First Time/Small Miner

First time/Small miner reference
for getting started.

If you want to start mining here is what you need… and what you need to know.

This is written for home miners/small farms, but can be used as a guideline for most operations. Use this as a reference for what you need to research, or what questions you need to ask before jumping in.

What you need to mine can be broken down into the following categories:

  • Hardware
  • Electricity
  • Location
  • Internet connection
  • Information

Mining BITCOIN is done exclusively with dedicated BITCOIN mining hardware based on ASICs: https://en.wikipedia.org/wiki/Application-specific_integrated_circuit .

You CAN NOT meaningfully mine bitcoin today with CPU, GPU or even FPGAs. Bitcoin difficulty adapts to match the amount of mining done on the network and has reached levels trillions of times too high to mine meaningfully with PCs, laptops, tablets, phones, webpages, javascript, GPUs, and even generalised SHA hardware.

Even if you combined all the computers in the world, including all known supercomputer, you would not even approach 0.1% of the bitcoin hashrate today.

There isn’t any point attempting to mine bitcoin with CPU or GPU even in the interests of learning as it shares almost nothing with how bitcoin is mined with ASICs and will not teach you anything.

Hardware

Asic Miner:

Here is a list of the companies currently manufacturing Miners for public purchase.

Each one has their Pro’s and Con’s it is up to you to do your research and decide what is best for you.

A few points to consider while researching are :

  • efficiency
  • reliability
  • warranty period/policy
  • power draw

Each company has a different way of handling warranty repairs, depending on your situation and the policy repairs can become cost prohibitive. I will touch more on efficiency and power draw in the electricity section.

• Current list of competitive hardware

Power supply: You will need to purchase a power supply to run your miners. You will find ATX and Server grade PSU’s, the latter being preferred for mining BTC. 

When it comes to selecting a PSU purchase something with a capacity 25% higher than your miner is rated to draw. This will have you operating within the 80% rule.(explained further in the electricity section)

EX. Miner draws 1000 PSU should be able to provide 1250W.

** Many current generation miners are now being manufactured with Integrated PSU. Again do your research to see if your unit comes with or without. Generally you will still need to source a power cable.**

Auxilliaries – Avalon miners require an external controller, 1 per 20 miners. You may have to run additional fans for intake and exhaust depending on your location.

PSU’s can be purchased large enough to run 2 Miners; or the opposite 1 Miner fed by 2 PSU’s. Ensure the PSU you have selected will have the correct amount of PCI-E connectors required to operate your miner(s)

You can also find a large supply of used miners and PSU’s. Again it’s up to you to do your research as these often are a no return transaction.

Electricity

Follow all local codes and regulations

This is the number 1 factor in whether mining is right for you. As discussed with Miners being a 24/7 machine drawing power those costs will make it cost prohibitive for some people to mine. You need to be aware of what your costs/kWh are and run the numbers.

This will be done in a profitability calculator. This is just an example of 1 there are many out there.

( Miner usage in kW ) * ( Hours run per day ) 24 * ( Cost/kWh ) = Cost per Day to Operate

( Ideally less than the FIAT value of BTC mined )

The second part to the electrical requirements of mining is the available service; written for North America.

You will need to figure out the amperage you can spare, what circuits and receptacles you have in place, are you setting up on 220V or 110V. You will need to make sure that you have the right cord end for your PSU to match the receptacle, picking the wrong one can cost you a few days of mining if it has to be shipped.

If you can try and set up on a 220V circuit for 2 reasons :

– You will pull half the amps, and it is more efficient.

– Doing so requires 2 breaker spaces in your panel. Breaker sizing will depend on how many miners you plan to run. Here is the formula for calculating amps.

Watts / Voltage = Amps

Here is where you will bring the 80% rule back into play by sizing the continuous miner load to 80% of the breaker rating. 12 Amps on a 15 Amp breaker, 16 Amps max on a 20 Amp breaker, 24 Amps on a 30 amp breaker.

If/when you increase the amount of miners you are running you may want to look into PDU’s, as opposed to more receptacles. 

Location

This is something that is often overlooked to the headache and frustration of many would be miners. These machines are loud and hot .
You essentially have an electric heater that also uses an industrial fan to keep it from melting itself. This space will need to have the electrical requirements as discussed previously.

So make sure you have a space that is well ventilated with a plan to exhaust heat, and bring in fresh dust free air. I say this as using AC to cool the room will eat into your profits and may even make mining unprofitable.

The noise issue is a consideration you can sort out depending on whats available. (garage, basement, remote building)

Both of these issues can be handled with hosting, which is further explained in the information section.

Internet connection

Some miner setups have the option to use wifi. It is advisable to use a wired connection where available. This will provide a more stable connection and ensure you are submitting the expected amount of shares which is directly related to your payouts.

