The Occult, Numerology & A Lot Pointing at an Event on August 10/11th
Take some of this with a grain of salt. But, as you know through my Shemitah analysis and digging into the occult signs, symbols, dates and numerology used by many of the satanic cabal that currently rule over this Earth that I do pay attention to these things. I also have one particular TDV subscriber in the Czech Republic who parses through a lot of this data for me… and what we have been uncovering about some sort of event on August 10th/11th is at least worth mentioning here. If something of interest does happen on this date then at least I can say I tried to tell you. And, if nothing happens, much of this information is interesting nonetheless. TISHA B’AV Tisha B’Av, the 9th day of the month of Av, which is the 11th month in the Jewish calendar (in Europe they would write this date as 9.11., this year 2019 in Gregorian calendar TISHA B´AV falls to August 10-11), is the saddest day in the Jewish calendar, on which the orthodox jews fast, deprive themselves and pray. It is the culmination of the Three Weeks (of mourning), a period of time during which we mark the destruction of the two Holy Temples in Jerusalem, the Solomon’s temple by the Neo-Babylian empire in 587 BC and Herod's temple by the Roman empire in 70 AD. It is crucial to note that this world is run by secret societies and at the very hard core of the secret societies is the Kabbalah. Kabbalah is the ancient jewish mysticism. It is a method of encoding information through a system of mathematics and numbers. It is some of the most ancient knowledge that man has ever possessed and has been kept secret and given only to those who proved themselves worthy through the process of initiation. Nobody today really knows where it comes from, it was here a long time before the jews came along, the jews just took it and preserved it. It truly is the hardcore of the secret knowledge, the metaphysics, the science that not even 0.1% of the today´s world population know anything about, Shortly to the symbol 911 and what it means in Kabbalah; Tisha B'Av is actually the Ninth of AV, the 9th day of the 11th month in the jewish calendar. In Kabbalah number 10 is the symbol of God's perfection and superiority. The satanists (what the people at the highest ranks of the secret societies like freemasons are) are literally very afraid of God, so they do everything to escape God’s supervision over their deeds , try to hide from Him and that is why they have this symbol 9 11 as the most satanic one, since they believe this symbol kind of “jumps over” or “skips” God, since God’s symbol of perfection and superiority in Kabbalah is the number 10. They jump over the number 10 or try to skip it, that is why 9 11… the Tisha B´Av holiday of the jewish calendar falls into the second half of July or first half of August in the Gregorian calendar. Some of the events that took place on Tisha B´Av in history: ● The First Crusade officially commenced on August 15, 1096 (Av 24, AM 4856), killing 10,000 Jews in its first month and destroying Jewish communities in France and the Rhineland. ● The Jews were expelled from England on July 18, 1290 (Av 9, AM 5050). ● The Jews were expelled from France on July 22, 1306 (Av 10, AM 5066). ● The Jews were expelled from Spain on July 31, 1492 (Av 7, AM 5252). ● Germany entered World War I on August 1–2, 1914 (Av 9–10, AM 5674), which caused massive upheaval in European Jewry and whose aftermath led to the Holocaust. ● On August 2, 1941 (Av 9, AM 5701), SS commander Heinrich Himmler formally received approval from the Nazi Party for "The Final Solution." As a result, the Holocaust began during which almost one third of the world's Jewish population perished. ● On July 23, 1942 (Av 9, AM 5702), began the mass deportation of Jews from the Warsaw Ghetto, en route to Treblinka. ● The AMIA bombing, of the Jewish community center in Buenos Aires, killed 85 and injuring 300 on July 18, 1994 (10 Av, AM 5754). ● The Israeli disengagement from Gaza began in the Gaza Strip, expelling 8000 Jews who lived in Gush Katif; August 15, 2005; 10 Av, 5765. ● Last year 2018 on Tisha B´Av on July 21st, we had a shooting in Chicago. It happened at 10:30am when the arms of the clock point at 11 and 6, the upside down 911. Tisha B´Av this year is the numerical value of the number 58, 11+8+20+19, 58 is very symbolic number for freemasonry and other occult or secret societies. Donald Trump is also connected to this number, we will devote some attention to this number with relation to Donald Trump later below, furthermore the word TRUMP equals 222 in „reverse satanic“ style of gematria. August 10th is the 222nd day of the year. Moreover, some numerologists are saying that the most satanic day in the year from the number point of view is June 6th, like 6/6. For example, last year the merger of the two giants, Monsanto and Bayer , deal for $66 billion USD, was allegedly signed on 6/6/18 (18=6+6+6). Now if you add 66 days to 6/6 (June 6th), you’́ll come to August 11th, TISHA B´AV of 2019. This year we had a ritual on 6/6, with all the world’s (mis)leaders in Normandy, France, the 75th anniversary of the Normandy landing of the allies in 1944. On CNN they put some headlines in quotes, like “NORMANDY ANNIVERSARY” which equals 222 in ALW Kabbalah style of gematria (the beginning of Tisha B´Av this year is in the evening of august 10th, the 222nd day of the year). They also posted, “NORMANDY D-DAY” which equals 118 in both ALW and KFW Kabbalah styles of gematria. Maybe they are pointing to august 11th as much as they can, since 11.8. is the way August 11th is written in Europe. AUGUST 11TH The date 11.8. is also like 11+8 = 19, we are in the year 19, 19 matches CHAOS is gematria, in reverse it is 91, matching PHOENIX. It is also like 11x8=88, which is the symbolic number of Trump, in other words the “super time number.” The number 11 in Kabbalah is representing duality, shattering and the initiation into the mysteries of religion. September 11th was permeated by the number 11 like no other event in known history. 11 is also represented by the twin pillar of Jachin and Boaz, which stood at the entrance of Solomon’s temple. Number 11 and its multiples are the master numbers in numerology, they do not get reduced unlike the other numbers, which can be reduced. The number 8 is the number of time, represented by the hour glass, the infinity symbol and the Ouroboros biting its own tail. Number 8 is also the symbol of the Magician tarot card, the Magician is always depicted with the number 8 above his head and with the hourglass on the table in front of him. 1+1+8+2+0+1+9=22 22 is the “master builder number”, freemasons consider themselves to be THE MASTER BUILDERS. Also, there is 22 books of revelation, this date august 11th seems to be very much entangled with eschatology or the end times. Haarp’s patent day is August 11th 1987. It will be exactly 32 years on august 11th 2019. The 32nd degree is the highest degree of initiation of the Scottish rite of freemasonry, the most used rite among the Jewish freemasons. It has 33 degrees, but the 33rd degree is the so called “honorary degree”, the masons in the 33rd degree are bestowed this kind of degree as a credit for what they have done for freemasonry in their life or even after they die. No higher initiation into any more “sacred knowledge”, the highest degree of initiation is the 32nd degree. The formation of AL-QAEDA was on 11.8.88 (1988). This year on August 11th 2019 it will be exactly 31 years. 31 is the 11th prime number and also 13 in reverse, 13 is the biblical number of rebellion. AL-QAEDA matches 58 in gematria (words matching this number will be named later on) and also 888 in gematria, matching DONALD J TRUMP, EMMANUEL MACRON, JESUS CROSS, DEUTSCHE BANK Also, 11.8, 1919 the new German constitution was adopted, founding the Weimar Republic. This act lead Germany shortly after the first world war and a downwards spiral of hyperinflation, consequently into a nazi overtake, and ultimately into the second world war. DONALD TRUMP With the connection of building the third temple in Jerusalem at this time, the third year of the reign of Donald Trump as the new “King Cyrus” (the third year of the reign of King Cyrus is being described in the bible), and along the fact this year being very, very important for the satanic rulers on its own, this year TISHA B´AV on August 10th-11th 2019 seems to be a quite probable date for some kind of event of 911 importance. The state of Israel just celebrated its 71st anniversary on May 14th this year. 88 days later we´ll come to August 10th, the beginning of TISHA B´AV. 88 is the symbolic number of Trump (the re-incarnated King Cyrus): ● Trump spent 88 million USD of his own money for his campaign ● Trump had 88 offices across the US during his presidential campaign ● Trump had 88 events or campaign stops during his campaign ● Trump had the number 88 on his podium everywhere he spoke during his campaign ● Trump had 88 military advisors, retired admirals and generals who supported him in his campaign ● Trump’s slogan “MAKE AMERICA GREAT AGAIN” equals 808 in numerology. For those who missed Christine Lagarde’s lecture on numerology, zeros are ignored in numerology ● Trump’s slogan “STRONGER TOGETHER” equals 88 in two gematria styles ● Trump’s cousin Thomas P. Trump , due to which Donald Trump was being mocked during his campaign, died exactly 1 year before Trump's inauguration day, 20. January 2016, 88 days before he would be 88. ● The movie Donnie Darko, predicting Trump's victory, where the main character kind of symbolizes Donald Trump, and the movie talks about time travel and the year 1988, is overloaded with the symbology of the number 88 ● The word “Trump” matches 88 in gematria in the „english ordinal“ style, the most basic numerology style, where A = 1 and Z = 26, DONALD J TRUMP equals 888 in english-sumarian style of gematria ● Trump’s mother, Mary Anne MacLeod, died when she was 88 years and 88 days old Donald Trump, in esoteric circles, is always compared to King Cyrus, or Cyrus the Great, the king of Persia, who released the Jews from the 70 years of captivity in Babylon, gave them back the city of Jerusalem and built a wall around it. Netanyhu even compares Trump to Cyrus. When Trump was selected the US president, the state of Israel started minting coins with the king Cyrus and President Trump together on one coin. If we just for a while accept the notion that Trump is the reincarnation of the King Cyrus, (now taking into account the fact they truly look alike…), we should also look at some potential other connections and similarities between these two leaders and maybe try to make some predictions of what might be happening in the near future… Now let’s look at the bible, New King James Version, Daniel 10: Daniel 10 New International Version (NIV) Daniel’s Vision of a Man 10 In the third year of Cyrus king of Persia, a revelation was given to Daniel (who was called Belteshazzar). Its message was true and it concerned a great war.[a] The understanding of the message came to him in a vision. 2 At that time I, Daniel, mourned for three weeks. 3 I ate no choice food; no meat or wine touched my lips; and I used no lotions at all until the three weeks were over. So now we are in the third year of Donald Trump (reincarnated Cyrus the Great???) presidency, who is compared to King Cyrus in many esoteric and historic aspects, and we are nearing the “three weeks of mourning.” The three weeks of mourning are between the 17th of Tammuz (when the walls were broken down, the breach was made, when they were coming over to take over the temple and siege Jerusalem) and Tisha B´Av (the destruction of the two temples, Solomon’s temple and Herod's temple), meaning this year, 2019, between July 21st and August 11th in the Gregorian calendar. August Eleventh is like 11.8.2019, or 11+8+20+19=58. 58 is the number very much connected to the freemasonry other occult or secret societies. Let's look at some words matching the number 58 in numerology: JERUSALEM, THIRD TEMPLE, SOLOMON’S TEMPLE (the 1st temple that got destroyed on Tisha B´Av), HEROD'S TEMPLE (the 2nd temple that was destroyed on Tisha B´Av), RED HEIFER, FREEMASONRY, ROSICRUCIAN, SECRET SOCIETY, SCOTTISH RITES, DOLLAR It is important to note that Donald Trump won the 58th presidential election in the USA, his inauguration date was 20.1.2017, 20+1+20+17=58, Trump Tower has 58 floors. Trump announced he would be running for candidacy from the 58th story of the Trump Tower. August 11th is 58 days after Donald Trump’s birthday (June 14th). Donald Trump was in Israel at the exact place where they plan to build the third temple, on May 22nd 2017 (another very ritualistic day for the freemasons), exactly 811 days before 8/11, or august 11th 2019. PREDICTIVE PROGRAMMING THE SIMPSONS: The episode “APOCALYPSE COW,” quite clearly symbolizing the RED HEIFER, (154 in gematria, matching TEMPLE MOUNT, RITUAL SACRIFICE). RED HEIFER, which birth was announced by the Temple institute in Israel on September 4th 2018, a day that leaves 118 days till the end of the year, later was celebrated in Israel on 9/11/2018. The date the Red Heifer was actually born is reportedly on August 28th 2018. August 28th 2018 is like 28.8./2018, or 2+8+8=18, 1+8=9, then the year 2018 is like 2+0+1+8=11, so hidden 9/11 in the date of the Red Heifer’s birth. The birth of the red heifer is a biblical sign of building the third temple, the third temple should be built at the time when the MESSIAH comes back to planet earth, the messiah is said to come back “through the Golden Gate”. The Simpsons’ “APOCALYPSE COW” is the episode 17, Season 19 (season 19, do they point to the year 19??? btw. „AUGUST 11“ is 19 in gematria matching CHAOS, and also equals 91 matching PHOENIX), episode 17 (1+7=8, do they point to the 8th month of the “season” or year 19?). “Apocalypse Cow” came out on April 27, 2008. 