storage providers to prove they have stored some data throughout a specified amount of time.
  3. Verifiable Markets: We model storage requests and retrieval requests as orders in two decentralized verifiable markets operated by the Filecoin network. Verifiable markets ensure that payments are performed when a service has been correctly provided. We present the Storage Market and the Retrieval Market where miners and clients can respectively submit storage and retrieval orders.
  4. Useful Proof-of-Work: We show how to construct a useful Proof-of-Work based on Proof-of Space time that can be used in consensus protocols. Miners do not need to spend wasteful computation to mine blocks, but instead must store data in the network[2] [4].
1.3 Filecoin: Lifecycle of a File
In this section we mentioned the lifecycle for file in Filecoin, as follow:
  1. Put: Clients send information about the file, storage duration, and a small amount of Filecoin to the Storage Market as a bid. Simultaneously, Miners submit asks, competing to offer low cost storage. Deals are made in the Storage Market, on the blockchain.
  2. Send: The Client then sends the file to the Miner, and the Miner adds the file to a sector. The sectors are cryptographically sealed, with verification sent to the blockchain.
  3. Manage: Miners continuously prove they are storing all sectors they agreed to store. The client’s payment is released in installments. Additional currency is minted over time and awarded to Miners as a block reward, proportional to the storage they provide.
  4. Request: A Client requests a file with some payment in Filecoin to the Retrieval Market (off chain); the first Miner to send the file is paid. Eventually, the contract expires and the storage is once again free[5].
Figure 2 Filecoin Lifecycle of a File
1.4 Filecoin is Built with IPFS
The Interplanetary File System (IPFS) is a next-generation protocol to make the Web faster, safer, decentralized, and permanent. Since the initial IPFS release in January 2015, it has gained strong traction in a variety of industries and organizations. Today, IPFS is a foundational technology for many applications in the blockchain industry. Over 5 billion files have been added to IPFS, spanning scientific data and papers, genetic research, video distribution & streaming, 3D modeling, legal documents, entire blockchains and their transactions, video games, and more. IPFS and Filecoin are complementary protocols, and the adoption of the underlying IPFS protocol is a leading indicator of market demand for a faster, safer, decentralized storage service [6].
Some IPFS Users
Figure(3) IPFS users
1.5 IPFS Open Source Community
The IPFS Project is a large community of open source contributors driven to decentralize the web. The community is made up of thousands of developers and users who have been working together for several years, building valuable and widely used software tools. The same seasoned core developers of IPFS are also leading the design and development of Filecoin. The IPFS team has experience building ambitious sotware projects and coordinating thriving developer communities. A significant portion of the IPFS community plans to join the Filecoin network, building tools and applications on this new, exciting platform [ 7].
2. PoC PROJECTS:
2.1 What is PoC?
PoC is abbreviate of Project of Concept which is a process of determining whether a Block-chain project idea can be feasible in a real-world situation. This process is necessary to verify that the idea will function as envisioned. The best part about proof of concept blockchain meaning is that it will help you to get a clear idea of what you are doing before you even get started. Furthermore, the proof of concept in the blockchain niche isn’t for exploring the marketplace for ideas only. Moreover, you won’t determine the best way to start the production process. Instead, you’ll only work on your possible blockchain solution option and see whether it’s capable of being a reality or not. Developing a blockchain proof of concept would require an investment of time, money and resources. In reality, you’d need to get your hands on supporting technologies or even the physical components needed to get the perfect plan. Going through the process is necessary for enterprises to see whether their idea is visible before using all production level equipment for it. According to a recent Gartner survey, 66% of CIOs think that blockchain is here to disrupt the existing marketplaces. And many will spend more than $10 million on the experimentation of the technology. So, if you were confused with what is proof of concept blockchain, now you know just what it is [8]. PoC is used to demonstrate the feasibility and practical potential of any blockchain project in any field such as Energy, Communication, Services, Insurance and Healthcare. A PoC can either be a prototype without any supporting code or any MVP (Minimum Viable Product) with bare feature set. A PoC is a prototype that is used for internal organization who can have a better understanding of a particular project.
2.3 Why Companies Need a Proof of Concept?
Usually, the blockchain proof of concept is awfully popular among the startups in the market. However, proof of concept in blockchain can also be a great tool for the Enterprises as well. Mainly there are three points for needing it.
  • Test out the blockchain project before going for mass production.
  • Identify possible pain points that can make the project not useful.
  • Save an enormous amount of time and money.
Although anyone who comes up with a blockchain project idea will think that it will work, however, proof of concept in blockchain will test out your idea to ensure that you get the best version out of it, which will save up a lot of time and money in the process. Another major reason for you to use proof of concept for blockchain is to ensure that all the stakeholders love your idea and would be interested in investing in it. Whether you are just adding up a new type of feature in the existing blockchain solution or developing it from scratch blockchain proof of concept would let you take the fastest route possible. This relatively gives a different edge in the proof of concept blockchain meaning [9].
2.4 Proof of Concept Phases
Its explain as follows:
Figure (4) explains the steps of blockchain PoC
Step-1: Finding the Proper Blockchain Application Sectors That Adds Value
Let’s start with the first step of the theoretical build-up stage. Many of you don’t really know which application sectors are great for blockchain Proof of concept [10]. That’s why we are outlining some major application sector where you can use your solution. These are:
1.Finance
Let’s start with the financing sector. This sector is relatively popular among the blockchain community. Furthermore, there are many projects already that cover this sector and offer a lucrative solution for major issues. So, in that sense, this sector is quite competitive in case of blockchain PoC development. 2. Medical
The medical sector is another major blockchain application sector at present. There are count-less scenarios where blockchain can truly shine. Hospitals have to deal with a lot of falsifying reports and counterfeit drugs.
3. Asset Management
Maintaining asset in these times are relatively hard due to all the bad players in the market. Simple paper-based record keeping isn’t enough now. Moreover, due to political and other reasons, ownership management is at risk of becoming a corrupted sector.
4. Government
Many governmental institutions are falling behind in the race of digitization. Moreover, every citizen needs a better infrastructure which will give them the security they need. In reality, the government sector is unable to reserve the citizen rights properly.
5. Identity
Identity management is a big hassle when it comes to enterprises. Furthermore, many often impersonate other people’s identity and commit serious crimes. Even in trade financer, many companies have to deal with fake companies and fake documents.
6. IoT
Internet of things is a wonderful sector for proof of concept in blockchain development. Furthermore, this sector is responsible for linking all your smart applications together. Moreover, the device to device connection in a secured platform is necessary.
7. Payments
The payments sector is another awesome application point for your enterprise-grade solution. The blockchain system is more than capable of handling payments, and many of it also offer micro payments. Furthermore, it takes a really small amount of time to send money compared to the traditional banking system. Not to mention the reduction of fees in overseas payment.
8. Supply Chain
Big enterprise needs to have their eyes and ears in every step of the supply chain process. Furthermore, any minor errors could end up in a million dollars of loss. Obviously, you would not want that. Tracking where the raw materials are coming from and whether your products are truly authentic or not is one of the major pain points.
9. Insurance
The insurance industry is facing some serious problems regarding insurance claims and document authentication. Also, the enormous amount of paperwork that every single employee has to fill out is overly dreadful. Detecting fraud, managing all the documents in a secure environment is tough. So, if you introduce a blockchain framework that can solve all these issues would be a huge factor. However, the competition in this marketplace is a bit high; still, with proper blockchain proof of concept, it should be a great opportunity.
Step-2: Defining the Product
In the second stage of the theoretical build-up, you would need to think your blockchain Proof of concept just like any other product. Furthermore, you need to have a solid plan along with full support from all stakeholders. PoC Feature Requirements Define all the features that your enterprise blockchain solution needs. After deciding your blockchain application, you would probably have some idea on what features to add up.
Step-3: Investigating the Technology
After you’ve come up with the solid idea of what features to include and how to focus the road map, you would need to hand them off to the engineering team. Therefore, your team will then research the technology based on your requirements and come up with the best plat-form to develop it on.
  • Advice to make a successful Proof of Concept As we knew, a proof of concept is a project, and like any project it must be clearly defined. That means breaking down the process into these four steps in order to can manage it better.
  • Focus on a Specific Business Issue If you want to make the blockchain PoC framework a success, then you have to start with focusing your real-life problems. At the beginning of the theoretical build-up stage when you are looking for a popular sector of deployment, look for a specific issue. Furthermore, any problem that your idea can fix would be a big plus from the consumers’ end. Many blockchain proof of concept only focuses on the capabilities of the technology only. However, they just don’t resolve any new issues or even old issues.
  • Take Small Steps, Avoid Scope Creeps Another major thing that the enterprises face is the scope creeps. While choosing what features you might need for the blockchain proof of concept many go for too much from the start. However, making a flashier entrance in the market won’t mean 100% success. Further-more, get the ones that you can truly deliver, not the ones you aren’t capable of.
  • Connect All Ideas and Control Them You won’t be the only one coming up with all the ideas. As you already know you’d need to get yourself a good team that will back you up and helps you come up with a compact solution. However, not every single member of your team would agree with the same idea. Furthermore, they have different ideas and vision regarding the blockchain development too.
  • Construct a Thorough Plan Another hurdle in the way of proper proof of concept blockchain is the misinterpretation of the blockchain implementation challenges. Obviously, blockchain implementation isn’t an easy task. At the first stage, it might have many flaws that would end up in possible failure scenarios.
  • Test A Million Times After getting the design done, you’d need to go into the testing phase. However, the problem is many seem to enroll the MVP before properly testing it, which end up in failure. So, test out the MVP a lot of time before making it accessible to the end-users.
  • Collaborate With Other Parties Collaborating with other enterprises could help to take down the overall costing of the block-chain proof of concept. Furthermore, if you are a small to medium level enterprise than collaborating with other parties could help out with the production costing. It will solely depend on the feature or the type of blockchain PoC framework you want to work on.
  • The Right Amount of Staff The right amount of stuff is always necessary to pull off a blockchain proof of concept project. Furthermore, you would need to recruit staffs that have blockchain skills or have an intellectual concept of the technology. Get the necessary amount of stuff with blockchain skill set to perfect the Blockchain Proof of Concept..
3. Conclusion
This report explain a distributed storage scheme based on blockchain technology( Filecoin), and introduces the system design in detail in first part , we have studied about blockchain technology related for Filecoin(decentralized storage network), Filecoin, a highly-anticipated decentralized storage network (under development), announced that there will be more delays before its Mainnet can be officially launched. Created by Protocol Labs, Filecoin has been developed using the InterPlanetary File System (IPFS), an established peer to peer data storage network. The Filecoin software will allow users to trade storage space in an open and decentralized market place.In the second part we mentioned a proof of concept (PoC), The Blockchain Proof of Concept is a demonstration to verify that certain concepts or theories have the potential for real-world application. PoC represents the evidence demonstrating that a project or product is feasible and worthy enough to justify the expenses needed to support and develop it.
REFERENCES
[1] Juan Benet. IPFS — Content Addressed, Versioned, P2P File System. 2014.
[2] Protocol Labs. Filecoin: A Decentralized Storage Network. https://filecoin.io/ filecoin.pdf, 2017.
[3] Benet J. IPFS-content addressed, versioned, P2P file system[J]. arXiv preprint arXiv:1407.3561, 2014.
[4] Liu AD, Du XH, Wang N, Li SZ. Research Progress of Blockchain Technology and its Application in Information Security. Ruan Jian Xue Bao/Journal of Software,2018,6,14:1–24.
[5] Protocol Labs, Inc,[email protected] , Filecoin Primer July 25, 2017.
[6] Protocol Labs, Inc,[email protected] , Filecoin Primer July 25, 2017.
[7] Retrieved from IPFS internal monitoring July 6, 2017.
[8] https://www.projectmanager.com/blog/proof-of-concept-definition.
[9] https://www.blockchainappfactory.com/poc-blockchain-application
[10] https://101blockchains.com/blockchain-proof-of-concept/#prettyPhoto
submitted by CoinEx_Institution to Coinex [link] [comments]

Anyone still under the illusion of Microsoft having been transformed into a kinder, more mutually beneficial partner, please read this patent.

WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Before reading the following excerpts, keep this sequence of events in mind:
Master Slave (and we're not referring to HDDs here)
Step one: patent technology
Step two: sell slave IoT devices to consumers who readily purchase them especially after being promised that they'll be rewarded in cryotocurrency for their data.
Step three: collect data via Azure on unsuspecting human subjects' fMRI, EEG, body temperatures, EKG, sleep data, digitized health care information, consumer purchasing habits, reading and viewing preferences, social media activity and correlate with activities performed (tasks).
Step four: Use data to refine AI to profile human behavior, predict behavior and refine mind reading capabilities.
This article is actually incorporated in the patent!
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
Step five: Institute centralized global cryptocurrency financial system with no other alternatives in which to transact legally.
https://www.reddit.com/Bitcoin/comments/4nag4b/1988_economist_cover_predicting_a_world_currency/
https://www.economist.com/finance-and-economics/1998/09/24/one-world-one-money
Step six: To understand step six, Read George Orwell's "1984" or review the concept of an individual's freedoms being based not on the concept of natural rights but on their social credit scores.
Thank you Microsoft, Google, Apple, Amazon, Facebook.
Now the patent excerpts:
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy. [0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems. For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process. [0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
decentralized cryptocurrency networks or databases.
[0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150. [0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks. [0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions). An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity). The material (http://news.berkely.edu/20l l/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Applicants * MICROSOFT TECHNOLOGY LICENSING, LLC[US/US]; One Microsoft Way Redmond, Washington 98052-6399, US
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy.
[0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems. For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process.
[0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
decentralized cryptocurrency networks or databases. [0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150.
[0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks.
[0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions).
An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity). The material (http://news.berkely.edu/20l l/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
submitted by snowboardnirvana to MVIS [link] [comments]

Reminder: Jews have real life time machines and want me to think that particle accelerators are time machines

Helloooooooo, it's me Satan/the devil again. Thought I would post another reminder about the jews having real life time machines which they have been showing off to me using their "media" (mostly).
Here's the documentary again, which I found on amazon primevideo after already coming to the conclusion that particle accelerators might actually be time machines.
https://www.imdb.com/title/tt0867212/
If particle accelerators are actually time machines, my mother may have actually received a tour of the large hadron collider, because she has been to both France and Switzerland during the same trip and my brother even lives in one of ze countries now. The official reason for her visit was to attend a "patent" conferance. 🤷‍♂️
Dialogue from the Ark Society level of Hitman 2 which mentions "patents" - https://streamable.com/chxs6p
"You see they are sitting on some patents that will knock your socks off."
"Weather control systems."
"Recycling pollution as fuel."
"Cold fusion. You name it."
Satan is naming their time machines too. 🤣
Anyway, she visited one of zose countries again (to visit my brother) and that too without telling me. I told her not to go because of the expensive plane tickets (she has been pretending to be "poor" all these years. well, not THAT poor. "middle class" poor. 🤣). I certainly considered the plane tickets expensive. It cost more than 1 lakh rupees (1,00,000) for a two way trip (which I considered to be a lot at that time). So if I would have gone too, it would have been more than 2 lakh rupees ( rupees are also jewish apparently ). Money that could have been spent on other things (jews have been emailing Satan recently with suggestions like "spend money on experiences, not things". 🤣). Of course, now I think money and the financial system is fake and designed exclusively for Satan but only YOU will know whether that is the case or not. 🤷‍♂️
Oh, and because she was planning on going without telling me, she even agreed to give me some "mummy money" (20,000 rupees) to buy some "pyramid scheme money" (bitcoin) which I then used to buy an antminer s1. Pretty neat pyramid scheme, huh? Has cool miners and everything. 🤣
Anyway because they have time machines, jews not only know what I am "sinking about" right now, but they also know what I will be "sinking about" in the future. 🤣 Check my previous posts and reminders about their mass surveillance tech if you don't know what I am talking about (once again assuming/pretending that everyone in the world doesn't already know who I am and already know about the existence of time machines and other advanced tech). 🤷‍♂️

Moar Satanic Rambling

I mentioned amazon above. They recently VERY actively participated in the "Q psyop" by showing the following riddle to Satan/me in a "riddle quiz" (or whatever you want to call it) that they had in the "fun zone" section of their app. Here's the riddle as I remember it.
"I usually follow Q. But not in QATAR. I come twice in queue. What letter am I?"
I bet they were hoping that I would correctly answer it, but I unintentionally answered it incorrectly as "E". Otherwise it was supposed to be "U". You know, "QU". "Q you". Calling me Q. Q from LGBTQ. 😐
Anyway, I didn't even look at the list of answers properly and had very quickly decided that the answer was "E" because in my mind I imagined the letters going from left to right (in a queue 🤣) and the answer would have been "E" in that case. The letter "E" would have been following "Q". By the way, there is no "E" in any of my real life names but there is one in "JEW". 🤣 Maybe that's why a jewess was pretending to be a bot and other jews were referring to her as EBOT in the Q research 8chan board (mentioned in one of my old posts). They were spelling "ABOT" as "EBOT". 🤣🤷‍♂️
I am also guessing that "QATAR" in the above riddle is supposed to mean something since it was in all caps. "Q a rat" maybe (country names are fake apparently, as I mentioned in my previous post)? Like the rat from the movie Ratatouille? 🤣 Even my mother was once mispronouncing Qatar as "Quatar", and I corrected her saying it's QAtar and not QUatar. But yes, once again, "QU" or "QUA" (Q you, A). 😐 Like I mentioned in my previous post, I now believe she is also a "psyop" participant and she continues to actively participate in the psyop.
Just recently she threw away a pack of masala powder just to make me angry. I had already started cooking when I realized that the pack was missing. At first I thought she may have just hidden it, so I searched everywhere but when I couldn't find it I realized she had mostly likely thrown it away. I am not talking to her at all right now (for obvious reasons 😐) but did manage to indicate that I was angry because of the missing masala powder (not that she didn't already know. it was part of the "plan". trust the plan. 🤣) and she eventually admitted that she had thrown it away, apparently because the pack was "completely open". There were long expired packs of various masala powders lying around (still are) that were actually "completely open" that she didn't bother to throw out but she threw away a brand new pack that I had bought. 🤷‍♂️
Should also mention that everytime I brought up the "psyop", her dialogue was something like, "Internet people are tricksing you-internet people are tricksing you". 🤣🤷‍♂️ "Internet people" are "tricksing" me apparently. 🤣 Well, I am translating but she was using the word "tricks". 🤷‍♂️
I believe I have also figured out what one of my real life names actually means. One is supposed to be calling me an "objectophile" (like "QU". "Objectophile U".) and the other one (the one in my birth certificate, ID cards, etc.) is supposed to mean something like "You are a fool/simpleton, devil". Any jew here willing to confirm? 🤣
Anyway, as jews already know, I think it's okay to be a fool/simpletion but not okay to be evil. Who goes to hell? A fool/simpleton or someone who is evil? <- "Q" style questions. 🤣
As I mentioned in my previous posts, I believe ALL jews are evil. Especially if all of them indeed know who I am and have been watching me all these years. 😐 Someone was even posting on 8chan saying something like, "we are not evil. promise...". Watch a compilation of everything you have done to Satan all these years if in doubt about the fact that you are evil. I am assuming you have recordings. Or did the jewesses who run the jew world delete them from the face of the Earth and are now claiming that some of the things that I have been "sinking" about never happened?
Other than that they have continued to do shit like male genital mutilation and abortions despite having time machines and knowing in advance that Satan will be anti-male genital mutilation and anti-abortion. Assuming that abortion is real of course. I haven't seen it with my own eyes after all (just like my mother says that she DOES NOT believe that god exists just because she hasn't seen god with her own eyes. heard the same thing from others. 🤣). I even remember someone posting pro-abortion shit in the 8chan Q research board. Something along the lines of "if you want to buy a gun, do it. your choice, pro-choice...". How about "if you want to do the apocalypse, do it. your choice pro-choice", hmmm? Besides, jewesses who have had abortions could have "chosen" to not have sex. If abortions are real, I am guessing there are many jewesses out there who have had abortions by the time they were 30.
Satan is 30 years old in his current human form and is a virgin. 🤣 Even the "Virgin" brand is referring to Satan. Yes? Also figured out recently that the "Coca Cola" brand is referring to Satan also. Bought an "(allocacoc)[https://www.allocacoc.com] powercube" and found the name odd initially but realized that it was Coca Cola spelled backwards with an extra "L" and knew it was supposed to mean something. Later saw one of those "coke and mentos" videos on youtube again and finally realized what it is supposed to mean. "Coca Cola" is supposed to be "A Cola Coc". "Cola" is supposed to be "কলা". It's supposed to be referring to Satan's dick. That's why there were those "muh dick-muh dick-muh dick" posts on the 8chan Q research board. Yes? 😐
Anyway, if the "Coca Cola" brand was indeed established in the year stated in wikipedia then it would seem that the jews have had time machines for the past 100 years at least.
I have also realized that "muh dick" is also partially mutilated and my mother lied to me about that also. Claimed to have taken me to the nurse because she noticed "pus" was coming out of my dick and the nurse did some "cutting". Said that there would have been "कष्ट" after marriage otherwise. Had no idea at the time what she was talking about, but perhaps she meant that a lesbian jewess might have found my unmutilated dick "ugly"? 🤣 Watch that "Nip/Tuck" episode#Episodes) and that "South Park" episode defending male genital mutilation if you have no idea what I am talking about.
What if jews force their senior citizen parents to get a face lift, nose job, liposuction, or whatever without anaesthesia? And say shit like "we are only doing it to make you look beautiful so that you don't have any "कष्ट" if you decide to get married/remarried or so that you are invited to more lemon parties"? 🤣 They can use their mind control tech to wipe the memory of the surgery afterwards if necessary (or use roofies if they are real 🤣). Can even invite people to witness the surgery and they can say "mazel tov", "oy vey", or whatever it is they say after a "bris".
Now, I don't know if "brises" are real because I haven't seen one with my own eyes. I have however seen a "fully mutilated" dick when I was a kid (3rd grade). It was in the school (a different school, not the one I mentioned in my previous post) bathroom which was just a "shed" with a drain in it (was the female bathroom also just a shed with a drain in it? There was even a South Park episode about school bathrooms but in their case the bathroom wasn't just a "shed" now, was it? 🤣). Anyway, I assumed that I had seen a catheter "wrapped" around his dick as I had heard about catheters by then but did not know what they looked like or how they worked. I asked the kid why his dick looked different assuming that he would confirm my theory that he was peeing using a catheter. But he replied saying that it's because he is "muslim". It was an odd explanation I thought, and even asked my mother that day and she didn't bother to explain it either.
Even after that incident I didn't know about "male genital mutilation" for years. But eventually "real time" told me. But even then I didn't know that even my dick was partially mutilated but "real time" has now told me about that too. 🤷‍♂️
Well, jews were also posting a "render" (I think) of an unmutilated dick on 8chan and someone on voat replied to a comment of mine saying something like "No one actually knows what an unmutilated dick looks like" which I only recently saw. Could have just said something like, "Your dick is mutilated too, Satan" but whatever. 🤷‍♂️

Video games

Already mentioned a video game above, but will be mentioning moar video games here under this heading. As I mentioned in my previous post, they are also using their time machines when making video games. I also mentioneded that I could be living in a simulation for all I know and you could all be NPCs. Later I remembered a video game that I didn't play just because the story/plot had "simulation" in it. I then checked out the plot again on wikipedia and noticed that it mentions "time travel" also. 🤣
https://en.wikipedia.org/wiki/Saints_Row_IV
The game's loyalty missions impact the ending of the story: if a number of these are not completed, the Boss makes plans for the Saints to take over more planets and expand their new empire; however, if all are completed, the Saints learn that they can restore Earth using time-travel, discovering that Zinyak captured several historical figures and placed them in suspended animation. The Boss soon discovers one of them to be 19th century writer Jane Austen, whom they are a fan of, and who reveals herself as the narrator of the game's story once she is awaken her from stasis.
There's also the following DLC where Satan is mentioned. 🤣
https://en.wikipedia.org/wiki/Saints_Row:_Gat_out_of_Hell
I have both the game and the DLC in my Steam library but have never played them. I bought them during a sale or something. They were being sold as a bundle (Humble Bundle maybe) but I was only interested in Saints Row The Third.
I should also mention The Witcher 3: Wild Hunt. The game has some cannibal witches who eat kids (they ate grown ups too; they didn't discriminate. 🤣). And the witches were shown to possess "mass surveillance" capabilities, but they were using magic. They would nail human ears to trees or something. Satan chose to free that tree spirit the first time he played that mission but later noticed the tree spirit did not get rid of those "ladies" for some reason. Plot hole?
Anyway, I read right here on /conspiracy that jews apparently eat aborted babies. It was the "Robert David Steele AMA" I believe.
Were you jews hoping to tell me that you don't really eat aborted babies and I only believed it because I am gullible? There was even a South Park episode recently where there was the dialogue "well, we don't eat them...", but they were talking about cows. Were they actually talking about aborted babies? There was also the dialogue "...nobody wants to do it...". Nobody wants to do abortions but do them anyway because jewesses auto-magically get pregnant (like Satan used to think when he was a kid)? Also, there is a dialogue in a "Penny Dreadful") episode where a witch who does abortions and is called a "cut-wife" says something like "this village needs its cut-wife...". Why did the village need a "cut-wife"? Because the jewesses living there were auto-magically getting pregnant even though they didn't have sex? 🤔
Unforuntately for the jewesses who run the jew world (who are no doubt like those "ladies" of the wood), there are also stories like (Hansel and Gretel)[https://en.wikipedia.org/wiki/Hansel_and_Gretel]. Even my own mother used to try and scare me when I was a kid saying things like "juju buris (বুড়ি) kidnap kids in burlap sacks..." or something. 🤷‍♂️