2008 was a leap year, so April 27th was the 118. (11.8.) day of the year. Again, it is 11 years ago when this cartoon was put out… THE GRIM REAPER There is a video of Grim Reaper standing in the dress of Satan next to the San Francisco Golden Gate bridge, nicely done predictive programming, this video came out July 24th 2018, exactly 1 year and 18 days before August 11th 2019. 1 year 18 days. We are dealing again with the predictive programming of 118… PACIFIC RIM In this movie, which is all about a tragic events and the main one is the destruction of the GOLDEN GATE BRIDGE IN SANFRANCISCO, it shows on the scene when the bridge is being destroyed the date August 11 2013, at 9:32am (923 and its variations are the new satanic code for some kind of tragedy events). Maybe just a coincidence… SAN FRANCISCO GOLDEN GATE BRIDGE It is said that the “third temple” should be built at the time the Messiah comes back. Also, the story says that the Messiah will come back through the “Golden Gate”. The Golden Gate Bridge in San Francisco kind of shares the name with the Golden Gate in Jerusalem. That is the eastern gate of the Temple Mount, where a divine presence used to appear and will appear again, when the Messiah comes, and a new gate replaces the present one. It is important to note that Donald Trump won the 58th presidential election in the US, but is actually the 45th president of the US, since some presidents made two terms. Let's look at some word or word connections having 45 in gematria: GOLDEN GATE, HOLY BIBLE, BRIDGE, MIKE PENCE, BITCOIN Now the current mayor of San Francisco is the 45th mayor of San Francisco, and she is turning 45 years old on August 11th 2019. Her name is London Breed. Lets look at the gematria of her name: LONDON BREED 54 (45 in reverse), 317 matching SATURN, MESIAH, BITCOIN, 216 (6X6X6), 33 The construction of the Golden Gate Bridge started on January 5th, 1933. 1/5/1933 is like 1+5+19+33=58 NUMEROLOGY It is important to note that numerology belongs to the esoteric science by which all the secret and occult societies are literally obsessed! Next to the geometry or mainly sacred geometry and architecture, math, astrotheology, it is fair to state that numerology is probably the most important one of all of the teachings in all of the mystic schools. It is not the right time now to explain why it is so, it is just important to note that it is a fact. The cabalists and high ranking members of secret societies are convinced that words with the same numeric values are having some kind of interconnection or kind of the same vibrational frequencies and therefore kind of a same meaning or purpose in this material world, or the matrix we are living in. The core of numerology is that these people believe that God created the world by merging the letters with the numbers and vice versa. So, let’s get technically into it and see some other correlations and predictive programming, since we know very well that the powers that should not be, according to the cosmic rule, HAVE TO ANNOUNCE THEIR PLANS IN ADVANCE, OTHERWISE IT WILL NOT COME TO FRUITION! If we are really talking about some event on a biblical scale, that could really be called 911 2.0, there really has to be something for those who have “eyes to see and ears to hear…” August 11th 2019 is like 11+8+20+19 = 58 Let’s look at some words matching the number 58 in numerology: JERUSALEM, THIRD TEMPLE, SOLOMON´S TEMPLE (the 1st temple that got destroyed on Tisha B´Av), HEROD’S TEMPLE (the 2nd temple that was destroyed on Tisha B´Av), RED HEIFER, FREEMASONRY, ROSICRUCIAN, SECRET SOCIETY, SCOTTISH RITES, DOLLAR, GREGORIAN, CALENDAR, ZODIAC, STARS This year the most significant freemasonic ritual was undoubtedly the burning of Notre Dame. Interestingly, the 15th of april, this ritualistic day, is exactly 118 days before August 11th, or before 11.8. Coincidently, april 15th, 15.4.2019 is like 15+4+20+19=58, the same value as August 11th 2019. There was also one other satanic ritual this year, the so called “Christchurch shooting.” It happened on the 15th of March 2019. The zip code for Christchurch is 8011 (8/11). Interestingly, 2 mosques were attacked by the shooting as well as two temples were destroyed on Tisha B´Av. Coincidently the word connection CHRISTCHURCH SHOOTING is 118 in „jewish reduction“ style of numerology. The Christchurch shooting happened on 15.3.2019 , it is like 15+3+20+19=57, the same as August 10th, or 10.8.2018, which is like 10+8+20+19=57, some other words matching 57 in numerology: JEWS, MOON. 11th of August is the 223rd day of the year. 223 is the symbolic number of SKULL AND BONES. There are some words and word connections matching 223 in gematria: THE SYNAGOGUE OF SATAN, MASONIC, GOLD AND SILVER STANDARD, GOLDEN GATE BRIDGE, NATURAL DISASTER, SAN FRANCISCO BRIDGE, LET HIM WHO THAT HATH UNDERSTANDING COUNT THE NUMBER OF THE BEAST. On May 14th, 2019, the state of Israel has celebrated the 71st birthday. Words like TEMPLE, TALMUD equals 71 in numerology. May 14th is the 134. day of the year. Some words matching 134 in numerology: TISHA B´AV, NINTH OF AV (the same as TISHA B´AV), NETANYAHU. From august 11th till the Netanyahu’s birthday on October 21st is exactly 71 days. The major satanic ritual of this century was undoubtedly 9/11, or September 11th, 2001. From that day till August 11th 2019 it is exactly 17 years and 11 months. In numerology, the master number 11 and its multiples do not get reduced, the other numbers can be reduced. 17 years and 11 days. 1+7/11 is like 8 and 11 to the day 8/11. The word DEATH equals 118 in “JEWISH” style of gematria. 222 CONCLUSION You may have read all that and just think I am crazy. But there are a lot of people who put a lot of work into decoding these things and it is very interesting information. So, will something major occur on August 10th or 11th? And, if so, what will it be? I’ll leave that up to you to ponder on but there is enough evidence pointing to those dates that I felt I should at least make you aware of it. Other dates that have similar programming include September 23rd and/or November 23rd. I’ll keep an eye on those dates as well but we are thinking those dates are more likely to be of importance in 2022 or 2023. This is all just information. Do with it what you wish. But, as I said, at the very least it is very interesting! Source:https://dollarvigilante.com/wp-content/uploads/2019/07/JULY-2019-Dispatch-PREMIUM.pdf
“We only have public keys in hashed form published. Even quantum computers can't reverse the Hash, so no one can use those public keys to derive the private key. That's why we are quantum resistant.” This is incorrect.
This example has been explained in the previous article. To summarize: Hashed public keys can be used as an address for deposits. Deposits do not need signature authentication. Alternatively, withdrawals do need signature authentication. To authenticate a signature, the public key will always need to be made public in full, original form. As a necessary requirement, the full public key would be needed to spend coins. Therefore the public key will be included in the transaction. The most famous blockchain to use hashed public keys is Bitcoin. Transactions can be hijacked during the period a user sends a transaction from his or her device to the blockchain and the moment a transaction is confirmed. For example: during Bitcoins 10 minute blockchain, the full public keys can be obtained to find private keys and forge transactions. Page 8, point 3 Hashing public keys does have advantages: they are smaller than the original public keys. So it does save space on the blockchain. It doesn't give you Quantum Resistance however. That is a misconception.
“Besides having only hashed public keys on the blockchain, we also have instant transactions. So there is no time to hijack a transaction and to obtain the public key fast enough to forge a transaction. That's why we are quantum resistant.” This is incorrect and impossible.
There is no such thing as instant transactions. A zero second blocktime for example is a claim that can’t be made. Period. Furthermore, transactions are collected in pools before they are added to a block that is going to be processed. The time it takes for miners to add them to a new block before processing that block depends on the amount of transactions a blockchain needs to process at a certain moment. When a blockchain operates within its maximum capacity (the maximum amount of transactions that a blockchain can process per second), the adding of transactions from the pool will go quite swiftly, but still not instantaneously. However, when there is high transaction density, transactions can be stuck in the pool for a while. During this period the transactions are published and the full public keys can be obtained. Just as with the previous hijacking example, a transaction can be forged in that period of time. It can be done when the blockchain functions normally, and whenever the maximum capacity is exceeded, the window of opportunity grows for hackers. Besides the risk that rush hours would bring by extending the time to work with the public key and forge transactions, there are network based attacks that could serve the same purpose: slow the confirmation time and create a bigger window to forge transactions. These types are attacks where the attacker targets the network instead of the sender of the transaction: Performing a DDoS attack or BGP routing attack or NSA Quantum Insert attack on a peer-to-peer network would be hard. But when provided with an opportunity to earn billions, hackers would find a way. For example: https://bitcoinmagazine.com/articles/researchers-explore-eclipse-attacks-ethereum-blockchain/ For BTC: https://eprint.iacr.org/2015/263.pdf An eclipse attack is a network-level attack on a blockchain, where an attacker essentially takes control of the peer-to-peer network, obscuring a node’s view of the blockchain. That is exactly the recipe for what you would need to create extra time to find public keys and derive private keys from them. Then you could sign transactions of your own and confirm them before the originals do. This specific example seems to be fixed now, but it most definitely shows there is a risk of other variations to be created. Keep in mind, before this variation of attack was known, the common opinion was that it was impossible. With little incentive to create such an attack, it might take a while until another one is developed. But when the possession of full public keys equals the possibility to forge transactions, all of a sudden billions are at stake.
“Besides only using hashed public keys as addresses, we use the First In First Out (FIFO) mechanism. This solves the forged transaction issue, as they will not be confirmed before the original transactions. That's why we are quantum resistant.” This is incorrect.
There is another period where the public key is openly available: the moment where a transaction is sent from the users device to the nodes on the blockchain network. The sent transaction can be delayed or totally blocked from arriving to the blockchain network. While this happens the attacker can obtain the public key. This is a man-in-the-middle (MITM) attack. A MITM is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. No transaction is 100% safe from a MITM attack. This type of attack isn’t commonly known amongst average usergroups due to the fact communication is done either encrypted or by the use of private- public key cryptography. Therefore, at this point of time MITM attacks are not an issue, because the information in transactions is useless for hackers. To emphasize the point made: a MITM attack can be done at this point of time to your transactions. But the information obtained by a hacker is useless because he can not break the cryptography. The encryption and private- public key cryptography is safe at this point of time. ECDSA and RSA can not be broken yet. But in the era of quantum computers the problem is clear: an attacker can obtain the public key and create enough time to forge a transaction which will be sent to the blockchain and arrive there first without the network having any way of knowing the transaction is forged. By doing this before the transaction reaches the blockchain, FIFO will be useless. The original transaction will be delayed or blocked from reaching the blockchain. The forged transaction will be admitted to the network first. And First In First Out will actually help the forged transaction to be confirmed before the original.
“Besides having only hashed public keys, we use small standardized fees. Forged transactions will not be able to use higher fees to get prioritized and confirmed before the original transactions, thus when the forged transaction will try to confirm the address is already empty. This is why we are quantum resistant.” This is incorrect.
The same arguments apply as with the FIFO system. The attack can be done before the original transaction reaches the network. Thus the forged transaction will still be handled first no matter the fee hight.
“Besides the above, we use multicast so all nodes receive the transaction at the same time. That's why we are quantum resistant.” This is incorrect.
Multicast is useless against a MITM attack when the attacker is close enough to the source.
“Besides the above, we number all our transactions and authenticate nodes so the user always knows who he's talking to. That's why we are quantum resistant.” This is incorrect.