TV Shows

Already mentioned TV Shows above, but will mention more here.
I recently remembered the cartoon "Pinky and the Brain" and realized they are also supposed to be depicting Satan. Check out the opening theme and the lyrics - https://www.youtube.com/watch?v=qzZmU0aGmcc
They even show Saturn crashing into Earth during the part where they sing "by the dawning of the sun, they will take over the world". 🤣 There's also "to prove their mousey worth, they will overthrow the earth...". 🤣 Satan is dinky apparently. 🤷‍♂️
At the end of the opening theme there is even the name of an openly-jew jew mentioned ("Steven Spielberg"). If you are a "poor" jew who doesn't know about the existence of time machines and other advanced tech that "rich" jews have, maybe you can ask him what he knows.🤷‍♂️
Also mentioned in my previous posts that I am also supposed to be Jesus and there is this scene from an episode of The Simpsons - https://streamable.com/oumsad
The scene was actually censored when airing on a local TV channel and I even mentioned it to a desi jewess who was "sent" to chat with me. Looking at "muh chatlogs" is how I remembered that scene. 🤣
The jewess was trying to pretend to be psychic or something. She was even telling me about my future which I had totally forgotten about. I did remember that she asked me if I believe in "astral projection". I said no, so she dropped the subject. Otherwise I am guessing she would have claimed to be able to see me using "astral projection" and not because all jews are watching me like Truman from The Truman Show.
I also remember another jewess who was "sent" to chat with me and she was asking me if I had read Harry Potter and knew what a "prophecy" was. When I said yes and used "भविष्यवाणी " to define "prophecy" she dropped the subject. 🤣 She was claiming to be studying to be a psycho-logist and was repeatedly asking me "How do you feel-How do you feel". 🤣 I had no idea what she meant at the time, but now I know (thanks to "real time") that it's just something that psycho-logists say. 🤣 No doubt that was the first thing she learnt at "psycho-logy school". 🤣 Satan is a psycho apparently. 🤣🤷‍♂️
Oh yes, I was talking about The Simpsons. I remember seeing posts right here on /conspiracy speculating whether The Simpsons creators know about the existence of real life time machines because many episodes seem to depict future events. Well, no need to speculate any longer, they do have real life time machines. But it's not just The Simpsons creators. It's all jews. Be it Hollywood, Bollywood, Tollywood, etc. Maybe you can even ask them during comic-con or something if you are a "poor" jew and do not know about the existence of real life time machines.
I now also believe that the boat painting in The Simpsons living room is based on something that Satan painted not long after the shit stick incident. After the shit stick incident that I mentioned in my previous post, my mother agreed to reconnect our TV cable connection on the condition that I attend a religious summer school. That's where I painted a ship which was supposed to be like the ships from Assassins Creed Black Flag. It was supposed to be an art "class" but there was only one and they were like "paint whatever you want to paint". Were they expecting Satan to paint something Satanic? 🤣 I remember the kid next to me was painting an alien. Large sheet of paper but he was painting a small alien in the middle of it leaving the rest of the sheet blank. 🤷‍♂️
Anyway, in case of The Simpsons, the painting is that of "a boat" (wink-wink-nudge-nudge?) but it's very similar to the ship painting that I painted. If you really do not know about the existence of time machines and other advanced tech maybe you can even ask the creators of The Simpsons (in the next comic con or something). You can say something like "a conspiracy nut on /conspiracy claiming to be Satan was also claiming that you have real life time machines and the boat painting is based on something he painted at a religious summer school after a shit stick incident and that you got rid of the Apu character because he wanted The Simpsons cancelled because he got the impression that you were being anti-Trump and pro-Hillary...". 🤣🤷‍♂️
Anyway, there was even a kid at the above mentioned summer school who was pronouncing "cheat codes" incorrectly. He was pronouncing "cheat" as "kheat". Was he acting like the actors from Truman Show and reading his lines from an "eyephone" teleprompter? Or was it intentional? 🤷‍♂️ By the way, the downstairs neighbours' kids were also there in that summer school and they would have at least heard the shit stick incident. Yes? I believe they also knew about the "psyop" and could have told Satan but didn't. How are you jews trained to participate in the "psyop" anyway? Are you sen't to special "psyop schools"? 🤣🤷‍♂️
In one of my previous posts that was deleted by a mod, a jew had commented asking me whether I was a little girl because I had used so many "emojis", so let me mention the cartoon "The Grimm Adventures of Billy and Mandy" also. All three of the main characters are also supposed to be depicting Satan, including Mandy. Check out her devil horns like hairstyle. 🤣
There is also this song from the show. https://www.youtube.com/watch?v=yui4zkZQwCA
It has the lyrics "if at first they think it's strange, they wont think twice once I've eaten their brains".
Jews thought that if Satan thinks all the evil shit they do is "strange", Satan wont think twice after they manage to figuratively eat his brain? They were also posting this image on 8chan. Yes, Satan has been "fucked by psyops" because physical wounds heal apparently. Not that jews haven't caused physical wounds also but they always end up healing. 🤣

Movies

Scene from the movie "My Favorite Martian" referring to Satan's zipper incident - https://streamable.com/n3e30i
Was four or five years old when it happened. The zipper of the shorts that I was wearing, got stuck on my partially mutilated foreskin. I was crying in pain even though there was no bleeding. Jews most likely have a recording of this incident also (if they haven't deleted). Later the same nurse who most likely mutilated my dick was telling me to wear underpants as if I could conjure them out of thin air.
I didn't wear underpants back then and didn't even for years after that incident. Now I wear "square" underpants, which is why there is "Spongebob Squarepants" (I am also supposed to be Patrick). 🤣
Anyway, jews know about the zipper incident too but are continuing to perform male genital mutilations anyway. Yes? Perhaps they are like, "another benefit of having a fully mutilated dick is that you don't have to worry about zipper issues". 🤣🤷‍♂️

Music

Jews are using their time machines even in the music they produce.
My motorcycle that I mentioned in my previous post was seized by the cops (I used to think that the local cops are useless but now I think that they are just fake) using "Coronavirus" as an excuse. And when recently looking at the details of the "Foghat" album "The Best of Foghat", I noticed the song with the title "Third Time Lucky (First Time I Was A Fool)". I have been to the cops twice to get back my seized motorcycle. First time I went was on April 1 (april fools day). I was planning on not going a third time and just let the fake cops keep my motorcycle. After all, they are jews, the motorcycle was made by jews and even the money I used to buy the motorcycle was "jew money". And I noticed that there is also the song with the title "Take It Or Leave It". 🤣 Oh, and now I see that there is also one with the title "Easy Money". 🤣
The name "Foghat" itself is most likely referring to how Satan's helmet gets foggy sometimes. Yes? 🤔🤷‍♂️
Anyway, wasn't able to pass much time with the bike anyway. It was only making me spend fake jew money on fake expensive fuel. Not to mention the trips to the service center. It needs servicing every three months apparently. So, I am thinking I will leave it with the fake cops. What do you jews think? Is it a good plan? Trust the plan? 🤔
Oh yes, the second time when I went to the cops, they gave me a phone number and asked me to call it (I didn't) and also gave me a fake name when I asked for one. Which I now think is supposed to mean "You are Satan, pal", kinda like that South Park episode about mormonism ("moronism"; Satan is a moron apparently; Amaron) where Cartman was like "My name is Yura, Yura Fag". 🤣 If yes, then here is a message for the fake cop who gave Satan the fake name, "Satan is not your pal, gal". 🤣
Yes, the second time the fake male cops were gone and there were only two jewesses. The male cops are in "isolation" apparently. 🤣 I was wondering if I should have shown them that clip from The Simpsons where Chief Wiggum says something like, "look at my badge. cash bribes only..." because most of them are fat or chubby. And because I used to think that all the local cops were good for was scaring and threatening people and asking for bribes. 🤣 The second time there was only one male cop (a gatekeeper or something, who got brave and was rude to Satan) and this time they made sure that it was not a fat one. 🤣 Anyway, I can make fun of the fake fat cops (many of whom have "pregnant" bellies. men and women are equal so men are also able to get pregnant. those cops were actually pregnant. yes? 🤣) just by "sinking" about it. How cool is that? 🤣
I also remember that South Park episode now where they were calling bikers "fags"). Original air date is 2009 whereas Satan bought his bike in 2019. So yes, you can ask them about the existence of real life time machines and other advanced tech also. 🤷‍♂️
Recently Satan has been passing the time "code monkeying". That's why the 8chan administrator is called "code monkey", yes? I have been playing with "CodeIgniter" and there is "psyopy" content even in the "CodeIgniter" documentation.
use CodeIgniter\Controller;
class Helloworld extends Controller { public function index() { echo 'Hello World!'; }
public function comment() { echo 'I am not flat!'; } }
Yeah, the world is not flat apparently but since I haven't seen it with my own eyes I probably should not believe that it's round. Yes? 🤣🤷‍♂️
Well it doesn't really matter if the world is round or "flat". What matters is that if everyone in the world knows me then unfortunately for you, you are all evil. And it's actually more unfortunate for you if you are not NPCs. You know what I am sayin'?
By the way, is Satan's "Mann ki Baat" being broadcast to everyone in the world uncensored or should he write down more of his "mann ki baat"? 🤔 Like how he has been "sinking" to Ubisoft whether the "apocalypse" comes under "everything is permitted". Feel free to comment here with your reply Ubisoft.
Mind-wiped Satan now thinks total apocalypse (get it? total apocalypse. kinda like total eclipse but apocalypse instead of eclipse) is necessary and since he is addicted to TV shows, movies, video games and the internet apparently (all jew media), it would be the unselfish thing to do (assuming it's up to him to do the apocalypse). Yes?
Satan has been trying to be "sober" though. No TV shows, movies or video games for the past two months. Did not renew his 100mbps internet connection either. Let's see how long the lockdown can continue. 🤣🤷‍♂️
It's Saturday and Satan managed to spend hours writing the above post. 🤣
submitted by rcspy to conspiracy [link] [comments]

Microsoft patents scheme to usher in technocratic fascism via data from IoT sensor devices and centralized cryptocurrency system

WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Before reading the following excerpts, keep this sequence of events in mind:
Master Slave (and we're not referring to HDDs here)
Step one: patent technology
Step two: sell slave IoT devices to consumers who readily purchase them especially after being promised that they'll be rewarded in cryotocurrency for their data.
Step three: collect data via Microsoft Azure on unsuspecting human subjects' fMRI, EEG, body temperatures, EKG, sleep data, digitized health care information, consumer purchasing habits, reading and viewing preferences, social media activity and correlate with activities performed (tasks).
Step four: Use data to refine AI to profile human behavior, predict behavior and refine mind reading capabilities.
This article is actually incorporated in the patent!
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
Step five: Institute centralized global cryptocurrency financial system with no other alternatives in which to transact legally.
https://www.reddit.com/Bitcoin/comments/4nag4b/1988_economist_cover_predicting_a_world_currency/
https://www.economist.com/finance-and-economics/1998/09/24/one-world-one-money
Step six: To understand step six, read George Orwell's "1984" or review the concept of an individual's freedoms being based not on the concept of natural rights but on their social credit scores.
Thank you Microsoft, Google, Apple, Amazon, Facebook.
Now the patent excerpts:
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy.
[0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems.
For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process.
[0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. decentralized cryptocurrency networks or databases.
[0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150.
[0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks. [0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions). An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity).
The material (http://news.berkely.edu/20ll/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
submitted by snowboardnirvana to conspiracy [link] [comments]

Why I choose Bitcoin Cash over Bitcoin

A few days ago I posted my doubts and criticism about BTC vs BCH, but now I have made my mind up after a lenghty research yesterday and today, I have chosen BCH.
Disclaimer: I have already owned BCH before that.
So I was already on board BCH, but I had my doubts about it, and certainly the noise the other side makes, it made me doubt myself whether I made the best choice or not. After all it's about money, and the first thing that comes into a person's mind is that it worries about losing it. So if BCH would have been inferior to BTC then there would have been a strong chance of losing that money, through the price doing down like with the other fake coins Bitcoin Gold, Bitcoin Diamond, etc...
Because from an investment standpoint I shouldn't care about sides, I just want the one that has a better future and more potential in it. So if I would have found out that BTC is better I would have sold my BCH for BTC obviously, I would have no sentimental attachment to either of them, I just want to be on the right side. Eventually hedge, but hedging is like the game of uncertain people, and there is no uncertainty here, all the evidence shows one side to be much better than the other. It's not even like 70-30, it's more like 99-1.
Now I did a lenghty research, read all the comments on my posts, and compared them to the claim BTC makes on their websites and influential BTC people have stated, asked questions, used logic, and it's now objectively clear to me that BCH is the right side to be on.
   