Besides the fact that you’re working towards a centralized system if only verified people can become nodes. And besides the fact that also verified nodes can go bad and work with hackers. (Which would be useless if quantum resistant signature schemes would be implemented because a node or a hacker would have no use for quantum resistant public keys and signatures.) There are various ways of impersonating either side of a communication channel. IP-spoofing, ARP-spoofing, DSN-spoofing etc. All a hacker needs is time and position. Time can be created in several ways as explained above. All the information in the transaction an original user sends is valid. When a transaction is hijacked and the communication between the user and the rest of the network is blocked, a hacker can copy that information to his own transaction while using a forged signature. The only real effective defense against MITM attacks can be done on router or server-side by a strong encryption between the client and the server (Which in this case would be quantum resistant encryption, but then again you could just as well use a quantum resistant signature scheme.), or you use server authentication but then you would need that to be quantum resistant too. There is no serious protection against MITM attacks when the encryption of the data and the authentication of a server can be broken by quantum computers. Only quantum resistant signature schemes will secure blockchain to quantum hacks. Every blockchain will need their users to communicate their public key to the blockchain to authenticate signatures and make transactions. There will always be ways to obtain those keys while being communicated and to stretch the period where these keys can be used to forge transactions. Once you have, you can move funds to your own address, a bitcoin mixer, Monero, or some other privacy coin. Conclusion There is only one way to currently achieve Quantum Resistance: by making sure the public key can be made public without any risks, as is done now in the pre-quantum period and as Satoshi has designed blockchain. Thus by the use of quantum resistant signature schemes. The rest is all a patchwork of risk mitigation and delaying strategies; they make it slightly harder to obtain a public key and forge a transaction but not impossible. Addition And then there is quite often this strategy of postponing quantum resistant signature schemes
“Instead of ECDSA with 256 bit keys we will just use 384 bit keys. And after that 521 bit keys, and then RSA 4096 keys, so we will ride it out for a while. No worries we don’t need to think about quantum resistant signature schemes for a long time.” This is highly inefficient, and creates more problems than it solves.
Besides the fact that this doesn’t make a project quantum resistant, it is nothing but postponing the switch to quantum resistant signatures, it is not a solution. Going from 256 bit keys to 384 bit keys would mean a quantum computer with ~ 3484 qubits instead of ~ 2330 qubits could break the signature scheme. That is not even double and postpones the problem either half a year or one year, depending which estimate you take. (Doubling of qubits every year, or every two years). It does however have the same problems as a real solution and is just as much work. (Changing the code, upgrading the blockchain, finding consensus amongst the nodes, upgrading all supporting systems, hoping the exchanges all go along with the new upgrade and migrate their coins, heaving all users migrate their coins.) And then quite soon after that, they'll have to go at it again. What they will do next? Go for 512 bit curves? Same issues. It's just patchworks and just as much hassle, but then over and over again for every “upgrade” from 384 to 521 etc. And every upgrade the signatures get bigger, and closer to the quantum resistant signature sizes and thus the advantage you have over blockchains with quantum resistant signature schemes gets smaller. While the quantum resistant blockchains are just steady going and their users aren’t bothered with all the hassle. At the same time the users of the blockchain that is constantly upgrading to a bigger key size, keep on needing to migrate their coins to the new and upgraded addresses to stay safe.
3 It explains our intuition that human beings, but not lower animals, have free will. Lower animals lack free will because they lack the second-order volitions which are constitutive of free will. (This item is unnecessary and probably not true; how do we know animals have no "second-order volitions"? Having no other language than "body", we can only surmise (guess) what their volitions are. Volitions come before actions, we cannot see them or interpret them in any way. Brain conditions might be interpreted with MRI scanning, but to put a subject in a scanning device is to prevent any other actions. Such measuring ruins the connection between mental state and volition being measured, except we can safely assume that every measurement of animals must default to the volition to escape the measuring device.)
That's the first-order, highlighted deviation from compatibility theory. Clarification of "second-order volition": a path from choice to action has an intermediate "middle-way" tunneling mode, contracting (taking on) a desire to make a choice, prior to making the choice. In order to prove freedom, one must establish the mental preference for an imagined outcome in order to prove that preference did come from within the person and was not forced by other external deciding factors (genetic factors are pre-determined). incompatibilism Note: the approach is wrong by the universal assumption, IOW that the intersection of determined and free is zero. It's a supremacy position, or superposition principle (LoL), the error is in over-simplification. The Logic Argument (p.5) is not representative of reality, which is more nuanced. Therefore, Frankfurt's thesis is good (denial of incompatibilism), but not due to the case presented (superposition). Take Frankfurt's case (p.4) of Black vs Jones4 to be analogy for State vs Individual. Silent Weapons for Quiet Wars (other sources exist, search for yourself) The (myusername) determinism/free-will duality hypothesis (denial of incompatibilism due to non-zero intersection):
Most choices, including the choice of desires, are determined by contingencies of which one is the natural desire of the actor to optimize his/her outcomes ("best wishes"). Is a person always compelled to have best wishes? What is best depends on a person's mental state, which is usually determined by external factors, but those can vary in cogency (impact on behavior). Consider the choice to commit suicide, certainly not a trivial choice. (The Chosen means of execution (puns intended) is somewhat more trivial, but again, partly determined by external conditions.)
Some choices, nearly all trivial, are free because no interfering contingencies are apparent during the choosing interlude. It may happen in hindsight, that a past choice is observed to be a mistake, usually because some contingency was overlooked or unknown during the choosing. This observation should be remembered so as to avoid repeating a future choice like that mistake. Choices always have risks, including the choice to do nothing. Different day, slightly different approach... parsing choice. 1 important choices that have many deep effects later, for instances a marriage partner, a new job, a new residence; 2 trivial choices which have minor effects, risks or physical involvement, for instances a choice of toothpaste at the market, to like or not a web-link or museum exhibit. According to (myusername)'s determined/free paradigm, type 1 choices are nearly all determined by pre-existing conditions (not free). Type 2 choice is the arena of freedom. I suppose a person's low risk-aversion parameter could expand the envelope of freedom, but that's a characteristic that develops during maturation, one's history of choices and ensuing responses. Successful responses lead to more freedom, failures to less. So even when freedom exists, it accumulates a history (habits) which become a determinant. Contracting the Social Construct Disorder (it's contagious) Take 1: How does an actor (person in question who comes to an internal state, or inner-construct) interact with a community or society? Must it be IRL, or can virtual interaction suffice to construct internal states? And more to my point, must the interaction be two-way (containing feedback), or simply via broadcast medium? (broadcast includes published books, articles, records, radio, TV or Internet A/V shows, etc.) Interaction with broadcast media can be summarized by: a choice, a degree of attention and focus (time spent on and attention given to item), a like/dislike or more complex reaction to item, having future behavior influenced by item, to continue a stream of behaviors (especially sequential item choices) as consequence of influence of item, to develop a complex of attitudes built upon stream of items (eg. just mentioned 'risk aversion parameter and habit). Before going on, I notice that broadcast media is like Sunshine, Rain, and Grace. It is made available by participation in a community, and falls without curse or blessing, it's all there for the choosing (or ignoring), depending on the contingencies. Mind control theory? (because mind is the inner source of volition... behavior, control the mind (easy), hence control the behaviors (difficult otherwise)) Mind control courtesy Tavistock Inst. Construction of Favor (or any knowledge) upon Familiarity What is Social Construction? (cntrlZ)
"For instance, trees are only differentiated from other plants by virtue of the fact that we have all learned to see them as "trees."
But we don't all know about trees to an equal degree. I know rather much about trees from my interaction with them: living among them, planting them, sawing them, moving them, burning them, etc., not from reading or talking about them. No doubt, there are many persons all over the world who have very little experience of trees, and cannot 'construct' treeness as well as me. Direct experience is more realistic and developed than social constructs. Favor and Familiarity are interwoven by choice I chose to live alone with trees and not alone with sea, or desert (for examples), because it was easier to go with trees. Was the choice free? I could have chosen city or suburb with even more ease than forest, so ease of choice was not the deciding factor, it was my preference of lonely forest over crowded urb that decided me. So maybe it wasn't really about trees, it was about independence or something else like that. When we choose, we may not understand the contingencies, but our decision (choice) may be due to habits or patterns that have developed in the maturity process. Habits are strong determinants, and they develop, according to Ian Plowman, 4 ways. The cntrlZ article makes the case for 'Strong Social Construction' based on that 'knowing' which is all about language, certainly a social construct.
Within the social construction of language is the game. Outside the social construction is reality, the real world. (a list of social constructs follows)
That makes it clear. Experiences (direct ones) without resort to language are NOT social constructs. That observation makes another distinction clear: gender may be a social construct, as it's a language issue, but sex is not a social construct, it is a direct experience issue that develops in the maturation process: birth, infant, child, puberty, sexy adolescent, sexy adult, old (unsexy) adult, death. Prior to puberty, sex is incipient in its development, but comes to life, (like a flower blooms) after a decade or so. Knowing about sex as a child is by observation from outside (thru the looking glass), after puberty, it's direct experience, and much later, it's a fading memory. Regarding Looking-glass self theory the notion of socially constructed identity (defining the self by differences/ affinities to others),
... the outcome of "taking the role of the other", the premise for which the self is actualized. Through interaction with others, we begin to develop an identity of our own as well as developing a capacity to empathize with others... Therefore, the concept of self-identity may be considered an example of a social construction.
... makes a spurious expansion of identity formation to include everyone (a unity), or nearly so. According to Reisman's Lonely Crowd, there is a triality of social nature, expounded by parsing people into tradition, inner, and other directed personalities. This theme was a scholar's response to the US trend toward consumerism and conformity to "norms", (local traditions, eg. "keeping up with the Joneses") mid-20th century. The social construct crowd would be Reisman's Other directed personality, which may truly be the majority, in USA certainly. However, the tradition-following and inner-directed personalities are a significant minority. Let's not ignore them (I'm in there.) What is “Mob Mentality?” Herd mentality | wkpd Are All Personality Descriptions Social Constructions? Sep.2019 | psytdy
... that objective reality does not directly reveal itself to us, is true beyond a doubt.
The preceding statement author, JA Johnson, is way off (and his article is full of falseness). Objective reality IS direct experience, no more revealing modality exists. Denial of this obvious fact (just lied about above) is a redefinition of the term (a social construct). Experience is beyond language, thus beyond 'description'. However the following is a true reveal about (((Yews))) (the like of whom Dr. Johnson seems):
It is true that when we describe someone with socially undesirable traits... we are constructing for them a social reputation that might decrease their chance of success in life. This is precisely one of the concerns of (((social constructivists, like Dr. Johnson))), that certain categorizations (eg. a separate race) reduce power and status.
Favor-Goodness-Beauty paradigm Favor is not favored in prior art, Truth takes Favor's place in the Transcendental Spectrum: Transcendentals 5pg.pdf We have already seen the idea in part 1 that Truth is a disputed transcendental in the social-constructionism academic universe. Academics use the "universal fallacy" that their favored item is part of an incompatible pair, which by logic excludes everything not in their favor. They want to ignore the nuances in order to push an ideology toward a supremacy of thinking, just like in a totalitarian state. Whereas the (myusername) principle of Truth, it has a dual nature, 1 relative to a society (democratic consensus); and 2 absolute to reality (math/science/technology). So 'Favor' is a better term because objective proof (no contest) is not required (except the meaning of objective that says 'objection!', meaning 'contest'). 'Favor' implies bias which is the subjective reaction that matches Goodness and Beauty better than 'Truth'. Apply Truth-Goodness-Beauty paradigm to social construction
because the aim of constructionists is to justify a collective "truth" of their own construction. A social construct is not absolute, it's anything a society wants it to be ("social proof"). That's a good description of tyranny... The Empowered Female Parasite 2014 (that's a surprising result, here is one not-surprising.) Social Proof: established by culture media (mind control, a monopoly 2012 (scroll down long graphic), of the Juice 2015), go back to part 1, macrosocial constructs. Does Appreciation of Beauty have any innate sources? (otherwise it's all a social construct) Neuroscience of Beauty; How does the brain appreciate art? 2011 | sciam (in brain) Onward (Dis)-Favor Readers... Investigation of (Dis-)Favor 3\3, House of Not-Friends Contracting the Social Construct Disorder Take 2 Living outside the 'Normitory" (away from Dreamland (everybody's asleep), to where Nessun Dorma (nobody sleeps)) It so happens that an ethnic group which originated in eastern Mediterranean Middle-East evolved to specialize in intelligence, commerce, morally corrupt enterprises, and crime. Essential to their success was eugenic traditions that applied artificial selection to just those same specialties, which makes this ethnic group a formidable enemy. They have developed a very strong sense of in-groupness, and a vested interest in social construct studies. A unified collective is a more effective competitor than an inchoate population of diverse individuals. This group has as ethnic traits: global dispersion (aka Diaspora), preference for urban environments (aka Cosmopolitan, or Globalist), covert inter-group rivalry (aka InfoWar), and deception (aka MOSSAD). This cosmopolitan group must operate covertly and deceptively, because those are effective tactics, and they are a small minority (2% of USA), therefore weak in the democratic sense. Immoral Social Constructs enforced by 5th column subversives
There is no universal morality. Morality is much like Beauty, in the mind of beholder (actor who holds to a specific moral code). Morality is a social construct, and varies between societies. (I think a fair definition of morality is a code of ethics which is community-specific.) For a society to sustain, it needs to be isolate from conflicting societies. If different societies, with different moralities must coexist, the natural tendency for actors in the same niche toward dominance will destroy or remake the subordinate societies, which reduces the conflicts. Status Hierarchies: Do We Need Them? blog 2012 | psytd
a need for 'virtue signaling'? It's natural, and likely unavoidable, evidence pride displays.
What defines a good IoT project? Defining this will help us understand what some of the problems they might struggle with and which projects excel in those areas. IoT will be a huge industry in the coming years. The true Internet 3.0 will be one of seamless data and value transfer. There will be a tremendous amount of devices connected to this network, from your light bulbs to your refrigerator to your car, all autonomously transacting together in an ever growing network in concert, creating an intelligent, seamless world of satisfying wants and needs. . Let’s use the vastness of what the future state of this network is to be as our basis of what makes a good project. . Scalability In that future we will need very high scalability to accommodate the exponential growth in transaction volume that will occur. The network doesn’t need to have the ability to do high transactions per second in the beginning, just a robust plan to grow that ability as the network develops. We’ve seen this issue already with Bitcoin on an admittedly small market penetration. If scaling isn’t a one of the more prominent parts of your framework, that is a glaring hole. . Applicability Second to scalability is applicability. One size does not fit all in this space. Some uses will need real-time streaming of data where fast and cheap transactions are key and others will need heavier transactions full of data to be analyzed by the network for predictive uses. Some uses will need smart contracts so that devices can execute actions autonomously and others will need the ability to encrypt data and to transact anonymously to protect the privacy of the users in this future of hyper-connectivity. We cannot possibly predict the all of the future needs of this network so the ease of adaptability in a network of high applicability is a must. . Interoperability In order for this network to have the high level of applicability mentioned, it would need to have access to real world data outside of it’s network to work off of or even to transact with. This interoperability can come in several forms. I am not a maximalist, thinking that there will be one clear winner in any space. So it is easy, therefore, to imagine that we would want to be able to interact with some other networks for payment/settlement or data gathering. Maybe autonomously paying for bills with Bitcoin or Monero, maybe smart contracts that will need to be fed additional data from the Internet or maybe even sending an auto invite for a wine tasting for the wine shipment that’s been RFID’d and tracked through WTC. In either case, in order to afford the highest applicability, the network will need the ability to interact with outside networks. . Consensus How the network gains consensus is often something that is overlooked in the discussion of network suitability. If the network is to support a myriad of application and transaction types, the consensus mechanism must be able to handle it without choking the network or restricting transaction type. PoW can become a bottleneck as the competition for block reward requires an increase in difficulty for block generation, you therefore have to allow time for this computation in between blocks, often leading to less than optimal block times for fast transactions. This can create a transaction backlog as we have seen before. PoS can solve some of these issues but is not immune to this either. A novel approach to gaining consensus will have to be made if it is going to handle the variety and volume to be seen. . Developability All of this can be combined to create a network that is best equipped to take on the IoT ecosystem. But the penetration into the market will be solely held back by the difficulty in connecting and interacting with the network from the perspective of manufacturers and their devices. Having to learn a new code language in order to write a smart contract or create a node or if there are strict requirements on the hardware capability of the devices, these are all barriers that make it harder and more expensive for companies to work with the network. Ultimately, despite how perfect or feature packed your network is, a manufacturer will more likely develop devices for those that are easy to work with. . In short, what the network needs to focus on is: -Scalability – How does it globally scale? -Applicability – Does it have data transfer ability, fast, cheap transactions, smart contracts, privacy? -Interoperability – Can it communicate with the outside world, other blockchains? -Consensus – Will it gain consensus in a way that supports scalability and applicability? -Developability – Will it be easy for manufactures to develop devices and interact with the network? . . The idea of using blockchain technology to be the basis of the IoT ecosystem is not a new idea. There are several projects out there now that are aiming at tackling the problem. Below you will see a high level breakdown of those projects with some pros and cons from how I interpret the best solution to be. You will also see some supply chain projects listed below. Supply chain solutions are just small niches in the larger IoT ecosystem. Item birth record, manufacturing history, package tracking can all be “Things” which the Internet of Things track. In fact, INT already has leaked some information hinting that they are cooperating with pharmaceutical companies to track the manufacture and packaging of the drugs they produce. INT may someday include WTC or VEN as one of its subchains feeding in information into the ecosystem. . . IOTA IOTA is a feeless and blockchain-less network called a directed acyclic graph. In my opinion, this creates more issues than it fixes. The key to keeping IOTA feeless is that there are no miners to pay because the work associated with verifying a transaction is distributed to among all users, with each user verifying two separate transactions for their one. This creates some problems both in the enabling of smart contracts and the ability to create user privacy. Most privacy methods (zk-SNARKs in specific) require the one doing the verifying to use computationally intensive cryptography which are outside the capability of most devices on the IoT network (a weather sensor isn’t going to be able to build the ZK proof of a transaction every second or two). In a network where the device does the verifying of a transaction, cryptographic privacy becomes impractical. And even if there were a few systems capable of processing those transactions, there is no reward for doing the extra work. Fees keep the network safe by incentivizing honesty in the nodes, by paying those who have to work harder to verify a certain transaction, and by making it expensive to attack the network or disrupt privacy (Sybil Attacks). IOTA also doesn’t have and may never have the ability to enable smart contracts. By the very nature of the Tangle (a chain of transactions with only partial structure unlike a linear and organized blockchain), establishing the correct time order of transactions is difficult, and in some situations, impossible. Even if the transactions have been time stamped, there is no way to verify them and are therefore open to spoofing. Knowing transaction order is absolutely vital to executing step based smart contracts. There does exist a subset of smart contracts that do not require a strong time order of transactions in order to operate properly. But accepting this just limits the use cases of the network. In any case, smart contracts will not be able to operate directly on chain in IOTA. There will need to be a trusted off chain Oracle that watches transactions, establishes timelines, and runs the smart contract network . -Scalability – High -Applicability – Low, no smart contracts, no privacy, not able to run on lightweight devices -Interoperability – Maybe, Oracle possibility -Consensus – Low, DAG won’t support simple IoT devices and I don’t see all devices confirming other transactions as a reality -Developability – To be seen, currently working with many manufacturers . . Ethereum Ethereum is the granddaddy of smart contract blockchain. It is, arguably, in the best position to be the center point of the IoT ecosystem. Adoption is wide ranging, it is fast, cheap to transact with and well known; it is a Turing complete decentralized virtual computer that can do anything if you have enough gas and memory. But some of the things that make it the most advanced, will hold it back from being the best choice. Turing completeness means that the programming language is complete (can describe any problem) and can solve any problem given that there is enough gas to pay for it and enough memory to run the code. You could therefore, create an infinite variety of different smart contracts. This infinite variability makes it impossible to create zk-SNARK verifiers efficiently enough to not cost more gas than is currently available in the block. Implementing zk-SNARKs in Ethereum would therefore require significant changes to the smart contract structure to only allow a small subset of contracts to permit zk-SNARK transactions. That would mean a wholesale change to the Ethereum Virtual Machine. Even in Zcash, where zk-SNARK is successfully implemented for a single, simple transaction type, they had to encode some of the network’s consensus rules into zk-SNARKs to limit the possible outcomes of the proof (Like changing the question of where are you in the US to where are you in the US along these given highways) to limit the computation time required to construct the proof. Previously I wrote about how INT is using the Double Chain Consensus algorithm to allow easy scaling, segregation of network traffic and blockchain size by breaking the network down into separate cells, each with their own nodes and blockchains. This is building on lessons learned from single chain blockchains like Bitcoin. Ethereum, which is also a single chain blockchain, also suffers from these congestion issues as we have seen from the latest Cryptokitties craze. Although far less of an impact than that which has been seen with Bitcoin, transaction times grew as did the fees associated. Ethereum has proposed a new, second layer solution to solve the scaling issue: Sharding. Sharding draws from the traditional scaling technique called database sharding, which splits up pieces of a database and stores them on separate servers where each server points to the other. The goal of this is to have distinct nodes that store and verify a small set of transactions then tie them up to a larger chain, where all the other nodes communicate. If a node needs to know about a transaction on another chain, it finds another node with that information. What does this sound like? This is as close to an explanation of the Double Chain architecture as to what INT themselves provided in their whitepaper. . -Scalability – Neutral, has current struggles but there are some proposals to fix this -Applicability – Medium, has endless smart contract possibilities, no privacy currently with some proposals to fix this -Interoperability – Maybe, Oracle possibility -Consensus – Medium, PoW currently with proposals to change to better scaling and future proofing. -Developability – To be seen . . IoTeX A young project, made up of several accredited academics in cryptography, machine learning and data security. This is one of the most technically supported whitepapers I have read.They set out to solve scalability in the relay/subchain architecture proposed by Polkadot and used by INT. This architecture lends well to scaling and adaptability, as there is no end to the amount of subchains you can add to the network, given node and consensus bandwidth. The way they look to address privacy is interesting. On the main parent (or relay) chain, they plan on implementing some of the technology from Monero, namely, ring signatures, bulletproofs and stealth addresses. While these are proven and respected technologies, this presents some worries as these techniques are known to not be lightweight and it takes away from the inherent generality of the core of the network. I believe the core should be as general and lightweight as possible to allow for scaling, ease of update, and adaptability. With adding this functionality, all data and transactions are made private and untraceable and therefore put through heavier computation. There are some applications where this is not optimal. A data stream may need to be read from many devices where encrypting it requires decryption for every use. A plain, public and traceable network would allow this simple use. This specificity should be made at the subchain level. Subchains will have the ability to define their needs in terms of block times, smart contracting needs, etc. This lends to high applicability. They address interoperability directly by laying out the framework for pegging (transaction on one chain causing a transaction on another), and cross-chain communication. They do not address anywhere in the whitepaper the storage of data in the network. IoT devices will not be transaction only devices, they will need to maintain data, transmit data and query data. Without the ability to do so, the network will be crippled in its application. IoTeX will use a variation of DPoS as the consensus mechanism. They are not specific on how this mechanism will work with no talk of data flow and node communication diagram. This will be their biggest hurdle and why I believe it was left out of the white paper. Cryptography and theory is easy to elaborate on within each specific subject but tying it all together, subchains with smart contracts, transacting with other side chains, with ring signatures, bulletproofs and stealth addresses on the main chain, will be a challenge that I am not sure can be done efficiently. They may be well positioned to make this work but you are talking about having some of the core concepts of your network being based on problems that haven’t been solved and computationally heavy technologies, namely private transactions within smart contracts. So while all the theory and technical explanations make my pants tight, the realist in me will believe it when he sees it. . -Scalability – Neutral to medium, has the framework to address it with some issues that will hold it back. -Applicability – Medium, has smart contract possibilities, privacy baked into network, no data framework -Interoperability – Medium, inherent in the network design -Consensus – Low, inherent private transactions may choke network. Consensus mechanism not at all laid out. -Developability – To be seen, not mentioned. . . CPChain CPC puts a lot of their focus on data storage. They recognize that one of the core needs of an IoT network will be the ability to quickly store and reference large amounts of data and that this has to be separate from the transactional basis of the network as to not slow it down. They propose solving this using distributed hash tables (DHT) in the same fashion as INT, which stores data in a decentralized fashion so no one source owns the complete record. This system is much the same as the one used by BitTorrent, which allows data to be available regardless of which nodes will be online at a given time. The data privacy issue is solved by using client side encryption with one-to-many public key cryptography allowing many devices to decrypt a singly encrypted file while no two devices share the same key. This