FEES

I was already doubtful about BTC, that is why I have switched to BCH about a year ago, I saw their shady activities, but the final nail in the coffin was probably the massive FEE problem, that started last November and ended in February. That made me totally dislike BTC.
However now that the fees are normal in BTC, I had a doubt in my mind that what if they are right? What if the fee spike was just a coordinated attack on BTC, and now that it's over, BTC is just as good as BCH.
I mean if the fees are normal now, and about the same last I looked (maybe BTC is like 20% more expensive but still low like 60 cents), it gives some credibility back to BTC.
There are theories that the coordinated attack was a conspiracy against BTC, but then again BTC has it's own conspiracies too, so why not just ignore the conspiracy theories and look at the facts.
The fact is that it doesn't matter what it was, the mere fact that it happened, and it crippled the network for 4 months, shows that BTC has serious flaws. And it can happen again. So it doesn't matter who did it, it happened, and the network was crippled.
Now if a network can be crippled like that, and if you want this network to host a global payment system, then we will have huge problems.
BCH can defend against such attack much more effectively because it costs more to fill up a 32MB block than a 1MB block, 32x harder. Plus a 32MB block is so small that anyone can handle that right now, even if a 4 month period attack would happen against BCH, and it would be 32x more costly, so it would be harder to pull off.
However if a bigger budgeted attacker would attack again BTC with a 32x budget, then it would cripple BTC for 10 YEARS!!! That would literally make Bitcoin literally die.
   

Non Mining Nodes

One aspect that the BTC people say is that non miner "full nodes" are sacrosanct, and that we need them to keep miners in check, but I haven't heard any coherent answers as to why.
I have read the whitepaper twice, once today and once yesterday, and it states there clearly what the real truth is. You should definitely download and archive the whitepaper because some people tried to rewrite it, Orwellian style, so grab the original one here:
https://blockchair.com/bitcoin/whitepaper
[Download it and save it on your own computer SHA256: b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553, these Orwellian trolls might try to gaslight you eventually and rewrite the past!]
The whitepaper mentions 3 times that:
The system is secure as long as honest nodes collectively control more CPU power than any cooperating group of attacker nodes.
Subsequently:
The proof-of-work also solves the problem of determining representation in majority decision making. If the majority were based on one-IP-address-one-vote, it could be subverted by anyone able to allocate many IPs. Proof-of-work is essentially one-CPU-one-vote. The majority decision is represented by the longest chain, which has the greatest proof-of-work effort invested in it. If a majority of CPU power is controlled by honest nodes, the honest chain will grow the fastest and outpace any competing chains.
This is word for word how the whitepaper says it. So this alone disproves the full node myth, it's complete nonsense. The miners have total control, and the nodes don't matter. Satoshi designed a 1 CPU 1 vote system, where every node is a miner node. He could not forecast large farm ASIC miners, but then again that isn't resolved by just running non miner nodes.
Furthermore the full node system doesn't have any collective benefit only individual one, which we will get into next, and it might even be a drag:
Instead of going from A->D, you have to go to A->B->C->D with a full node system, adding extra inefficiency and latency. Keep in mind, this is not a medieval pidgeon relay messaging system, the information travels at the speed of light, so there is no need for extra relays, in fact adding extra relays just creates extra latency.
You eventually have to communicate with a miner, so what is the point in having extra "bus stops" along the way? It's just a waste of resources.
We do need many miners to secure the network, and instead of wasting resources on non-mining nodes, they should just spend that on mining if they really want decentralization.
   

SPV Wallets

Another claim that they make is that SPV wallets are insecure. Which is somewhat true, but out of perspective. For general users SPV wallets are totally fine. And I don't think SPV security is lower than what anyone except a billionaire who keeps all his coins in 1 address (very stupid) would need.
This explained well in the whitepaper in the page 5/ paragraph 8 "Simplified Payment Verification" section. The SPV is probabilistically secure, because it fetches blocks that are already agreed upon, so unless a big conspiracy is taking place, miners rewriting the chain, this gives people a probabilistic security.
Most SPV wallets are well implemented so they use the best tools to keep your coin history reasonably accurate, so they fetch data from multiple random servers and compare against it. Certainly Electrum/Electron Cash does this well.
One thing I might add is that it's good to use a VPN too with SPV wallets, in case your are personally targeted by a criminal, so your IP address is randomized too for extra security, so you won't download honeypot blocks that are specifically targeting your IP.
But other than that SPV is just reasonably secure, and by that I mean that it's probably below 0.1% that your coin history can be deceitful, and even then if you wait for 10-15 confirmations and shuffle your VPN IP address around enough times, you can be absolutely sure that the history is accurate.
So their fear is overblown and they are just fearmongering on this, the same way people fearmonger about asteroid impact or alien invasion, it's just not reasonable.
   

Lightning Network

Now as you can see already that a lot of these claims have been utterly debunked, and they don't have coherent arguments to address the rebuttals, in fact in most cases they resort to ad hominems and insults (which I have experienced, just for asking questions). But the coup de grace happens when you realize how inefficient LN is. And for that here are some references, it's mostly technical:
And perhaps it's explained in more simpler terms in youtube videos but the point is that there is real scientific proof that the LN will have awful consequences for the decentralization of BTC, and it inserts and unnecessary middleman into the mix that is a massive point of failure.
It essentially creates a KYC regulated bank network on top of a settlement layer, and the governments around the world will have total control over that. Well the LN nodes are essentially money transmitters because they directly facilitate the transfer of money, so AML/KYC/Tax reporting/Surveillance will happen by default on these nodes. And given that LN can't be a decentralized system but a hub & spoke system, due to the need to keep your wallet online at all times, it will literally become a 3rd party custodian based banking system, literally.
So all of the essence of Bitcoin [word for word quote from the whitepaper]:
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution.
Will literally cease to exist, and it reverts BTC back into a government regulated banking system, literally.
   
   
There are other arguments too, but these are the main ones, and researching them thoroughly and understanding the issues made me lose all my doubts about Bitcoin Cash and all my faith in Bitcoin.
It can't be any more clear to me now that Bitcoin Cash is the true version of Bitcoin, the real vision of Satoshi and the genuine implementation of it, with all the technical genius-ity that Satoshi had laid out in the whitepaper which is still relevant.
Satoshi laid out everything in the whitepaper, and all of it is implemented geniusly in Bitcoin Cash except for paragraph 7 on page 4 "Reclaiming Disk Space" which talks about block pruning, I am not sure if this is Xthin Blocks or Compact Blocks or Thin Blocks (please explain in the comment section), otherwise it should be implemented, it would be a much better way for scaling than LN.
But other than that BCH is technically superior. Now I don't know whether better things win in politics, but in engineering, if your design is shitty, it will inevitably fall apart. You can't have a skyscraper built on quicksand, it's inevitable disaster.
So look, BCH is obviously risky, it has less users, less merchants; but because it has a solid foundation and probably the 3rd biggest community after ethereum, it has maaaaaaaaaaaaassive opportunity in it to become the best cryptocurrency (because ethereum has the same or worse issues than BTC).
There is no question now whether BCH is better, the only question now is, how long will it take for people to realize this.
 
So I choose to stay with BCH, and now I am 101% supportive of it! Long Live Bitcoin Cash!!
submitted by alexander7k to btc [link] [comments]

Investigation of (Dis-)Favor 1\3 questioning freedom of will (in Macro-society)