data layer will be run on a separate, parallel chain as to not clog the network and to enable scalability. In spite of this, they don’t discuss how they will scale on the main chain. In order to partially solve this, it will use a two layer consensus structure centered on PoS to increase consensus efficiency. This two layer system will still require the main layer to do the entirety of the verification and block generation. This will be a scaling issue where the network will have no division of labor to segregate congestion to not affect the whole network. They do recognize that the main chain would not be robust or reliable enough to handle high frequency or real-time devices and therefore propose side chains for those device types. Despite this, they are adding a significant amount of functionality (smart contracts, data interpretation) to the main chain instead of a more general and light weight main chain, which constrains the possible applications for the network and also makes it more difficult to upgrade the network. So while this project, on the surface level (not very technical whitepaper), seems to be a robust and well thought out framework, it doesn’t lend itself to an all-encompassing IoT network but more for a narrower, data centric, IoT application. . -Scalability – Neutral to medium, has the framework to address it somewhat, too much responsibility and functionality on the main chain may slow it down. -Applicability – Medium, has smart contract possibilities, elaborate data storage solution with privacy in mind as well has high frequency applications thought out -Interoperability – Low, not discussed -Consensus – Low to medium, discussed solution has high reliance on single chain -Developability – To be seen, not mentioned. . . ITC The whitepaper reads like someone just grabbed some of the big hitters in crypto buzzword bingo and threw them in there and explained what they were using Wikipedia. It says nothing about how they will tie it all together, economically incentivize the security of the network or maintain the data structures. I have a feeling none of them actually have any idea how to do any of this. For Christ sake they explain blockchain as the core of the “Solutions” portion of their whitepaper. This project is not worth any more analysis. . . RuffChain Centralization and trust. Not very well thought out at this stage. DPoS consensus on a single chain. Not much more than that. . . WaltonChain Waltonchain focuses on tracking and validating the manufacture and shipping of items using RFID technology. The structure will have a main chain/subchain framework, which will allow the network to segregate traffic and infinitely scale by the addition of subchains given available nodes and main chain bandwidth. DPoST (Stake & Trust) will be the core of their consensus mechanism, which adds trust to the traditional staking structure. This trust is based on the age of the coins in the staker’s node. The longer that node has held the coins, combined with the amount of coins held, the more likely that node will be elected to create the block. I am not sure how I feel about this but generally dislike trust. Waltonchain's framework will also allow smart contracts on the main chain. Again, this level of main chain specificity worries me at scale and difficulty in upgrading. This smart contract core also does not lend itself to private transactions. In this small subset of IoT ecosystem, that does not matter as the whole basis of tracking is open and public records. The whitepaper is not very technical so I cannot comment to their technical completeness or exact implementation strategy. This implementation of the relay/subchain framework is a very narrow and under-utilized application. As I said before, WTC may someday just be one part of a larger IoT ecosystem while interacting with another IoT network. This will not be an all-encompassing network. . -Scalability – High, main/subchain framework infinitely scales -Applicability – Low to medium, their application is narrow -Interoperability – Medium, the framework will allow it seamlessly -Consensus – Neutral, should not choke the network but adds trust to the equation -Developability – N/A, this is a more centralized project and development will likely be with the WTC . . VeChain \*Let me preface this by saying I realize there is a place for centralized, corporatized, non-open source projects in this space.* Although I know this project is focused mainly on wider, more general business uses for blockchain, I was requested to include it in this analysis. I have edited my original comment as it was more opinionated and therefore determined not to be productive to the conversation. If you would like to get a feel for my opinion, the original text is in the comments below.\** This project doesn't have much data to go off as the white paper does not contain much technical detail. It is focused on how they are positioning themselves to enable wider adoption of blockchain technology in the corporate ecosystem. They also spend a fair amount of time covering their node structure and planned governance. What this reveals is a PoS and PoA combined system with levels of nodes and related reward. Several of the node types require KYC (Know Your Customer) to establish trust in order to be part of the block creating pool. Again there is not much technically that we can glean from this whitepaper. What is known is that this is not directed at a IoT market and will be a PoS and PoA Ethereum-like network with trusted node setup. I will leave out the grading points as there is not enough information to properly determine where they are at. . . . INT So under this same lens, how does INT stack up? INT borrows their framework from Polkadot, which is a relay/subchain architecture. This framework allows for infinite scaling by the addition of subchains given available nodes and relay chain bandwidth. Custom functionality in subchains allows the one setting up the subchain to define the requirements, be it private transactions, state transaction free data chain, smart contracts, etc. This also lends to endless applicability. The main chain is inherently simple in it’s functionality as to not restrict any uses or future updates in technology or advances. The consensus structure also takes a novel two-tiered approach in separating validating from block generation in an effort to further enable scaling by removing the block generation choke point from the side chains to the central relay chain. This leaves the subchain nodes to only validate transactions with a light DPoS allowing a free flowing transaction highway. INT also recognizes the strong need for an IoT network to have robust and efficient data handling and storage. They are utilizing a decentralize storage system using DHT much like the BitTorrent system. This combined with the network implementation of all of the communication protocols (TCP/IP, UDP/IP, MANET) build the framework of a network that will effortlessly integrate any device type for any application. The multi-chain framework easily accommodates interoperability between established networks like the Internet and enables pegging with other blockchains with a few simple transaction type inclusions. With this cross chain communication, manufactures wouldn’t have to negotiate their needs to fit an established blockchain, they could create their own subchain to fit their needs and interact with the greater network through the relay. The team also understands the development hurdles facing the environment. They plan to solve this by standardizing requirements for communication and data exchange. They have heavy ties with several manufacturers and are currently developing a IoT router to be the gateway to the network. . -Scalability – High, relay/subchain framework enables infinite scalability -Applicability – High, highest I could find for IoT. Subchains can be created for every possible application. -Interoperability – High, able to add established networks for data support and cross chain transactions -Consensus – High, the only structure that separates the two responsibilities of verifying and block generation to further enable scaling and not choke applicability. -Developability – Medium, network is set up for ease of development with well-known language and subchain capability. Already working with device manufacturers. To be seen. . . So with all that said, INT may be in the best place to tackle this space with their chosen framework and philosophy. They set out to accomplish more than WTC or VEN in a network that is better equipped than IOTA or Ethereum. If they can excecute on what they have laid out, there is no reason that they won’t become the market leader, easily overtaking the market cap of VeChain ($2.5Bn, $10 INT) in the short term and IOTA ($7Bn, $28 INT) in the medium term.
u/guysir was getting downvoted in this thread for constantly asking "Can you explain why someone would have the desire for Bitcoin to die?" So I put together a couple of pointers to help him (and others like him) to wake up and smell the coffee.
TL;DR: If you just want a 3-minute (NSFW) video which explains why certain rich assholes don't want you to have nice things, here goes: George Carlin - The big club (NSFW!!!) https://www.youtube.com/watch?v=cKUaqFzZLxU Reference: u/guysir has been asking a lot of questions like this:
Can you explain why [they] would have the desire for Bitcoin to die? Edit: I like how I'm being downvoted for simply asking a question.
~ u/guysir https://np.reddit.com/btc/comments/6qjw0o/small_blockers_want_even_smaller_blocks_o_o/dkxz7t3/?context=2 etc etc etc... Below are some introductory lessons to help u/guysir grow up and face the reality of how the world actually works. Lesson 1: Money doesn't grow on trees. Nor does it get mined from the ground very much anymore, as gold and silver. (Correction because I was half-asleep when I wrote that: Gold and silver still do get mined quite a bit of course - but most people don't use them day-to-day as money.) And gold and silver prices are probably heavily manipulated (suppressed) these days anyways - in order to prevent the value of fiat currencies (such as the USD, EUR, GBP, YEN) from collapsing. So, where does money come from, in the modern world? Bankers print unlimited supplies of money out of thin air (which they then give to their buddies). That may sound somewhat surprising to someone who hasn't ever sat down and examined how the world actually works - but basically, it's the reality we do live in. Exercise 1: Put on your thinking cap now for 30 seconds and try to imagine what your life would be like if you could "print money out of thin air" (and give it to your buddies). OK, your 30 seconds are up. Hopefully you realized that being able to "print money out of thin air" (and give it to your buddies) would give you immense power - correct? This was just a simple exercise, and of course the politics and economics of the world as a whole are much more complicated - but hopefully at this point you have managed to finally grasp one basic concept: The ability to print money (and give it to your buddies) confers great power. So, as the saying goes: "Money makes the world go around." And some lucky people (bankers) have arrogated to themselves the right to print money (which they then give to their buddies). These buddies of theirs constitute a kind of exclusive club of mega-rich people who control all the essentials which you need to survive: mainly housing, education, healthcare. Notice how the prices of these essentials are always going through the roof - while your salary stays pretty much stagnant. And notice how you never have enough cash to buy these things outright using the little bit of cash money that you actually have. So these people also control one other thing you need in life - credit. Credit is actually just "money that you have to buy" (at a gigantic markup, called "interest") from those same mega-rich people in that "club", who happen to be lucky enough to be buddies with the bankers who "print up money out of thin air". It's a very exclusive club, which runs the world - and you ain't in it. Extracurricular Activity 1: Watch this short video by George Carlin for a vivid explanation of this "club" which you ain't in: George Carlin - The big club (NSFW!!!) https://www.youtube.com/watch?v=cKUaqFzZLxU Lesson 2: Bitcoin is "peer-to-peer electronic cash". One of the most important aspects of it is that there will only be 21 million bitcoins (or 21 trillion "bits" - where there are a million "bits" in 1 bitcoin). Many people believe that one of the main reasons Satoshi designed Bitcoin this way (with a cap of 21 million bitcoins) was to take away the power of the bankers and their buddies to keep running the world by printing up money. Exercise 2: Read as much as you can of the Bitcoin whitepaper, and the Bitcoin wiki. Since this is about economics, you can skip over the technical stuff about how this whole thing was programmed in C++ - and just focus on how it works at the level of economics. https://en.bitcoin.it/wiki/Main_Page https://www.bitcoin.com/bitcoin.pdf Another good site to read about the economic aspects of Bitcoin is Nakamoto Institute: http://nakamotoinstitute.org/ Again, you can skip the articles about C++ programming - and just focus on articles dealing with the economic (and social, and political) aspects of having a form of money which an exclusive club of rich bankers and their buddies can't simply print up and use to control your life. Extracurricular Activity 2: Read (or watch a video) about The Creature from Jekyll Island or about the Federal Reserve - which explains how the current banking system in a powerful country (the USA) really works: https://duckduckgo.com/?q=creature+jekyll+island&t=hb&ia=web https://www.youtube.com/results?search_query=crature+from+jekyll+island https://www.youtube.com/results?search_query=federal+reserve+conspiracy Or, alternatively, read up on topics like the petrodollar, quantitative easing, fractional reserve, ZIRP and NIRP, the Austrian school of economics - to start understanding some of the more advanced topics of how a certain exclusive club of bankers arrogate to themselves the right to print money out of thin air (which they then hand out to their buddies, who then use this power to control your access to all the expensive essentials in life). Yes, there's a lot of tinfoil or Illuminati stuff in there which could be just delusional paranoia - but there's also a lot of cold hard facts about where money comes from. And it doesn't come from trees - or out of the ground - instead, it just comes from bankers typing in numbers on a keyboard, and then handing out this freshly-printed money to their friends - who then use this "fiat" to control you. Lesson 3: Do a search on this subreddit for "AXA" to learn more about this one particular company. https://np.reddit.com/btc/search?q=axa&restrict_sr=on&sort=relevance&t=all You will see that AXA isn't just any old insurance company or financial firm - it actually happens to be the second-most-connected financial company in the world.
Who owns the world? (1) Barclays, (2) AXA, (3) State Street Bank. (Infographic in German - but you can understand it without knowing much German: "Wem gehört die Welt?" = "Who owns the world?") AXA is the #2 company with the most economic poweconnections in the world. And AXA owns Blockstream.
If Bitcoin becomes a major currency, then tens of trillions of dollars on the "legacy ledger of fantasy fiat" will evaporate, destroying AXA, whose CEO is head of the Bilderbergers. This is the real reason why AXA bought Blockstream: to artificially suppress Bitcoin volume and price with 1MB blocks.
https://np.reddit.com/btc/comments/4r2pw5/if_bitcoin_becomes_a_major_currency_then_tens_of/?ref=search_posts Lesson 4: How do debt-based fiat currencies (and derivatives) work? And how could companies that depend on such "assets" (such as AXA) be negatively affected by Bitcoin? Derivatives are basically the total opposite of Bitcoin, when it comes to something called "counterparty risk" . Counterparty risk is the possibility that you might not get what's owed to you - because "your money" isn't actually in your hands, it's in someone else's hands, and all you have is a "claim" on what they're holding in their hands: in other words, they have a debt to you (a promise to pay you) - and you only get "your" money if that other "counterparty" actually pays their debt to you, or makes good on their promise to pay you. Compare that to Bitcoin - which is basically one of the only "counterparty-free" assets in the world. If you have a bitcoin (ie, if you control your own private key), then you're not dependent on anybody to pay you. You already are holding your own "cash". You've probably seen company balance sheets, with Assets (including Receivables) and Liabilities (including Payables) and Income and Expenses and Equity. To calculate how much the company "has", you just add up all the positive stuff (Assets and Receivables), then subtract all the negative stuff (Liabilities and Payables), and the difference is what the company "has": its Equity. (The Income and Expense accounts are just temporary accounts used for incoming and outgoing cash flows.) But a lot of what the company "has" also could involve "counterparties" - other entities who (in the future) will (hopefully) come through and pay what they promised to pay. So there is risk here. Risk of not getting paid. Risk of breach of contract. Risk of credit default. Because most of these "assets" are not "counterparty-free". Your "net worth" on paper might be just that: on paper. In reality (if the people who promised to pay you end up never paying you), then your "net worth" could actually turn out to be much less than what it says "on paper". Derivatives are just another layer built on top of that: they're basically "bets" about whether someone is actually going to get paid or not. (In fact, one of the most important types of derivatives are Credit Default Swaps - or CDOs - which are used to place "bets" on whether someone is going to default on their debts.) So, a company like AXA (which is heavily involved in derivativs) is technically "rich" - but only "on paper". In reality, like most major financial firms, if you just looked at what they actually have "on hand", they'd probably literally be bankrupt. This may sound shocking, but many economic experts have stated that a majority of the major financial firms around the world (including most major banks, and most major insurance firms such as AXA) are actually bankrupt - if you just look at the reality of what they actually have "on hand" (and not the "fantasy" of what they have "on paper"). So, in addition to the ability to print money out of thin air, there is this other strange aspect to the world's current financial system: many companies (mainly finance companies) would be considered bankrupt if viewed strictly in terms of what they have "on hand" ... but they're are able to parade around acting like they're mega-rich, based on what they have "on paper" (most of which is debt-based or derivatives-based). Bitcoin coin is a major threat to the existing power system based on debt and dervatives - which AXA is at the absolute center of So, the people who are supposedly "powerful", who run our world - their power comes from two sources:
Their ability to print up money out of thin air;
Debt-based and derivatives-based numbers on paper.
Bitcoin threatens the first item above. And the global financial crisis which started in 2008 threatens the second item above. In fact, Bitcoin itself also probably threatens the second item above too. This is because as Bitcoin becomes worth more and more, those debt-based and derivatives-based numbers on paper become worth less and less, in relative terms. And if the current financial crisis becomes acute again (like it did when another "systemically important" insurance company / derivatives "playa" went under: AIG)... ...then a lot of those numbers on balance sheets will get wiped out, written off - because people aren't paying up ...and so companies (including companies like AXA - in fact especially companies like AXA) might go belly up ...because they don't actually have any real money "on hand" - all they have is debt-based and derivatives-based numbers on paper. So nearly all of the world's major banks and insurance companies - especially AXA - are on a mad, mad merry-go-round of debt and derivatives. They're like someone with no cash, living on an almost-maxxed-out credit card - desperately hoping that the banks will lend give them more money (a/k/a "credit" - a/k/a debt), and terrified that the counterparties who owe them money will actually turn out to be in the same boat that they are: ie, bankrupt, deadbeats. It's actually less like a merry-go-round, and more like a game of musical chairs: and nearly all the major banks and financial companies are terrified of what will happen if/when the music stops, and they're not able to scramble to find a chair - especially AXA. AXA is the "second-most-connected" financial company in the world AXA also has more derivatives than any other insurance company in the world - which means they're basically flat-broke, totally dependent on their "counterparties" in this "web of debt". And derivatives aren't just some minor part of the world financial system. Actually, there is currently around 1.2 quadrillion dollars in derivatives - so derivatives are by far the biggest part of the world financial system. Here's an infographic to give you an idea: http://money.visualcapitalist.com/all-of-the-worlds-money-and-markets-in-one-visualization/ You'll notice that Bitcoin is also included on that infographic. Maybe you look at it and think: Well, Bitcoin is so small, why would they be worried about it? But size isn't everything. Remember that (unlike nearly every other asset on that infographic) - bitcoin is "counterparty-free". (Also gold and silver are "counterparty-free".) So gold, silver and bitcoin are a lot more "independent" than all the other so-called "assets" on that infographic. In fact, it wouldn't be much of a stretch to say that gold, silver and bitcoin are the only totally real assets on that infographic - and the rest of those assets are to some degree fake (since they could evaporate at any minute - unlike gold, silver and bitcoin, where your ownership is totally guaranteed). Also, due to the "law of reversion to mean", something small on that infographic basically has only one direction it can go: towards getting bigger. We say that Bitcoin has a lot of "upside" for growth. And something gigantic on that infographic also has one direction it can go: towards getting smaller. We say that derivatives have a lot of downside - derivatives might be in a bubble, or due for a crash. And one way that could easily happen would be for billions of dollars (or trillions of dollars) to flow into Bitcoin - while flowing out of the other asset classes on that infographic. Of course, in order for trillions of dollars to flow into Bitcoin... We're gonna need a bigger blocksize. And that's actually basically all we'd probably need - the software already runs fine, and (despite the propaganda from Blockstream and r\bitcoin), the network / hardware / infrastructure / bandwidth can already handle blocksizes of 4MB-8MB - so with things like Moore's law working in tandem with Metcalfe's law, it is quite reaonable to assume that in 8-10 years (after the next two Bitcoin "halvings") it is quite possible for 1 bitcoin to be worth 1 million US Dollars. I did some rough growth projections here showing how feasible this actually is:
Bitcoin Original: Reinstate Satoshi's original 32MB max blocksize. If actual blocks grow 54% per year (and price grows 1.542 = 2.37x per year - Metcalfe's Law), then in 8 years we'd have 32MB blocks, 100 txns/sec, 1 BTC = 1 million USD - 100% on-chain P2P cash, without SegWit/Lightning or Unlimited
https://np.reddit.com/btc/comments/5uljaf/bitcoin_original_reinstate_satoshis_original_32mb/ So Bitcoin (with bigger blocks - not under the control of Blockstream or AXA) could be a serious competitor - or a threat - or a safe haven - or an "inversely correlated" asset class - versus all the other asset classes on that infographic. Bitcoin is an alternative Bitcoin is an alternative - an option people might turn to, if they decide to abandon the other options on that infographic. So AXA - whose wealth and power depends on heavily on the derivatives shown in that infographic - might want to either see Bitcoin fail, or suppress Bitcoin, or eliminate it as an alternative, or simply control it somehow - just to make sure it doesn't "eat their lunch". Remember that one of the tactics used by oppressors is to spread propaganda to brainwash you into giving up hope and believing that "There Is No Alternative". Bitcoin is an alternative to the current messed-up financial system (which helps prop up bankrupt companies like AXA) - so for that reason alone it's enough for a company like AXA to want to eliminate or suppress or at least control Bitcoin. Not just by buying up some bitcoins - but by paying the devs who write the code that determines the blocksize which ultimately affects the price. "Bitcoin users unaffected." If/when the music stops in the game of debt- and derivatives-backed musical chairs that makes the world go 'round, some of the "systemically important" financial firms will be exposed as being bankrupt - and it is very, very likely that one of those firms could be AXA (just like AIG in 2008). In all honesty, I have to admit that it's still not totally clear to me (or maybe to anyone) precisely how Bitcoin will ultimately impact this whole "web of debt". After all, this is the first time the world has ever had a digital, counterparty-free asset like Bitcoin. (Gold and silver are also counterparty-free - but they're not digital, so it's harder to store them and move them around.) But one basic fact is certain: Bitcoin is really not a part of this whole "web of debt". Bitcoin stands quite outside this whole "web of debt". Bitcoin is "inversely correlated" to this whole "web of debt". Bitcoin is an alternative. Voice and Exit If you feel like you don't have a voice / vote in the system, it's good to know that you can exit the system. https://en.wikipedia.org/wiki/Exit,_Voice,_and_Loyalty Balaji Srinivasan (founder of 21.co) on Voice and Exit https://www.youtube.com/watch?v=cOubCHLXT6A Can we ever really know what AXA might be up to with Bitcoin? Probably not - because it is unlikely that they would ever tell us. But, we can make some rational guesses. On some level, a lot of people whose wealth and power come from this whole "web of debt" are probably just reasoning as follows:
If/when this whole "web of debt" goes down, Bitcoin goes up. (This is already pretty much an established fact: money flees to "safe havens" like gold, silver and bitcoin when "traditional" investments go down.)
If/when Bitcoin goes up, then the importance and power (and credibility) of this whole "web of debt" goes down. (This makes sense: being counterparty-free, bitcoin is obviously a safer investment - and so it's worth more - and so all those other debt-based and derivatives-based investments become worth less, as bitcoin becomes worth more.)
If Bitcoin goes down (or totally goes away), then this whole "web of debt" will probably be able to hang on for a while longer. (This also be more of just just a conjecture - but it seems quite reasonable.)
Maybe they just want to keep you trapped in their system - by destroying (or suppressing) the alternative (Bitcoin) which gives you a chance to exit their system. Some more posts about AXA and what they might be up to: Anyways, there's a bunch of articles on btc about AXA and what they might be up to with Bitcoin: https://np.reddit.com/btc/search?q=axa&restrict_sr=on Finally, if you need some extra help dispelling the quaint notion that the people who run the world are honest and transparent and helpful, then the following two (admittedly highly conjectural) posts might help spell things out a bit more explicitly for you:
Blockstream may be just another Embrace-Extend-Extinguish strategy.
The owners of Blockstream are spending $75 million to do a "controlled demolition" of Bitcoin by manipulating the Core devs & the Chinese miners. This is cheap compared to the $ trillions spent on the wars on Iraq & Libya - who also defied the Fed / PetroDollar / BIS private central banking cartel.
https://np.reddit.com/btc/comments/48vhn0/the_owners_of_blockstream_are_spending_75_million/ Sorry I don't have any more time right now to "school" you further on this subject. Ideally, learning should be a self-driven process anyways - once someone helps you get started. Some advice Finally, if I may give you some parting advice. If you want to be truly respected on these forums, you're probably going to have to stop going around acting like such a doe-eyed innocent little pollyanna. It is assumed that most people here already pretty much know the harsh reality of how the world works, and are trying to use Bitcoin as a way to not get screwed over by this harsh reality. So some of the more informed people around here might not have much patience with you (or trust in you) if you don't even understand the basic principles outlined above, namely:
Our planet is being run by an exclusive club of rich assholes who have immense power, because we "allow" them to print out money (which they then hand out to their buddies, not to us - basically enslaving us).
Bitcoin was designed (many believe) to help fix this dire situation.
The ancien régime (those people who up till now who have been running the world, due to their ability to print money) might not like Bitcoin for this reason, and might try to do something to stop it - and they might not tell you why they're doing it - and they might not even tell you that they are doing it in the first place!