This item began as a simple idea to investigate "social construct" theory, a trendy theme in academia and identity politics. It turned into a staggeringly complex constellation of ideas, with surprises galore.
The idea occurs to me: validate (or not) 'social construction' of beauty. If not, then sense of beauty is innate (source is not one's society, but genetic or other episocial influences).
Natural Tendency towards Beauty in Humans: Evidence from Binocular Rivalry 2016 | plos (technical study)
Reading in Contemporary Aesthetics "Why Beauty Still Cannot Be Measured", by Ossi Naukkarinen, because beauty is a personal determination, and a metaphor of favor, but how is it determined? Example: which of these women looks beautiful to you? note: only descriptor for the AI search is "beautiful woman", AI learns about beauty by sifting mega-data; how effective is it? (achieves given goal?) AI results are socially constructed in the most explicit way possible! Beauty may not be measurable, but it can be selected (parsed) from non-beauty. Measurement is a comparison of some phenomenon to an abstract dimension. Selection is a go, no-go choice.
What is Nudge theory? This item straddles the fence between Macro and Micro societies, paradigmatic Nudges come from Macro sources, but include an option to choose without pressure to conform. Micro sources are always more direct; which side of the fence are you on, friend?. (Greener side, of course.)
What about searching for "good", images? note how often the WORD good is pictured. Good is a language construct that must be interpreted from the individual's perspective.
Ok, now search for "favor" images note that AI mostly interprets favor as a small gift, not as a preference (which is difficult to represent by image)
Well then, search for "preference", images note that the word preference happens to be used by a line of hair care products from L'Oreal, which dominates the returns... commerce rules!
social construct (def, search result)
validate (or not) 'social construction' of beauty
Is Socialism a social construct? (LoL) Socialism Defined (EVERY Country is Socialist!) 2.2k views Sep 29, 2019 Rokn'MrE
To (social) Construct, or Not to (social) Construct, is there a choice? (note most results are about gender)
Parsing gender
Discussion of gender is not my direction of choice in this part 1 investigation. I want to seek how an actor (esp. me) makes a choice, in a quest for freedom of will. Perhaps come back to gender in a future item.
person makes a choice, in a quest for freedom of will (selections available)
Exemplar Hyp (Harry) Frankfurt’s compatibilist theory of free will 2009 5pg.pdf
I notice my choice of article was partly determined, partly free, but parsing out those factors would be too much divergence from the goal here. But Truth (a two side coin) is my story, and I'm stickin' to it.
(previous link, compatibilism):
3 It explains our intuition that human beings, but not lower animals, have free will. Lower animals lack free will because they lack the second-order volitions which are constitutive of free will. (This item is unnecessary and probably not true; how do we know animals have no "second-order volitions"? Having no other language than "body", we can only surmise (guess) what their volitions are. Volitions come before actions, we cannot see them or interpret them in any way. Brain conditions might be interpreted with MRI scanning, but to put a subject in a scanning device is to prevent any other actions. Such measuring ruins the connection between mental state and volition being measured, except we can safely assume that every measurement of animals must default to the volition to escape the measuring device.)
That's the first-order, highlighted deviation from compatibility theory. Clarification of "second-order volition": a path from choice to action has an intermediate "middle-way" tunneling mode, contracting (taking on) a desire to make a choice, prior to making the choice. In order to prove freedom, one must establish the mental preference for an imagined outcome in order to prove that preference did come from within the person and was not forced by other external deciding factors (genetic factors are pre-determined).
incompatibilism Note: the approach is wrong by the universal assumption, IOW that the intersection of determined and free is zero. It's a supremacy position, or superposition principle (LoL), the error is in over-simplification. The Logic Argument (p.5) is not representative of reality, which is more nuanced. Therefore, Frankfurt's thesis is good (denial of incompatibilism), but not due to the case presented (superposition).
Take Frankfurt's case (p.4) of Black vs Jones4 to be analogy for State vs Individual. Silent Weapons for Quiet Wars (other sources exist, search for yourself)
The (myusername) determinism/free-will duality hypothesis (denial of incompatibilism due to non-zero intersection):
Most choices, including the choice of desires, are determined by contingencies of which one is the natural desire of the actor to optimize his/her outcomes ("best wishes"). Is a person always compelled to have best wishes? What is best depends on a person's mental state, which is usually determined by external factors, but those can vary in cogency (impact on behavior). Consider the choice to commit suicide, certainly not a trivial choice. (The Chosen means of execution (puns intended) is somewhat more trivial, but again, partly determined by external conditions.)
Some choices, nearly all trivial, are free because no interfering contingencies are apparent during the choosing interlude. It may happen in hindsight, that a past choice is observed to be a mistake, usually because some contingency was overlooked or unknown during the choosing. This observation should be remembered so as to avoid repeating a future choice like that mistake. Choices always have risks, including the choice to do nothing.
Different day, slightly different approach... parsing choice. 1 important choices that have many deep effects later, for instances a marriage partner, a new job, a new residence; 2 trivial choices which have minor effects, risks or physical involvement, for instances a choice of toothpaste at the market, to like or not a web-link or museum exhibit.
According to (myusername)'s determined/free paradigm, type 1 choices are nearly all determined by pre-existing conditions (not free). Type 2 choice is the arena of freedom. I suppose a person's low risk-aversion parameter could expand the envelope of freedom, but that's a characteristic that develops during maturation, one's history of choices and ensuing responses. Successful responses lead to more freedom, failures to less. So even when freedom exists, it accumulates a history (habits) which become a determinant.
Contracting the Social Construct Disorder (it's contagious) Take 1:
How does an actor (person in question who comes to an internal state, or inner-construct) interact with a community or society? Must it be IRL, or can virtual interaction suffice to construct internal states? And more to my point, must the interaction be two-way (containing feedback), or simply via broadcast medium? (broadcast includes published books, articles, records, radio, TV or Internet A/V shows, etc.)
Interaction with broadcast media can be summarized by: a choice, a degree of attention and focus (time spent on and attention given to item), a like/dislike or more complex reaction to item, having future behavior influenced by item, to continue a stream of behaviors (especially sequential item choices) as consequence of influence of item, to develop a complex of attitudes built upon stream of items (eg. just mentioned 'risk aversion parameter and habit).
Before going on, I notice that broadcast media is like Sunshine, Rain, and Grace. It is made available by participation in a community, and falls without curse or blessing, it's all there for the choosing (or ignoring), depending on the contingencies.
Mind control theory? (because mind is the inner source of volition... behavior, control the mind (easy), hence control the behaviors (difficult otherwise))
Mind control courtesy Tavistock Inst.
Construction of Favor (or any knowledge) upon Familiarity
What is Social Construction? (cntrlZ)
"For instance, trees are only differentiated from other plants by virtue of the fact that we have all learned to see them as "trees."
But we don't all know about trees to an equal degree. I know rather much about trees from my interaction with them: living among them, planting them, sawing them, moving them, burning them, etc., not from reading or talking about them. No doubt, there are many persons all over the world who have very little experience of trees, and cannot 'construct' treeness as well as me. Direct experience is more realistic and developed than social constructs.
Favor and Familiarity are interwoven by choice
I chose to live alone with trees and not alone with sea, or desert (for examples), because it was easier to go with trees. Was the choice free? I could have chosen city or suburb with even more ease than forest, so ease of choice was not the deciding factor, it was my preference of lonely forest over crowded urb that decided me. So maybe it wasn't really about trees, it was about independence or something else like that. When we choose, we may not understand the contingencies, but our decision (choice) may be due to habits or patterns that have developed in the maturity process. Habits are strong determinants, and they develop, according to Ian Plowman, 4 ways.
The cntrlZ article makes the case for 'Strong Social Construction' based on that 'knowing' which is all about language, certainly a social construct.
Within the social construction of language is the game. Outside the social construction is reality, the real world. (a list of social constructs follows)
That makes it clear. Experiences (direct ones) without resort to language are NOT social constructs. That observation makes another distinction clear: gender may be a social construct, as it's a language issue, but sex is not a social construct, it is a direct experience issue that develops in the maturation process: birth, infant, child, puberty, sexy adolescent, sexy adult, old (unsexy) adult, death. Prior to puberty, sex is incipient in its development, but comes to life, (like a flower blooms) after a decade or so. Knowing about sex as a child is by observation from outside (thru the looking glass), after puberty, it's direct experience, and much later, it's a fading memory.
Regarding Looking-glass self theory the notion of socially constructed identity (defining the self by differences/ affinities to others),
... the outcome of "taking the role of the other", the premise for which the self is actualized. Through interaction with others, we begin to develop an identity of our own as well as developing a capacity to empathize with others... Therefore, the concept of self-identity may be considered an example of a social construction.
... makes a spurious expansion of identity formation to include everyone (a unity), or nearly so. According to Reisman's Lonely Crowd, there is a triality of social nature, expounded by parsing people into tradition, inner, and other directed personalities. This theme was a scholar's response to the US trend toward consumerism and conformity to "norms", (local traditions, eg. "keeping up with the Joneses") mid-20th century. The social construct crowd would be Reisman's Other directed personality, which may truly be the majority, in USA certainly. However, the tradition-following and inner-directed personalities are a significant minority. Let's not ignore them (I'm in there.)
What is “Mob Mentality?”
Herd mentality | wkpd
Are All Personality Descriptions Social Constructions? Sep.2019 | psytdy
... that objective reality does not directly reveal itself to us, is true beyond a doubt.
The preceding statement author, JA Johnson, is way off (and his article is full of falseness). Objective reality IS direct experience, no more revealing modality exists. Denial of this obvious fact (just lied about above) is a redefinition of the term (a social construct). Experience is beyond language, thus beyond 'description'. However the following is a true reveal about (((Yews))) (the like of whom Dr. Johnson seems):
It is true that when we describe someone with socially undesirable traits... we are constructing for them a social reputation that might decrease their chance of success in life. This is precisely one of the concerns of (((social constructivists, like Dr. Johnson))), that certain categorizations (eg. a separate race) reduce power and status.
Proof that Truth is not a social construct (relative to culture, like morality absolutely is)... What do you believe in? Cultural Relativism
Conformity is a social construct (should be obvious, it's a social source of choices). What causes conformity? Social interactions, which traditionally occurred (Macro-version) in newspapers, magazines, cinema and radio programs. As culture changed the popular media to radio, TV and then to Internet, and church attendance fell out of vogue, the advertising industry became more powerful in defining social constructs. That's why Internet censorship is so important.
Who are the 'influencers' in society? (They used to be parents, teachers, peers... now it seems to be YouTubers, like PewDiePie. But an intentionally underplayed contingent of influencers is the predominantly Left-Leaning academia, who collectively promote Marxist preferences and political activism toward Socialist positions. Academia is pushing social construction because it provides an intellectual framework that denies the old (social injustice), and says ok to their preferred ideology, Cultural Marxism (new social "just us"; socially constructed ideas can be anything you want, their cogency depends on efficacy of publication).
Micro-Social Constructs are most cogent (due to conformity being human nature), discussed in part 2.
Bottom Line (part 1)
If you like freedom, and are serious about it, you must distance yourself from society, because it tries to reconstruct you according to the norm... conform!
Before you go, think about what is a hermit?, which should not be confused with Hermetic, name derived from Greek god Hermes. 7 Great Hermetic Principles – The Teachings of Thoth (illustrated)... same topic 2016
Investigation of (Dis-)Favor 2\3, Micro-Societies
Social Circles; Mates, Kin, Friends
note on Mates: school-, (prison) in-, marriage-, ship-, etc. note on my link choices, page rank has a strong influence
Social group (aka circle)
Is Conformity Human Nature? Don't blow this list off, if you want to understand social constructs. At least look at first item.
What is Social Proof?
Are Micro-societies any less 'constructing' than Macros? Or do some constructs exist for all realms, macro and micro? I think they are more constructing, because micros carry feedback, whereas macro is all absorption, individuals have negligible effects on society at large. They act in a statistical sense, with a few exceptions.
Concept vs Percept (concepts are stable mental recordings, and physical manifestations of them; percepts are changing sensations and reflexes which depend strongly on the situation, memories of which are variable too)
Favor, Good, and Beauty are words that belong in the same 'conceptual basket' (ward), they are alike, all refer to action 'like', as an affective (and affirmative) perception. Conversely for the word's opposites.
Perceptions are non-language reactions to stimuli, therefore not social constructs. They may be evoked into a social arena via language (or other virtual records), but these are only shadows of the perception, so what is evoked is drawn up from the receiver's own memories of perceptions.
Division of Labor (and role models) are Social Constructs
Sex is the most basic divider of labor, for all societies, especially the most primitive. As societies develop towards more technical, sex falls away from the divider, as natural talent and innate interest gain influence, until the basic operations of reproduction remain, the core division. What about rankings in the division?
natural tendency for dominance?
Are males naturally dominant in nature? | qra
(arguments opposing) Male Dominance (theory) with (bogus) "Explanations", by 2 feminist authors using Marxist ideology 2017 | verso While this blog seems to have obvious (to me) flaws, it does raise interesting ideas and references.
what attributes help males gain social status? Basic: status is competitive. It takes talent and effort to win.
To Raise Male Status (18 Rules) | @rctvmn (not because age 18 is best)
Dominance vs Prestige 2010 | psytdy Note: blatant bias toward Prestige via argument parsing Pride. (author is Jewish, maligns DJ Trump (nationalist), lauds John Lennon (globalist))
modes of thought: socially-controlled vs spontaneous
Major Component of Social-Construction: Public Education 3 Modes of Thought Jan.2019
Kaufman again: How Renaissance People Think 2011 | psytdy Note: We discussed concept vs percept, here Kaufman refers to fellow-Jew Seymour Epstein's dual modish rational vs experiential theory, same idea set.
polymath (short for Renaissance Man)
Favor-Goodness-Beauty paradigm
Favor is not favored in prior art, Truth takes Favor's place in the Transcendental Spectrum: Transcendentals 5pg.pdf
We have already seen the idea in part 1 that Truth is a disputed transcendental in the social-constructionism academic universe. Academics use the "universal fallacy" that their favored item is part of an incompatible pair, which by logic excludes everything not in their favor. They want to ignore the nuances in order to push an ideology toward a supremacy of thinking, just like in a totalitarian state.
Whereas the (myusername) principle of Truth, it has a dual nature, 1 relative to a society (democratic consensus); and 2 absolute to reality (math/science/technology). So 'Favor' is a better term because objective proof (no contest) is not required (except the meaning of objective that says 'objection!', meaning 'contest'). 'Favor' implies bias which is the subjective reaction that matches Goodness and Beauty better than 'Truth'.
Apply Truth-Goodness-Beauty paradigm to social construction
it is unconcerned with ontological issues...
because the aim of constructionists is to justify a collective "truth" of their own construction. A social construct is not absolute, it's anything a society wants it to be ("social proof"). That's a good description of tyranny... The Empowered Female Parasite 2014 (that's a surprising result, here is one not-surprising.)
Social Proof: established by culture media (mind control, a monopoly 2012 (scroll down long graphic), of the Juice 2015), go back to part 1, macrosocial constructs.
Does Appreciation of Beauty have any innate sources? (otherwise it's all a social construct) Neuroscience of Beauty; How does the brain appreciate art? 2011 | sciam (in brain)
Onward (Dis)-Favor Readers...
Investigation of (Dis-)Favor 3\3, House of Not-Friends
Contracting the Social Construct Disorder Take 2
Living outside the 'Normitory" (away from Dreamland (everybody's asleep), to where Nessun Dorma (nobody sleeps))
It so happens that an ethnic group which originated in eastern Mediterranean Middle-East evolved to specialize in intelligence, commerce, morally corrupt enterprises, and crime. Essential to their success was eugenic traditions that applied artificial selection to just those same specialties, which makes this ethnic group a formidable enemy. They have developed a very strong sense of in-groupness, and a vested interest in social construct studies. A unified collective is a more effective competitor than an inchoate population of diverse individuals.
This group has as ethnic traits: global dispersion (aka Diaspora), preference for urban environments (aka Cosmopolitan, or Globalist), covert inter-group rivalry (aka InfoWar), and deception (aka MOSSAD). This cosmopolitan group must operate covertly and deceptively, because those are effective tactics, and they are a small minority (2% of USA), therefore weak in the democratic sense.
Immoral Social Constructs enforced by 5th column subversives
wethefifth (political audio series)
serendipity: freethink
Another construct search, without gender reference
Is morality a social construct? If so, how can concepts such as 'good' exist? (note especially the links in top comment, to reddit posts)
"Good" can be understood as a variation of "Favor" as a direct experience (perception) of "like", rather than some idealized notion of an obvious social construct such as "greater good" (a theoretical derivation by interventionist actors-with-agendas trying to impose their own preferences upon others, IOW ideology hegemony pushers, for instance viz da wiz)
Cultural hegemony is the Chosen's mitzvah, that we all must go to Emerald City, land of Oz, where YHWH (impostor) rules.
Cultural hegemony
Concepts of Ideology, Hegemony, and Organic Intellectuals in Gramsci’s Marxism 1982
There is no universal morality. Morality is much like Beauty, in the mind of beholder (actor who holds to a specific moral code). Morality is a social construct, and varies between societies. (I think a fair definition of morality is a code of ethics which is community-specific.) For a society to sustain, it needs to be isolate from conflicting societies. If different societies, with different moralities must coexist, the natural tendency for actors in the same niche toward dominance will destroy or remake the subordinate societies, which reduces the conflicts.
Status Hierarchies: Do We Need Them? blog 2012 | psytd
a need for 'virtue signaling'? It's natural, and likely unavoidable, evidence pride displays.
Status Assignments: by birth (heredity) or merit (talent)?
Let's assume your morality values social effectiveness. The best path to that is to have talented persons dominant (meritocracy). Next we happen to know that talent is hereditary, but not perfectly so. Therefore birth (kinship, aka kingship) is only an indicator of talent, which is infrequent among low status groups, much higher among high status kinship groups. Thus we must conclude that awarding status by pedigree and family privilege is not the best way to effectiveness, but it often does work. What works best then, must be? a competitive system of merit-proving, with special attention to high-status families. (Helps if the natural tendency for snobbish repression is circumvented, for examples Han-style Civil Service Exams, and the Roman military promotion avenue, which occasionally led to top gun.)
Sustainable Competitive Advantages (aka moats): Network Effects 2019 | sEknα
Our Brain's Negative Bias 2003 | psytdA
Fear: it's the greatest (motivator) 2009 Owen Benjamin made a video about Fear over TIME 16 min.
Dominance Hierarchy employs FEAR to dominate
Dominance hierarchy | wkpd Social dominance theory | wkpd
scaring children is not ok, Sydney Watson blog 11 min
tools for social mobility and dominance (list)
9 Important Factors That Influence Social Mobility Social dominance orientation | wkpd SDO should theoretically be highly important to Jews, as their ethos tends strongly to emulate it among themselves and denigrate it towards outgroups (Goyim). Thus we should expect to see this field of study monopolized by Jewish scholars. Studying the Gentile: Fanciful Pseudoscience in the Service of Pathologizing the Covington Boys | OO
Contracting the Social Construct Disorder Take 3
Different day from Take 2. Re-consider interactions with a community or society: traditionally occurred locally, on Sunday meetings at church, parties, having a beer after work, town hall or children's group meetings, (eg. PTA, scouts) etc.
Re-consider "contracting". Original idea was meant to acquire, like a disease, not by design (choice), but determined by contingency (unlucky chance). Today, "contracting" means getting smaller, shrinking, like a cooling branding iron, or melting ice. Iron has several crystalline phases, the cooler, the more compact (more atomic order). Ice is contrary to most materials, as its crystalline structure is larger than its liquid phase, so as it melts (entropy always increases, going to less ordered) its atoms become more fluid. In both cases, the natural mode of change is toward ambient temperature. This trend (recursion to the mean) is maybe the most unbroken law of all physics.
Re-considering "Disorder"; original idea was meant as a mental disease, like ADHD (Attention Deficit Hyperactive Disorder), IOW anomalous condition, out-of-order, (order being assumed normal) in the human behavior dimension. Today it means individuals out-of-line, like discontinuities in a crystal. (Discontinuities are what make metal harder.)
When all the atoms of a metal are aligned (continuous), the state is called "annealed". This is the softest condition. When the metal has been "work hardened" by hammering, or forging, it acquires discontinuities (crystalline order becomes mucked up). This is a harder state. Hardness is measured by forcing a small ball into a test material and measuring the resulting depression (dent). Discontinuities resist dents and every other kind of deforming force (decreased plasticity (weakness) means increased elasticity and maximum yield (resilience, see Young's Modulus, Indentation hardness, Impact Toughness and Moh's Hardness)).
Now make analogy of metal with society. Non-conformist individuals (like followers of Marginotions) make society (if he-he-heeded) more resistant to outside forces (like George Soros, or seekers of Tikkun Olam) trying to make a dent in the established order (tradition, Protestant Ethic).
Contracting the Social Construct Disorder Take 4
Different day Re-consider "contracting" again. Today, it means make-a-deal, as in commercial contract. This kind of contract is in flux nowadays, as the advent of bitcoin has introduced a mathematical means of authorizing legal agreements (aka contracts) in a distributed ledger that makes such agreements social in a very direct sense. The social part of "social construct" is present in a world wide network of participating computer operators, while the construct part is present in a software package (app) that is now called "smart", meaning has built-in security and ongoing timely operations, like confirmation checking. In this contract-paradigm, the "disorder" part is due to it being outside of previous power-holding elites who are chagrined by the prospect of losing some of their powers to the Internetwork, which is out of their control. IOW disorder for elites, and made-to-order for independents. (note on that quote)
Social Contract per britannica (briefly) per wkpd
explicit vs implicit contracts Differences Between Implicit & Explicit Agreements (law) 2017 more specific, social contracts Social Contract Theory UT (includes videos, glossary)
to be continued: fairness is a social construct (contrast with deterministic fate)
study notes (all 3 parts, this series)
Gentrification, Displacement and the Role of Public Investment: A Literature Review 2015 pdf
https://duckduckgo.com/?q=Owen+Benjamin+made+video+about+Fear&atb=v81-4__&ia=videos
why is 'social construct' a popular theme?
https://www.success.com/8-daily-habits-to-build-your-mental-strength/
Pareto principle implications for marital harmony, a very brief summary of research by J Cacioppo)
https://en.wikipedia.org/wiki/Jewish_culture
https://en.wikipedia.org/wiki/Race_and_society
https://thejewishwars.blogspot.com/2019/03/aipac-traitor-jews-having-successfully.html
https://theevilofzionismexposedbyjews.weebly.com/14-what-zionist-and-anti-zionist-jews-have-said-about-education.html
submitted by acloudrift to AlternativeHypothesis [link] [comments]