Sorry to be such a curmudgeon, but pollyannas like you tend to get on my nerves after a while - not least because it seems to me that one of the factors which allows those rich assholes to continue to stay in power and run the world is because so many uninformed credulous people like you either can't or won't just wake up and open your goddamn eyes and see how you're getting fucked over by this whole "web of debt" based around that exclusive "club" of rich assholes who get free money which the bankers are simply printing up out of thin air. So, 99% of people in the world are living lives of quiet desperation and oppression, becoming poorer and poorer - while the rich keep getting richer and richer (with all that money they keep printing out of thin air - which by the way, if you do the math, ends up making your money worth less) - and now there are finally some serious attempts at revolution or change afoot, to try to fix some of this mess - and you've just wandered in to a meeting where some of these people struggling for change are making plans, and you basically keep going around asking "What are you guys so worked up about?" Maybe if you also realized that you are saying the exact same thing that the oppressors are always saying (basically some variation of "Nothing to see here, move on!") - then maybe that will provide another hint to you as to why some people have been less-than-totally-welcoming of your non-stop naïve-sounding questions. Every subreddit has a topic - plus certain assumptions For comparison: Would you wander around on a subreddit about fitness or weightlifting constantly asking: "Why do you want to get in shape?"? (Or maybe here's an even better comparison: Would you wander around on a subreddit for some oppressed group, and keep asking "Why would anyone be oppressing you?"?) There are certain "givens" which are assumed on a subreddit - and one of the "givens" for a lot of people on this subreddit is that the current monetary regime running the world is not working for most people (or: it is oppressing most people), and so we need something better. (Also another one of the "givens" is that r\bitcoin is censoring everyone's posts - and that Blockstream is damaging Bitcoin.) Nobody is forcing you to get into fitness or weightlifting - and nobody is forcing you to get into Bitcoin. Maybe you think your physique is already fine the way it is, so you don't see the point of fitness or bodybuilding - and maybe you think that VISA and PayPal and JPMorganChase and Wells Fargo and the Fed and the ECB or whatever are fine for you, so you don't see the point of Bitcoin. (Or maybe you were born a millionaire so you don't feel financially oppressed.) You're free to get involved or not get involved. Most people who are here are involved for some particular reason. And whatever that reason may be, it usually tends to involve using Bitcoin as it was designed in the whitepaper - in order to improve their lives. And part of this also means actually using Bitcoin as it was designed in the whitepaper - free of any interference from companies like Blockstream - or their financial backers AXA - who might not really want us to be able to use Bitcoin the way it was designed in the whitepaper. In particular, it has been quite obvious for years to people on btc that the actions of r\bitcoin and Blockstream have been damaging to Bitcoin (whatever their actual motives may be - which we may ultimately never even be able to find out since they're probably never going to actually tell us) - but meanwhile we've had to fight tooth and nail to get a vast brainwashed army of pollyannas - a lot of whom quite frankly sound a lot like you - to understand that Satoshi did not design Bitcoin to work like this:
Every Core supporter wants to run their own node. Apparently to help banks settle transactions, instead of their own transactions.
Bitcoin Original: Reinstate Satoshi's original 32MB max blocksize. If actual blocks grow 54% per year (and price grows 1.542 = 2.37x per year - Metcalfe's Law), then in 8 years we'd have 32MB blocks, 100 txns/sec, 1 BTC = 1 million USD - 100% on-chain P2P cash, without SegWit/Lightning or Unlimited
https://np.reddit.com/btc/comments/5uljaf/bitcoin_original_reinstate_satoshis_original_32mb/ We all have our own reasons for being here. So hopefully that gives you some background regarding why many people are here on this subreddit in the first place, and what some of our goals and desires are. We want to use Bitcoin - and we don't want the bankers funding Blockstream or the censors silencing r\bitcoin to get in our way. We understand that Bitcoin is a disruptive technology which could be liberating and empowering for many of us in various ways. We are realistic about the fact (ie, we take it as a "given") that certain powerful individuals or institutions might not want us to be empowered and liberated like this (maybe because their power depends on our enslavement). And so we allow for the possibility that certain powerful individuals or institutions might be trying to stop us - and that they might not even have the courtesy to inform us that they are trying to stop us. I should of course clarify that these are ultimately really only my reasons for being on this forum. Other people may have their own reasons - some the same as me, and some different from me - and so I can only speak for myself. It is important for all of us - me, you and everyone else - to have a clear understanding of why we are here. In particular, if you - u/guysir - ever felt like giving people a brief explanation of why you are here - then that might help people understand why you keep asking the kind of questions you keep asking. Why people are rejecting Blockstream's heavily modified version of Bitcoin - and sticking with Satoshi's original version of Bitcoin (now called Bitcoin Cash or BCC) The above reasons are why many of us will not use AXA-owned Blockstream's Bitcoin. We want to continue using Satoshi's original Bitcoin, now being renamed Bitcoin Cash (ticker: BCC, or BCH) - because we want to continue to enjoy the benefits of:
simple & safe on-chain scaling for cheaper and faster p2p transactions and higher value for our bitcoins, and
SwipeCrypto, found online at SwipeCrypto.SwipeRich.com, wants to bring advertising to the mobile lockscreen. The platform already serves 10 million impressions per month in the Philippines and Indonesia. Now, using blockchain technology, SwipeCrypto wants to maximize brand exposure and transparency to push their platform forward. The goal of SwipeCrypto is to deliver better mobile advertisements to users. The company’s whitepaper explains how current advertising models are ineffective because the ads are displayed on the side or as banner ads, which makes it difficult to capture a user’s true attention. SwipeCrypto plans to solve this problem using a decentralized mobile lockscreen advertising solution.
How Does SwipeCrypto Work?
SwipeCrypto is a blockchain technology built on top of an existing advertising platform called SwipeRich. SwipeRich is the platform mentioned above that serves 10 million monthly impressions in the Philippines and Indonesia. SwipeCrypto uses blockchain technology and a digital token to reward mobile users for viewing the advertisement. Instead of viewing advertisements when you visit a browser page or watch a video online, SwipeCrypto will deliver ads onto your lockscreen. Every time you turn on your phone, you’ll see an ad on your lockscreen. For most users, the lockscreen just appears for a second or two while your fingerprint scans, or while you enter your PIN. SwipeCrypto and SwipeRich was designed to give companies easy exposure directly to consumers’ eyes when they know consumers are looking. Why would users install an advertising app onto the lockscreen? Users are rewarded for installing the app. In exchange for viewing an advertisement every time they open the lock screen, users will receive tokens.
What Problems Does SwipeCrypto Seek To Solve?
SwipeCrypto aims to solve crucial problems in the advertising industry, including: No Transparency: Facebook and Google have a duopoly over the international advertising economy. There’s limited transparency in how either company works, and advertisers pay higher prices because of this duopoly. Advertising Fraud is Real: Fraud is always a problem in digital advertising. Bots are used to manipulate clicks or views, leaving advertisers, companies, and publishers with missed opportunities and inefficiencies. Users Don’t Receive a Reward for Engaging with an Advertisement: Today, we see advertisements every time we use the internet. However, we never receive a reward for engaging with those advertisements.
SwipeCrypto And The SWC Token
The SwipeCrypto ecosystem revolves around the use of the SWC token. The token is an ERC20-compliant token on the Ethereum blockchain. The token will be used as an in-app payment transfer. Aside from that, however, we know relatively little about the token or how it works.
Benefits Of SwipeCrypto
SwipeCrypto offers benefits for publishers, advertisers, and mobile users.
Advertisers can be a direct advertiser on a programmatic network; they can purchase advertising slots from SwipeCrypto with or without user-specific targeting requirements; ads can be purchased based on a number of impressions, clicks, conversions, completed video views, app installs, and more
Publishers can access additional advertising revenue based on engagement from the publisher’s mobile app
Publishers enjoy increased mobile app activation; the SwipeCrypto lockscreen can be used to promote the publisehr’s own app usage over the lockscreen
It complements existing mobile advertising platforms instead of seeking to replace them; users can also view an app’s advertisements without needing to launch the app
Additional revenue firm in-app physical or digital goods; SwipeCrypto allows publishers to list a selection of digital or physical goods available to users
Mobile users, meanwhile, can be rewarded for their engagement in the form of digital tokens
How Does SwipeCrypto Work?
SwipeCrypto relies on all of the following platforms in order to work: X-Swipe Ad-Engine: The X-Swipe advertising engine uses AI to match advertisement content with the right publisher’s audience through advanced targeting. The engine uses advanced data like user demographic information, user app profiling, time and location, digital behavior (like their usage of other apps, social media preferences, bot traffic, brute force, IP blacklist, etc.), interests, user connectivity/network, and more. SwipeDK: SwipeCrypto’s Android library/SDK enables the publisher’s app to display advertisements on the lockscreen. SwipeDK will carry out functions like serving advertising to mobile lockscreens with the publisher’s app, collecting advertising engagement data like impressions and clicks, and providing an in-app SWC virtual wallet. Marketplace SDK: SwipeCrypto’s marketplace allows publishers to list and sell their digital/physical goods as an additional revenue source. Blockchain-based Distributed Ledger: The blockchain is responsible for providing an immutable source of advertising-related information, including a smart contract for ad-slots purchased by advertisers, lockscreen engagement transactions like impressions, click streams, installs, user demographics, digital profile, etc., reward distribution between publishers and users, and the conversion of user rewards into a publisher’s in-app currency or point system.
Who’s Behind SwipeRich?
SwipeCrypto is being developed by Singapore’s SwipeRich. The company is led by CEO and CTO Andrew Marchen, CFO Clifford Lim, CCO Kuay Chong Sean, and COO Iyan Waer.
SwipeCrypto offers all of the following features: SwipeRich Lockscreen Ads: Place ads on the lockscreen of a mobile user’s device. Blockchain Powered: SwipeCrypto uses blockchain and smart contracts to bring transparency and accountability to address trust and ad-fraud issues in digital advertising. Lockscreen SDK Integration: SwipeCrypto’s lockscreen SDK can be integrated to any Android app publishers with just a simple line of code. SWC Token Rewards: SWC tokens are transacted within the ecosystem. Advertisers use tokens to pay for the ad slot, and publishers and users receive tokens as rewards. Smart Targeting: SwipeCrypto’s targeting engine uses AI to match content with the right publishers and audience through advanced targeting and multi-variate analysis. Proven Implementation: SwipeCrypto’s SwipeRich serves 10 million ad impressions per month in the Philippines and Indonesia. The team has launched AGILA Rewards in the Philippines and Cepatswipe in Indonesia to provide lockscreen advertising in partnership with mobile leaders.
SwipeCrypto is a blockchain technology built on top of SwipeRich, an existing lockscreen-based advertising platform. You can install SwipeCrypto, then get rewarded every time you unlock your smartphone. Meanwhile, businesses can use SwipeCrypto’s advertising platform to put ads directly in front of consumers’ eyes when they know consumers are looking. It’s an interesting concept. SwipeRich already has 10 million impressions per month in the Philippines and Indonesia – so they’ve proven the lockscreen-based advertising system can work. Now, with SwipeCrypto, the company aims to show how blockchain technology can improve the transparency and efficiency of advertising. You can learn more about SwipeCrypto by visiting the company online at SwipeCrypto.SwipeRich.com.
So i read this article recently and can't find a flaw in it's logic. Can some one help me shine some light on where this poster is wrong please. "Bitcoin is the globalist tool of your financial enslavement Let me preface my remarks by saying that I’m no expert on Bitcoin technology, but I do know bullsh*t when I smell it. So let me explain in a very simple way why Bitcoin and other digital currencies are globalist fronts. I’ll start by showing you the key elements of Bitcoin from the Simple English Wikipedia… “Bitcoin is a digital and global money system (currency). It allows people to send or receive money across the internet, even to someone they don’t know or don’t trust. Money can be exchanged without being linked to a real identity. The mathematical field of cryptography is the basis for Bitcoin’s security… One of the differences between using bitcoin and using regular money online is that bitcoin can be used without having to link any sort of real-world identity to it. Unless someone chooses to link their name to a bitcoin address, it is hard to tell who owns the address. Bitcoin does not keep track of users; it keeps track of addresses where the money is. Each address has two important pieces of cryptographic information, or keys: a public one and a private one… Sites or users using the Bitcoin system are required to use a global database called the blockchain. The blockchain is a record of all transactions that have taken place in the Bitcoin network. It also keeps track of new bitcoins as they are generated. With these two facts, the blockchain is able to keep track of who has how much money at all times.” So Bitcoin records EVERY TRANSACTION, which is something the Globalist Banksters have always wanted to do. But people think it doesn’t matter because they are supposedly protected by anonymity and encryption. THEY MOST DEFINITELY ARE NOT. Let’s recall what we learned about the Intel Management Engine in the 5-6 December mini-update…
The Intel Management Engine (ME), also known as the Manageability Engine, is an autonomous subsystem that has been incorporated in virtually all of Intel’s processor chipsets since 2008. The subsystem primarily consists of proprietary firmware running on a separate microprocessor that performs tasks during boot-up, while the computer is running, and while it is asleep. It continues to run when the system is turned off. Intel claims the ME is required to provide full performance. Its exact workings are largely undocumented and its code is obfuscated using confidential huffman tables stored directly in hardware, so the firmware does not contain the information necessary to decode its contents. Intel’s main competitor AMD has incorporated the equivalent technology Platform Security Processor (PSP) in virtually all of its post-2013 CPUs…
Critics like the Electronic Frontier Foundation (EFF) and security expert Damien Zammit accuse the ME of being a backdoor and a privacy concern. – from Wikipedia <<<
Matthew Garrett, the well-known Linux and security developer who works for Google, explained recently that, “Intel chipsets for some years have included a Management Engine [ME], a small microprocessor that runs independently of the main CPU and operating system. Various pieces of software run on the ME, ranging from code to handle media DRM to an implementation of a TPM. AMT [Active Management Technology] is another piece of software running on the ME.” […] At a presentation at Embedded Linux Conference Europe, Ronald Minnich, a Google software engineer reported that systems using Intel chips that have AMT, are running MINIX. So, what’s it doing in Intel chips? A lot. These processors are running a closed-source variation of the open-source MINIX 3. We don’t know exactly what version or how it’s been modified since we don’t have the source code. In addition, thanks to Minnich and his fellow researchers’ work, MINIX is running on three separate x86 cores on modern chips. There, it’s running: TCP/IP networking stacks (4 and 6), file systems, drivers (disk, net, USB, mouse), web servers. MINIX also has access to your passwords. It can also reimage your computer’s firmware even if it’s powered off. Let me repeat that. If your computer is “off” but still plugged in, MINIX can still potentially change your computer’s fundamental settings. And, for even more fun, it “can implement self-modifying code that can persist across power cycles.” So, if an exploit happens here, even if you unplug your server in one last desperate attempt to save it, the attack will still be there waiting for you when you plug it back in. How? MINIX can do all this because it runs at a fundamentally lower level. […] According to Minnich, “there are big giant holes that people can drive exploits through.” He continued, “Are you scared yet? If you’re not scared yet, maybe I didn’t explain it very well, because I sure am scared.” – from Slashdot.org <<<
Since your encryption and passwords are handled at the operating system and software levels, these embedded “management/security” chips, which operate at a fundamentally lower level, have access to EVERYTHING on your computer, smartphone, etc. This includes your encryption keys. So when you put this processor-level access together with the blockchain database and forensic algorithms, it means that… Globalist Big Data (GBD) knows exactly who owns each and every fraction of a Bitcoin. There is no such thing as anonymity. GBD knows both your public and private Bitcoin keys. There is no such thing as security. GBD can track every single Bitcoin transaction. There is no such thing as privacy. GBD can seize your Bitcoins whenever they want, and for whatever reason they wish. They can do this by setting up a “hack of your system” or through government action. WHEN YOU USE BITCOIN, YOU ARE COMPLETELY NAKED AND VULNERABLE TO THE GLOBALIST ESTABLISHMENT. Harbor no illusions otherwise."
BITHUMAN (BTH) is a cryptocurrency "Open Source" started on August 5, 2017. BitHuman is not a fork Bitcoin and uses the unique algorithm CryptoNight. Based on CryptoNote technology SourceCode: 05/08/2017 Linux Gui Wallet: 05/08/2017 Linux Command Line: 05/08/2017 Windows: not available, but you can build iOS: not available, but you can build Solo Mining: available Mining Pool: not available for the moment Exchange: not available for the moment Specifications Algorithm: CryptoNight Block time: 120 seconds (2 minutes) Difficulty retargets each block Block reward decreases each block according to the formula: BaseReward = (MSupply - A)/218, where MSupply = (264 - 1) atomic units and 'A' is amount of already generated coins One coin is divisible down to 8 decimal places (divisible up to 108) Total coins: 184467440737.00000000 (= 184.46 billion BTH) Roughly 90% mined in 5 years Premined: 1% to improve the currency Features True anonymity & data protection Untraceable payments use ring signature Unlinkable transactions with random data by the sender Blockchain analysis resistant Only CPU-mining & ASIC-resistant POW mechanism is a voting system for users What is CryptoNote? CryptoNote is an application layer protocol that powers several decentralized privacy oriented digital currencies. Conceptually, it is an evolution of ideas behind bitcoin: both are similar in some ways yet different in many others. The main difference between the two technologies is that bitcoin (and most digital currencies) is less opaque than CryptoNote-based currencies due to the latter's blockchain being almost anonymous, contrary to non-Cryptonote blockchains.CryptoNote currencies use a distributed public ledger that records all balances and transactions of its in-built currency like bitcoin. Unlike bitcoin, CryptoNote's transactions cannot be followed through the blockchain in a way that reveals who sent or received coins. The approximate amount of a transaction can be known, but the origin, destination, or actual amount cannot be learned. The only information available is that the actual amount was lower than the displayed amount. The only people with access to the whole set of data about a transaction are the sender or receiver of the transaction and the person who possesses one or both secret keys. Another significant difference is hash-based proof-of-work algorithm. Bitcoin uses SHA256, which is CPU-bound function. That means that participants (miners) are only limited by their calculation speeds, and it is relatively cheap to create an application-specific integrated circuit (ASIC) device, which will surpass an ordinary computer in hashes per unit of money. CryptoNote uses memory bound function CryptoNight, which cannot be easily pipelined. CryptoNote code was not forked from bitcoin's, so it also has other different inner algorithms, like recalculating new difficulty level or new block size. Untraceable payments CryptoNote provides users with a completely anonymous payment scheme. CryptoNote implements the ring signature technology which allows you to sign a message on behalf of a group. The signature only proves the message was created by someone from the group, but all the possible signers are indistinguishable from each other. Unlinkable transactions Even if outgoing transactions are untraceable, everyone may still be able to see the payments you have received and thus determine your income. However, by using a variation of the Diffie-Hellman exchange protocol, a receiver has multiple unique one-time addresses derived from his single public key. After funds are sent to these addresses they can only be redeemed by the receiver; and it would be impossible to cross-link these payments. Double-spending proof Nobody is able to spend the same money twice — even if all his signatures are anonymous. Every signature contains a key image — a kind of fingerprint of the secret key. It is based on a one-way cryptographic function; this implies that given only the key image it is impossible to restore the corresponding secret key. These key images are used to prevent double-spending. Blockchain analysisresistance Non-repeating one-time addresses and mixed keys in ring signatures make the whole blockchain resistant to analysis. Each future transaction will only increase the entropy and create additional obstacles for an analyst. Egalitarian proof of work The proof of work mechanism acts as a voting system. Thus, it is crucial that during the voting process all the participants have equal voting privileges. CryptoNote brings this equality with its egalitarian proof of work, utilizing built-in CPU instructions, which are very hard and too expensive to implement in special purpose devices, but perfectly suitable for ordinary PCs. Adaptive parameters A decentralized payment system must not depend on a single person's decisions, even if this person is a developer. CryptoNote has no hard-coded constants; magic numbers in the code are designed to be re-calculated based on the previous state of the network. Thus, they always change adaptively and independently, allowing the network to develop on its own. Ring signatures are explained below. Reproduced from CryptoNote: A normal signature looks like this. There's only one participant, which allows one-to-one mapping. https://ip.bitcointalk.org/?u=http%3A%2F%2Fi.imgur.com%2FdcbDq05.png&t=578&c=HLRqRc1qfKqayw A ring signature obscures identities because it only proves that a signer belongs to a group. https://ip.bitcointalk.org/?u=http%3A%2F%2Fi.imgur.com%2FavTQPnT.png&t=579&c=5ncjEKTCKCYMzA This allows a high level of anonymity in cryptocurrency transactions. You can think of it as decentralized and trustless mixing. https://ip.bitcointalk.org/?u=http%3A%2F%2Fi.imgur.com%2FioewLSY.png&t=579&c=3tpzhuKkxAQhWw
An exhaustive email explaining NYC "roadmap" to the 'hype and scam' crowd. PLEASE READ. (31 points, 59 comments)
1,000,000 NYC BOUNTIES for every new retail/storefront business YOU get to accept NewYorkCoin in New York City. Business owner downloads Coinomi Wallet (beta) from link at newyorkcoin.net and prints their QR code for customers to pay! Business owner receives 1,000,000 NYC too! (27 points, 11 comments)
Gila's Nosh | 23rd Street NOW ACCEPTS NYC! (24 points, 7 comments)
LEASE NEGOTIATIONS IN PROCESS FOR AN AMAZING GALLERY SPACE IN LOWER EAST SIDE, MANHATTAN! THE NEW YORK COIN CENTER WILL BE OPENING SOON IN MANHATTAN. (24 points, 18 comments)
Only way NYC will go big is if we as a community come together and make it big. It’s not magic, we are investors and it is our duty to help this coin grow so developers have enough resources to further the project. (18 points, 9 comments)
More exchanges is the solution (14 points, 6 comments)
Dallas Mavericks announced they will accept Cryptocurrency next season.. (13 points, 3 comments)
NYC (24hr) trading volume passing $1m!!! Coinmarketcap is fixing bug that is stopping updating of volume. All markets offline at coinmarketcap. NYC TRADING VOLUME IS EXPLODING!!! (10 points, 4 comments)
1,000,000 NYC BOUNTIES for every new retail/storefront business YOU get to accept NewYorkCoin in New York City. Business owner downloads Coinomi Wallet (beta) from link at newyorkcoin.net and prints their QR code for customers to pay! Business owner receives 1,000,000 NYC too! by hivewalletvictim (27 points, 11 comments)
Who is applying and sending in the info the exchanges require to get added ? Ill do it and pay the fees they require if someone will give me permission and materials I request. I’ll pay the fees as well they range $5000 to 20,000. Exchanges want money it’s that simple. by earthfunds (26 points, 10 comments)
Bitcoin and open source software development are built upon the same fundamental premise that a copy of the source code is available to users to examine. This concept makes it the responsibility ... Bitcoin uses the Hashcash proof of work system. One application of this idea is using Hashcash as a method to preventing email spam, requiring a proof of work on the email's contents (including the To address), on every email. Legitimate emails will be able to do the work to generate the proof easily (not much work is required for a single ... This page: Blocks said mining is actually to solve a mathematical problem, but reading Block hashing algorithm doesn't give much help. I also tried reading bitcoind source code, but reading code takes much more time than reading documentation:) And I have written a simple json-rpc client to call getwork() method to fetch the "data", but what should I do next to this "data"? following description is based on the Bitcoin source code  and the Bitcoin Protocol Speci cation on Wikipedia . Furthermore, all data types denoted in the diagrams are explained in detail inAppendix A. 3.1 Blocks Each block is composed of a header and a payload. The header stores the current block header version (nVersion), a reference to the previous block (HashPrevBlock), the root node ... Bitcoin scripting: In this post I’ve explained Bitcoin as a form of digital, online money. But this is only a small part of a much bigger and more interesting story. As we’ve seen, every Bitcoin transaction is associated to a script in the Bitcoin programming language. The scripts we’ve seen in this post describe simple transactions like “Alice gave Bob 10 bitcoins”. But the ...
Bitcoin Transaction Explained in 5 Minutes - YouTube
[ASMR] Bitcoin Source Code Explained [ASMR] Bitcoin Source Code Explained. Skip navigation Sign in. Search. Loading... Close. This video is unavailable. Watch Queue Queue. Verdienmodel vervelende Bitcoin Code advertenties uitgelegd - Duration: ... Bitcoin Basics (Part 1) - "Explained For Beginners" - Duration: ... First look at the Bitcoin source code - Duration: ... In this quick video, we do our best to explain the mechanics of a single Bitcoin transaction in 5 minutes or less. We explain things like addresses, wallet a...