Searching for the Unicorn Cryptocurrency

Searching for the Unicorn Cryptocurrency
For someone first starting out as a cryptocurrency investor, finding a trustworthy manual for screening a cryptocurrency’s merits is nonexistent as we are still in the early, Wild West days of the cryptocurrency market. One would need to become deeply familiar with the inner workings of blockchain to be able to perform the bare minimum due diligence.
One might believe, over time, that finding the perfect cryptocurrency may be nothing short of futile. If a cryptocurrency purports infinite scalability, then it is probably either lightweight with limited features or it is highly centralized among a limited number of nodes that perform consensus services especially Proof of Stake or Delegated Proof of Stake. Similarly, a cryptocurrency that purports comprehensive privacy may have technical obstacles to overcome if it aims to expand its applications such as in smart contracts. The bottom line is that it is extremely difficult for a cryptocurrency to have all important features jam-packed into itself.
The cryptocurrency space is stuck in the era of the “dial-up internet” in a manner of speaking. Currently blockchain can’t scale – not without certain tradeoffs – and it hasn’t fully resolved certain intractable issues such as user-unfriendly long addresses and how the blockchain size is forever increasing to name two.
In other words, we haven’t found the ultimate cryptocurrency. That is, we haven’t found the mystical unicorn cryptocurrency that ushers the era of decentralization while eschewing all the limitations of traditional blockchain systems.
“But wait – what about Ethereum once it implements sharding?”
“Wouldn’t IOTA be able to scale infinitely with smart contracts through its Qubic offering?”
“Isn’t Dash capable of having privacy, smart contracts, and instantaneous transactions?”
Those thoughts and comments may come from cryptocurrency investors who have done their research. It is natural for the informed investors to invest in projects that are believed to bring cutting edge technological transformation to blockchain. Sooner or later, the sinking realization will hit that any variation of the current blockchain technology will always likely have certain limitations.
Let us pretend that there indeed exists a unicorn cryptocurrency somewhere that may or may not be here yet. What would it look like, exactly? Let us set the 5 criteria of the unicorn cryptocurrency:
Unicorn Criteria
(1) Perfectly solves the blockchain trilemma:
o Infinite scalability
o Full security
o Full decentralization
(2) Zero or minimal transaction fee
(3) Full privacy
(4) Full smart contract capabilities
(5) Fair distribution and fair governance
For each of the above 5 criteria, there would not be any middle ground. For example, a cryptocurrency with just an in-protocol mixer would not be considered as having full privacy. As another example, an Initial Coin Offering (ICO) may possibly violate criterion (5) since with an ICO the distribution and governance are often heavily favored towards an oligarchy – this in turn would defy the spirit of decentralization that Bitcoin was found on.
There is no cryptocurrency currently that fits the above profile of the unicorn cryptocurrency. Let us examine an arbitrary list of highly hyped cryptocurrencies that meet the above list at least partially. The following list is by no means comprehensive but may be a sufficient sampling of various blockchain implementations:
Bitcoin (BTC)
Bitcoin is the very first and the best known cryptocurrency that started it all. While Bitcoin is generally considered extremely secure, it suffers from mining centralization to a degree. Bitcoin is not anonymous, lacks smart contracts, and most worrisomely, can only do about 7 transactions per seconds (TPS). Bitcoin is not the unicorn notwithstanding all the Bitcoin maximalists.
Ethereum (ETH)
Ethereum is widely considered the gold standard of smart contracts aside from its scalability problem. Sharding as part of Casper’s release is generally considered to be the solution to Ethereum’s scalability problem.
The goal of sharding is to split up validating responsibilities among various groups or shards. Ethereum’s sharding comes down to duplicating the existing blockchain architecture and sharing a token. This does not solve the core issue and simply kicks the can further down the road. After all, full nodes still need to exist one way or another.
Ethereum’s blockchain size problem is also an issue as will be explained more later in this article.
As a result, Ethereum is not the unicorn due to its incomplete approach to scalability and, to a degree, security.
Dash
Dash’s masternodes are widely considered to be centralized due to their high funding requirements, and there are accounts of a pre-mine in the beginning. Dash is not the unicorn due to its questionable decentralization.
Nano
Nano boasts rightfully for its instant, free transactions. But it lacks smart contracts and privacy, and it may be exposed to well orchestrated DDOS attacks. Therefore, it goes without saying that Nano is not the unicorn.
EOS
While EOS claims to execute millions of transactions per seconds, a quick glance reveals centralized parameters with 21 nodes and a questionable governance system. Therefore, EOS fails to achieve the unicorn status.
Monero (XMR)
One of the best known and respected privacy coins, Monero lacks smart contracts and may fall short of infinite scalability due to CryptoNote’s design. The unicorn rank is out of Monero’s reach.
IOTA
IOTA’s scalability is based on the number of transactions the network processes, and so its supposedly infinite scalability would fluctuate and is subject to the whims of the underlying transactions. While IOTA’s scalability approach is innovative and may work in the long term, it should be reminded that the unicorn cryptocurrency has no middle ground. The unicorn cryptocurrency would be expected to scale infinitely on a consistent basis from the beginning.
In addition, IOTA’s Masked Authenticated Messaging (MAM) feature does not bring privacy to the masses in a highly convenient manner. Consequently, the unicorn is not found with IOTA.

PascalCoin as a Candidate for the Unicorn Cryptocurrency
Please allow me to present a candidate for the cryptocurrency unicorn: PascalCoin.
According to the website, PascalCoin claims the following:
“PascalCoin is an instant, zero-fee, infinitely scalable, and decentralized cryptocurrency with advanced privacy and smart contract capabilities. Enabled by the SafeBox technology to become the world’s first blockchain independent of historical operations, PascalCoin possesses unlimited potential.”
The above summary is a mouthful to be sure, but let’s take a deep dive on how PascalCoin innovates with the SafeBox and more. Before we do this, I encourage you to first become acquainted with PascalCoin by watching the following video introduction:
https://www.youtube.com/watch?time_continue=4&v=F25UU-0W9Dk
The rest of this section will be split into 10 parts in order to illustrate most of the notable features of PascalCoin. Naturally, let’s start off with the SafeBox.
Part #1: The SafeBox
Unlike traditional UTXO-based cryptocurrencies in which the blockchain records the specifics of each transaction (address, sender address, amount of funds transferred, etc.), the blockchain in PascalCoin is only used to mutate the SafeBox. The SafeBox is a separate but equivalent cryptographic data structure that snapshots account balances. PascalCoin’s blockchain is comparable to a machine that feeds the most important data – namely, the state of an account – into the SafeBox. Any node can still independently compute and verify the cumulative Proof-of-Work required to construct the SafeBox.
The PascalCoin whitepaper elegantly highlights the unique historical independence that the SafeBox possesses:
“While there are approaches that cryptocurrencies could use such as pruning, warp-sync, "finality checkpoints", UTXO-snapshotting, etc, there is a fundamental difference with PascalCoin. Their new nodes can only prove they are on most-work-chain using the infinite history whereas in PascalCoin, new nodes can prove they are on the most-work chain without the infinite history.”
Some cryptocurrency old-timers might instinctively balk at the idea of full nodes eschewing the entire history for security, but such a reaction would showcase a lack of understanding on what the SafeBox really does.
A concrete example would go a long way to best illustrate what the SafeBox does. Let’s say I input the following operations in my calculator:
5 * 5 – 10 / 2 + 5
It does not take a genius to calculate the answer, 25. Now, the expression “5 \ 5 – 10 / 2 + 5”* would be forever imbued on a traditional blockchain’s history. But the SafeBox begs to differ. It says that the expression “5 \ 5 – 10 / 2 + 5”* should instead be simply “25” so as preserve simplicity, time, and space. In other words, the SafeBox simply preserves the account balance.
But some might still be unsatisfied and claim that if one cannot trace the series of operations (transactions) that lead to the final number (balance) of 25, the blockchain is inherently insecure.
Here are four important security aspects of the SafeBox that some people fail to realize:
(1) SafeBox Follows the Longest Chain of Proof-of-Work
The SafeBox mutates itself per 100 blocks. Each new SafeBox mutation must reference both to the previous SafeBox mutation and the preceding 100 blocks in order to be valid, and the resultant hash of the new mutated SafeBox must then be referenced by each of the new subsequent blocks, and the process repeats itself forever.
The fact that each new SafeBox mutation must reference to the previous SafeBox mutation is comparable to relying on the entire history. This is because the previous SafeBox mutation encapsulates the result of cumulative entire history except for the 100 blocks which is why each new SafeBox mutation requires both the previous SafeBox mutation and the preceding 100 blocks.
So in a sense, there is a single interconnected chain of inflows and outflows, supported by Byzantine Proof-of-Work consensus, instead of the entire history of transactions.
More concretely, the SafeBox follows the path of the longest chain of Proof-of-Work simply by design, and is thus cryptographically equivalent to the entire history even without tracing specific operations in the past. If the chain is rolled back with a 51% attack, only the attacker’s own account(s) in the SafeBox can be manipulated as is explained in the next part.
(2) A 51% Attack on PascalCoin Functions the Same as Others
A 51% attack on PascalCoin would work in a similar way as with other Proof-of-Work cryptocurrencies. An attacker cannot modify a transaction in the past without affecting the current SafeBox hash which is accepted by all honest nodes.
Someone might claim that if you roll back all the current blocks plus the 100 blocks prior to the SafeBox’s mutation, one could create a forged SafeBox with different balances for all accounts. This would be incorrect as one would be able to manipulate only his or her own account(s) in the SafeBox with a 51% attack – just as is the case with other UTXO cryptocurrencies. The SafeBox stores the balances of all accounts which are in turn irreversibly linked only to their respective owners’ private keys.
(3) One Could Preserve the Entire History of the PascalCoin Blockchain
No blockchain data in PascalCoin is ever deleted even in the presence of the SafeBox. Since the SafeBox is cryptographically equivalent to a full node with the entire history as explained above, PascalCoin full nodes are not expected to contain infinite history. But for whatever reason(s) one may have, one could still keep all the PascalCoin blockchain history as well along with the SafeBox as an option even though it would be redundant.
Without storing the entire history of the PascalCoin blockchain, you can still trace the specific operations of the 100 blocks prior to when the SafeBox absorbs and reflects the net result (a single balance for each account) from those 100 blocks. But if you’re interested in tracing operations over a longer period in the past – as redundant as that may be – you’d have the option to do so by storing the entire history of the PascalCoin blockchain.
(4) The SafeBox is Equivalent to the Entire Blockchain History
Some skeptics may ask this question: “What if the SafeBox is forever lost? How would you be able to verify your accounts?” Asking this question is tantamount to asking to what would happen to Bitcoin if all of its entire history was erased. The result would be chaos, of course, but the SafeBox is still in line with the general security model of a traditional blockchain with respect to black swans.
Now that we know the security of the SafeBox is not compromised, what are the implications of this new blockchain paradigm? A colorful illustration as follows still wouldn’t do justice to the subtle revolution that the SafeBox ushers. The automobiles we see on the street are the cookie-and-butter representation of traditional blockchain systems. The SafeBox, on the other hand, supercharges those traditional cars to become the Transformers from Michael Bay’s films.
The SafeBox is an entirely different blockchain architecture that is impressive in its simplicity and ingenuity. The SafeBox’s design is only the opening act for PascalCoin’s vast nuclear arsenal. If the above was all that PascalCoin offers, it still wouldn’t come close to achieving the unicorn status but luckily, we have just scratched the surface. Please keep on reading on if you want to learn how PascalCoin is going to shatter the cryptocurrency industry into pieces. Buckle down as this is going to be a long read as we explore further about the SafeBox’s implications.
Part #2: 0-Confirmation Transactions
To begin, 0-confirmation transactions are secure in PascalCoin thanks to the SafeBox.
The following paraphrases an explanation of PascalCoin’s 0-confirmations from the whitepaper:
“Since PascalCoin is not a UTXO-based currency but rather a State-based currency thanks to the SafeBox, the security guarantee of 0-confirmation transactions are much stronger than in UTXO-based currencies. For example, in Bitcoin if a merchant accepts a 0-confirmation transaction for a coffee, the buyer can simply roll that transaction back after receiving the coffee but before the transaction is confirmed in a block. The way the buyer does this is by re-spending those UTXOs to himself in a new transaction (with a higher fee) thus invalidating them for the merchant. In PascalCoin, this is virtually impossible since the buyer's transaction to the merchant is simply a delta-operation to debit/credit a quantity from/to accounts respectively. The buyer is unable to erase or pre-empt this two-sided, debit/credit-based transaction from the network’s pending pool until it either enters a block for confirmation or is discarded with respect to both sender and receiver ends. If the buyer tries to double-spend the coffee funds after receiving the coffee but before they clear, the double-spend transaction will not propagate the network since nodes cannot propagate a double-spending transaction thanks to the debit/credit nature of the transaction. A UTXO-based transaction is initially one-sided before confirmation and therefore is more exposed to one-sided malicious schemes of double spending.”
Phew, that explanation was technical but it had to be done. In summary, PascalCoin possesses the only secure 0-confirmation transactions in the cryptocurrency industry, and it goes without saying that this means PascalCoin is extremely fast. In fact, PascalCoin is capable of 72,000 TPS even prior to any additional extensive optimizations down the road. In other words, PascalCoin is as instant as it gets and gives Nano a run for its money.
Part #3: Zero Fee
Let’s circle back to our discussion of PascalCoin’s 0-confirmation capability. Here’s a little fun magical twist to PascalCoin’s 0-confirmation magic: 0-confirmation transactions are zero-fee. As in you don’t pay a single cent in fee for each 0-confirmation! There is just a tiny downside: if you create a second transaction in a 5-minute block window then you’d need to pay a minimal fee. Imagine using Nano but with a significantly stronger anti-DDOS protection for spam! But there shouldn’t be any complaint as this fee would amount to 0.0001 Pascal or $0.00002 based on the current price of a Pascal at the time of this writing.
So, how come the fee for blazingly fast transactions is nonexistent? This is where the magic of the SafeBox arises in three ways:
(1) PascalCoin possesses the secure 0-confirmation feature as discussed above that enables this speed.
(2) There is no fee bidding competition of transaction priority typical in UTXO cryptocurrencies since, once again, PascalCoin operates on secure 0-confirmations.
(3) There is no fee incentive needed to run full nodes on behalf of the network’s security beyond the consensus rewards.
Part #4: Blockchain Size
Let’s expand more on the third point above, using Ethereum as an example. Since Ethereum’s launch in 2015, its full blockchain size is currently around 2 TB, give or take, but let’s just say its blockchain size is 100 GB for now to avoid offending the Ethereum elitists who insist there are different types of full nodes that are lighter. Whoever runs Ethereum’s full nodes would expect storage fees on top of the typical consensus fees as it takes significant resources to shoulder Ethereum’s full blockchain size and in turn secure the network. What if I told you that PascalCoin’s full blockchain size will never exceed few GBs after thousands of years? That is just what the SafeBox enables PascalCoin to do so. It is estimated that by 2072, PascalCoin’s full nodes will only be 6 GB which is low enough not to warrant any fee incentives for hosting full nodes. Remember, the SafeBox is an ultra-light cryptographic data structure that is cryptographically equivalent to a blockchain with the entire transaction history. In other words, the SafeBox is a compact spreadsheet of all account balances that functions as PascalCoin’s full node!
Not only does the SafeBox’s infinitesimal memory size helps to reduce transaction fees by phasing out any storage fees, but it also paves the way for true decentralization. It would be trivial for every PascalCoin user to opt a full node in the form of a wallet. This is extreme decentralization at its finest since the majority of users of other cryptocurrencies ditch full nodes due to their burdensome sizes. It is naïve to believe that storage costs would reduce enough to the point where hosting full nodes are trivial. Take a look at the following chart outlining the trend of storage cost.

* https://www.backblaze.com/blog/hard-drive-cost-per-gigabyte/
As we can see, storage costs continue to decrease but the descent is slowing down as is the norm with technological improvements. In the meantime, blockchain sizes of other cryptocurrencies are increasing linearly or, in the case of smart contract engines like Ethereum, parabolically. Imagine a cryptocurrency smart contract engine like Ethereum garnering worldwide adoption; how do you think Ethereum’s size would look like in the far future based on the following chart?


https://i.redd.it/k57nimdjmo621.png

Ethereum’s future blockchain size is not looking pretty in terms of sustainable security. Sharding is not a fix for this issue since there still needs to be full nodes but that is a different topic for another time.
It is astonishing that the cryptocurrency community as a whole has passively accepted this forever-expanding-blockchain-size problem as an inescapable fate.
PascalCoin is the only cryptocurrency that has fully escaped the death vortex of forever expanding blockchain size. Its blockchain size wouldn’t exceed 10 GB even after many hundreds of years of worldwide adoption. Ethereum’s blockchain size after hundreds of years of worldwide adoption would make fine comedy.
Part #5: Simple, Short, and Ordinal Addresses
Remember how the SafeBox works by snapshotting all account balances? As it turns out, the account address system is almost as cool as the SafeBox itself.
Imagine yourself in this situation: on a very hot and sunny day, you’re wandering down the street across from your house and ran into a lemonade stand – the old-fashioned kind without any QR code or credit card terminal. The kid across you is selling a lemonade cup for 1 Pascal with a poster outlining the payment address as 5471-55. You flip out your phone and click “Send” with 1 Pascal to the address 5471-55; viola, exactly one second later you’re drinking your lemonade without paying a cent for the transaction fee!
The last thing one wants to do is to figure out how to copy/paste to, say, the following address 1BoatSLRHtKNngkdXEeobR76b53LETtpyT on the spot wouldn’t it? Gone are the obnoxiously long addresses that plague all cryptocurrencies. The days of those unreadable addresses will be long gone – it has to be if blockchain is to innovate itself for the general public. EOS has a similar feature for readable addresses but in a very limited manner in comparison, and nicknames attached to addresses in GUIs don’t count since blockchain-wide compatibility wouldn’t hold.
Not only does PascalCoin has the neat feature of having addresses (called PASAs) that amount to up to 6 or 7 digits, but PascalCoin can also incorporate in-protocol address naming as opposed to GUI address nicknames. Suppose I want to order something from Amazon using Pascal; I simply search the word “Amazon” then the corresponding account number shows up. Pretty neat, right?
The astute reader may gather that PascalCoin’s address system makes it necessary to commoditize addresses, and he/she would be correct. Some view this as a weakness; part #10 later in this segment addresses this incorrect perception.
Part #6: Privacy
As if the above wasn’t enough, here’s another secret that PascalCoin has: it is a full-blown privacy coin. It uses two separate foundations to achieve comprehensive anonymity: in-protocol mixer for transfer amounts and zn-SNARKs for private balances. The former has been implemented and the latter is on the roadmap. Both the 0-confirmation transaction and the negligible transaction fee would make PascalCoin the most scalable privacy coin of any other cryptocurrencies pending the zk-SNARKs implementation.
Part #7: Smart Contracts
Next, PascalCoin will take smart contracts to the next level with a layer-2 overlay consensus system that pioneers sidechains and other smart contract implementations.
In formal terms, this layer-2 architecture will facilitate the transfer of data between PASAs which in turn allows clean enveloping of layer-2 protocols inside layer-1 much in the same way that HTTP lives inside TCP.
To summarize:
· The layer-2 consensus method is separate from the layer-1 Proof-of-Work. This layer-2 consensus method is independent and flexible. A sidechain – based on a single encompassing PASA – could apply Proof-of-Stake (POS), Delegated Proof-of-Stake (DPOS), or Directed Acyclic Graph (DAG) as the consensus system of its choice.
· Such a layer-2 smart contract platform can be written in any languages.
· Layer-2 sidechains will also provide very strong anonymity since funds are all pooled and keys are not used to unlock them.
· This layer-2 architecture is ingenious in which the computation is separate from layer-2 consensus, in effect removing any bottleneck.
· Horizontal scaling exists in this paradigm as there is no interdependence between smart contracts and states are not managed by slow sidechains.
· Speed and scalability are fully independent of PascalCoin.
One would be able to run the entire global financial system on PascalCoin’s infinitely scalable smart contract platform and it would still scale infinitely. In fact, this layer-2 architecture would be exponentially faster than Ethereum even after its sharding is implemented.
All this is the main focus of PascalCoin’s upcoming version 5 in 2019. A whitepaper add-on for this major upgrade will be released in early 2019.
Part #8: RandomHash Algorithm
Surely there must be some tradeoffs to PascalCoin’s impressive capabilities, you might be asking yourself. One might bring up the fact that PascalCoin’s layer-1 is based on Proof-of-Work and is thus susceptible to mining centralization. This would be a fallacy as PascalCoin has pioneered the very first true ASIC, GPU, and dual-mining resistant algorithm known as RandomHash that obliterates anything that is not CPU based and gives all the power back to solo miners.
Here is the official description of RandomHash:
“RandomHash is a high-level cryptographic hash algorithm that combines other well-known hash primitives in a highly serial manner. The distinguishing feature is that calculations for a nonce are dependent on partial calculations of other nonces, selected at random. This allows a serial hasher (CPU) to re-use these partial calculations in subsequent mining saving 50% or more of the work-load. Parallel hashers (GPU) cannot benefit from this optimization since the optimal nonce-set cannot be pre-calculated as it is determined on-the-fly. As a result, parallel hashers (GPU) are required to perform the full workload for every nonce. Also, the algorithm results in 10x memory bloat for a parallel implementation. In addition to its serial nature, it is branch-heavy and recursive making in optimal for CPU-only mining.”
One might be understandably skeptical of any Proof-of-Work algorithm that solves ASIC and GPU centralization once for all because there have been countless proposals being thrown around for various algorithms since the dawn of Bitcoin. Is RandomHash truly the ASIC & GPU killer that it claims to be?
Herman Schoenfeld, the inventor behind RandomHash, described his algorithm in the following:
“RandomHash offers endless ASIC-design breaking surface due to its use of recursion, hash algo selection, memory hardness and random number generation.
For example, changing how round hash selection is made and/or random number generator algo and/or checksum algo and/or their sequencing will totally break an ASIC design. Conceptually if you can significantly change the structure of the output assembly whilst keeping the high-level algorithm as invariant as possible, the ASIC design will necessarily require proportional restructuring. This results from the fact that ASIC designs mirror the ASM of the algorithm rather than the algorithm itself.”
Polyminer1 (pseudonym), one of the members of the PascalCoin core team who developed RHMiner (official software for mining RandomHash), claimed as follows:
“The design of RandomHash is, to my experience, a genuine innovation. I’ve been 30 years in the field. I’ve rarely been surprised by anything. RandomHash was one of my rare surprises. It’s elegant, simple, and achieves resistance in all fronts.”
PascalCoin may have been the first party to achieve the race of what could possibly be described as the “God algorithm” for Proof-of-Work cryptocurrencies. Look no further than one of Monero’s core developers since 2015, Howard Chu. In September 2018, Howard declared that he has found a solution, called RandomJS, to permanently keep ASICs off the network without repetitive algorithm changes. This solution actually closely mirrors RandomHash’s algorithm. Discussing about his algorithm, Howard asserted that “RandomJS is coming at the problem from a direction that nobody else is.”
Link to Howard Chu’s article on RandomJS:
https://www.coindesk.com/one-musicians-creative-solution-to-drive-asics-off-monero
Yet when Herman was asked about Howard’s approach, he responded:
“Yes, looks like it may work although using Javascript was a bit much. They should’ve just used an assembly subset and generated random ASM programs. In a way, RandomHash does this with its repeated use of random mem-transforms during expansion phase.”
In the end, PascalCoin may have successfully implemented the most revolutionary Proof-of-Work algorithm, one that eclipses Howard’s burgeoning vision, to date that almost nobody knows about. To learn more about RandomHash, refer to the following resources:
RandomHash whitepaper:
https://www.pascalcoin.org/storage/whitepapers/RandomHash_Whitepaper.pdf
Technical proposal for RandomHash:
https://github.com/PascalCoin/PascalCoin/blob/mastePIP/PIP-0009.md
Someone might claim that PascalCoin still suffers from mining centralization after RandomHash, and this is somewhat misleading as will be explained in part #10.
Part #9: Fair Distribution and Governance
Not only does PascalCoin rest on superior technology, but it also has its roots in the correct philosophy of decentralized distribution and governance. There was no ICO or pre-mine, and the developer fund exists as a percentage of mining rewards as voted by the community. This developer fund is 100% governed by a decentralized autonomous organization – currently facilitated by the PascalCoin Foundation – that will eventually be transformed into an autonomous smart contract platform. Not only is the developer fund voted upon by the community, but PascalCoin’s development roadmap is also voted upon the community via the Protocol Improvement Proposals (PIPs).
This decentralized governance also serves an important benefit as a powerful deterrent to unseemly fork wars that befall many cryptocurrencies.
Part #10: Common Misconceptions of PascalCoin
“The branding is terrible”
PascalCoin is currently working very hard on its image and is preparing for several branding and marketing initiatives in the short term. For example, two of the core developers of the PascalCoin recently interviewed with the Fox Business Network. A YouTube replay of this interview will be heavily promoted.
Some people object to the name PascalCoin. First, it’s worth noting that PascalCoin is the name of the project while Pascal is the name of the underlying currency. Secondly, Google and YouTube received excessive criticisms back then in the beginning with their name choices. Look at where those companies are nowadays – surely a somewhat similar situation faces PascalCoin until the name’s familiarity percolates into the public.
“The wallet GUI is terrible”
As the team is run by a small yet extremely dedicated developers, multiple priorities can be challenging to juggle. The lack of funding through an ICO or a pre-mine also makes it challenging to accelerate development. The top priority of the core developers is to continue developing full-time on the groundbreaking technology that PascalCoin offers. In the meantime, an updated and user-friendly wallet GUI has been worked upon for some time and will be released in due time. Rome wasn’t built in one day.
“One would need to purchase a PASA in the first place”
This is a complicated topic since PASAs need to be commoditized by the SafeBox’s design, meaning that PASAs cannot be obtained at no charge to prevent systematic abuse. This raises two seemingly valid concerns:
· As a chicken and egg problem, how would one purchase a PASA using Pascal in the first place if one cannot obtain Pascal without a PASA?
· How would the price of PASAs stay low and affordable in the face of significant demand?
With regards to the chicken and egg problem, there are many ways – some finished and some unfinished – to obtain your first PASA as explained on the “Get Started” page on the PascalCoin website:
https://www.pascalcoin.org/get_started
More importantly, however, is the fact that there are few methods that can get your first PASA for free. The team will also release another method soon in which you could obtain your first PASA for free via a single SMS message. This would probably become by far the simplest and the easiest way to obtain your first PASA for free. There will be more new ways to easily obtain your first PASA for free down the road.
What about ensuring the PASA market at large remains inexpensive and affordable following your first (and probably free) PASA acquisition? This would be achieved in two ways:
· Decentralized governance of the PASA economics per the explanation in the FAQ section on the bottom of the PascalCoin website (https://www.pascalcoin.org/)
· Unlimited and free pseudo-PASAs based on layer-2 in the next version release.
“PascalCoin is still centralized after the release of RandomHash”
Did the implementation of RandomHash from version 4 live up to its promise?
The official goals of RandomHash were as follow:
(1) Implement a GPU & ASIC resistant hash algorithm
(2) Eliminate dual mining
The two goals above were achieved by every possible measure.
Yet a mining pool, Nanopool, was able to regain its hash majority after a significant but a temporary dip.
The official conclusion is that, from a probabilistic viewpoint, solo miners are more profitable than pool miners. However, pool mining is enticing for solo miners who 1) have limited hardware as it ensures a steady income instead of highly profitable but probabilistic income via solo mining, and 2) who prefer convenient software and/or GUI.
What is the next step, then? While the barrier of entry for solo miners has successfully been put down, additional work needs to be done. The PascalCoin team and the community are earnestly investigating additional steps to improve mining decentralization with respect to pool mining specifically to add on top of RandomHash’s successful elimination of GPU, ASIC, and dual-mining dominance.
It is likely that the PascalCoin community will promote the following two initiatives in the near future:
(1) Establish a community-driven, nonprofit mining pool with attractive incentives.
(2) Optimize RHMiner, PascalCoin’s official solo mining software, for performance upgrades.
A single pool dominance is likely short lived once more options emerge for individual CPU miners who want to avoid solo mining for whatever reason(s).
Let us use Bitcoin as an example. Bitcoin mining is dominated by ASICs and mining pools but no single pool is – at the time of this writing – even close on obtaining the hash majority. With CPU solo mining being a feasible option in conjunction with ASIC and GPU mining eradication with RandomHash, the future hash rate distribution of PascalCoin would be far more promising than Bitcoin’s hash rate distribution.
PascalCoin is the Unicorn Cryptocurrency
If you’ve read this far, let’s cut straight to the point: PascalCoin IS the unicorn cryptocurrency.
It is worth noting that PascalCoin is still a young cryptocurrency as it was launched at the end of 2016. This means that many features are still work in progress such as zn-SNARKs, smart contracts, and pool decentralization to name few. However, it appears that all of the unicorn criteria are within PascalCoin’s reach once PascalCoin’s technical roadmap is mostly completed.
Based on this expository on PascalCoin’s technology, there is every reason to believe that PascalCoin is the unicorn cryptocurrency. PascalCoin also solves two fundamental blockchain problems beyond the unicorn criteria that were previously considered unsolvable: blockchain size and simple address system. The SafeBox pushes PascalCoin to the forefront of cryptocurrency zeitgeist since it is a superior solution compared to UTXO, Directed Acyclic Graph (DAG), Block Lattice, Tangle, and any other blockchain innovations.


THE UNICORN

Author: Tyler Swob
submitted by Kosass to CryptoCurrency [link] [comments]

New Bitcoin Mining Website 2020  Best Free Bitcoin Earning Site  Solid Minerio Website Full Review Bitcoin Miner Tools - Unknown Mining pool Connect Legit Bitcoin Mining sites 2020  New Bitcoin Mining site 2020  Bitcoin Mining site  Tech Alibhai BITCOIN GENERATOR FREE BITCOIN MINER 2020 100% LEGIT BITCOIN MONEY ADD Best Bitcoin Miner Machine Free download ❤️ Best BTC Miners in 2020 QRKqD2nya I

Hut 8 Mining Corp. has raised $8.3 million from the sale of 6% of its shares to investors. The Canadian bitcoin miner originally intended to raise $7.5 million from the sale, but it was Bitmain Antminer T19 Bitcoin ASIC Now Up for Pre-Order We have beeing playing for a couple of days with one of the new reference design Nvidia RTX 2060 video cards and tried how well it performs for crypto mining using various miners and mining algorithms and as expected with new GPU releases there is more to be desired, but more on that in The Blockchain Miner Pro is a desktop application design to mine bitcoin for it’s users at a relatively fast rate. The Blockchain Miner Pro comes with an already registered mining pool and inner mining processor to assist mine high bitcoin to your account. We have beeing playing for a couple of days with one of the new reference design Nvidia RTX 2060 video cards and tried how well it performs for crypto mining using various miners and mining algorithms and as expected with new GPU releases there is more to be desired, but more on that in a moment. Miner WildRigMulti in version 0.19 received support for a new generation of video cards from AMD – Radeon RX5700 and RX5700XT. Because at the moment this is the only miner that is optimized to work with the new AMD GPU architecture – RDNA, so everyone will be interested to know what results the miner developers from the RX5700 video cards

[index] [29421] [5919] [13144] [18348] [21997] [5295] [1336] [8712] [14021] [28654]

New Bitcoin Mining Website 2020 Best Free Bitcoin Earning Site Solid Minerio Website Full Review

The best bitcoin miner what i use was able to mine #0.00003 BTC per day with my GPU,when this miner can mine at least 0.5 BTC per day with your CPU,not with GPU. Yes,this is how much power have ... Bitcoin miners help keep the Bitcoin network secure by approving transactions. Mining is an important and integral part of Bitcoin that ensures fairness while keeping the Bitcoin network stable ... How to generate free Bitcoin 1. Enter your personal Bitcoin Wallet Address – make sure to enter a valid wallet address. It is recommended to generate a new Bitcoin Wallet Address everytime you ... -----Video Topic-----bitcoin mining software, bitcoin mining software 2019, bitcoin mining software for pc, bitcoin, bitcoin mining, bitcoin miner, free bitcoin mining software, how to earn free ... Hello, Guys welcome to Technical MK ; In this video, I will show you a free Bitcoin mining website where you can mine 100% free Bitcoin without any investment with payment proof, watch full video ...

Flag Counter