Please note that mining uses a negligible amount of bandwidth, and will not affect your other internet usage.

Information

You can use this information in this post as a good baseline to get you going. In addition to this you will want to research network difficulty; this readjusts every 2016 blocks to maintain a 10 minute block time on average. While this can go down it generally increases.

Solo or Pool?

You can solo mine but this is essentially a lottery even as a large scale miner. Should you chose this you can check this out as a starting point.

solo.ckpool.org 1% fee solo mining USA/DE 250 blocks solved!

Odds are most of you will join a pool. I will only say that it is in your best interest to mine at a pool that pays transaction fees (miner rewards). Then you will want to consider the fees associated with the pool.

When it comes to these pools you want them to be large enough that they are getting at least 1 block every Difficulty adjustment period. Larger pools will offer smaller rewards paid out more frequently, and vice versa.





Need help for better content !!!

Q & A

Hy there to all of you out there, white, black, yellow and avatar 😋🤣 people around the WordPress world !

Hope you are all well and safe in these troubled times we live on this beautiful planet of ours !

I come before you, to ask for your opinion and what you would like to see explained in my posts !?! Just let me know and I will try my best to accomodate your requests !

Thank you for your time !








Bitcoin – Happy Pizza Day

Pizza Day is a day of regret.

We all know the story. Laszlo Hanyecz buys two Papa John’s pizzas and some lucky guy got 10,000 BTC on this day 12 years ago. The story is like that of Peter Minuit buying Manhattan Island for $24. We can hardly believe that such a thing was possible given its value today.

The story has a lot of interesting angles.

It was the first real-world good or service purchased with bitcoin.

It established bitcoin’s price, since the two pizzas cost about $41, one BTC was about $0.0041.

There’s also Laszlo, a guy whose innovation was mining bitcoin using GPUs (graphics processing units). He acted like a drunken sailor spending 100,000 BTC on pizzas, as he did the same deal several more times that month.

RENT-SEEKING DAYDREAMS

The part that everyone fantasizes about is being that guy that bought the 10,000 BTC for $41.

We don’t fantasize about being Laszlo because we aren’t GPU programming experts. We can, however, imagine being the guy on the bitcointalk forums offering to buy bitcoin for a couple of pizzas.

Pizza Day brings out that daydream of being a bitcoin billionaire from having made a single brilliant trade. We all hate the actual guy that made this trade because we want to be him. We see the guy as lucky, as having won the lottery and we are envious.

This fantasy is borne of a fiat mentality.

This hierarchy of values comes from fiat money. The desire is to be lucky instead of good. We would rather do no work and make money rather than provide goods and services and get paid.

It’s telling that the regret is about missed-out luck rather than missed-out innovation.

It’s easier in a fiat world to dream about being the guy that sold pizza than being the guy who had the foresight to mine with GPUs.

This is fiat accomplishment, getting lucky with money, versus real accomplishment which is earning the money by providing goods and services to the market.

Most people would rather get lucky being associated with an innovator than be the innovator themselves !!!

Free Spirit’s Wondering…

Some moments of my online wondering…

R&D, wisdom, knowledge, curiosities, answers and many more questions 🙂🤣🙃




You have a Choice !!!

Power to the People !!!
Wake the F… Up !!!
No more excuses, you have a choice now !!!

WHO as in WORLD HEALTH ORGANISATION

P F I Z E R  Insider

Poem of the Legacy

Being Curious…

Of course it doesn’t comply…

The Problem with centralized Social-Media

10 Principles of Strategic Leadership

Global Reserve Currency

Psychology of a Market Cycle


Success

Triangle of Success



Be like a Tree…

If anyone understands this please enlighten me too 😊🤭🤗

http://www.revelationtimelinedecoded.com

ESG

For those that think WE are the Center of the Universe 🤣😅😂

Confident vs. Insecure People

Day by day…

Managing Complex Change

The Cone of Learning

The Hero’s Journey

Electromagnetic Field of the Heart

I-Ching

Language creates Reality

Sex Organs of the Machine World


Philosopher’s Stone

Isaac Newton

Abracadabra

Singularity

Multi-Mind Thought Control Process
APPLE INC.

Retrocausality

CERN


EGO

SYSCOIN ECOSYSTEM


JagStein

SysCoin

Bitcoin might bury FIAT 🙂 🤭 🙃

DEFI Ecosystem on Ethereum

DeFi Stack


Bitcoin Mining Ecosystem Map

…the other 6 Billion

bitcoin

This is about the other 6 Billion…

Top NFT Projects



Defender of the Flower

Flower of Life

Sacred Geometry

Seed & Flower of Life

Knowledge – An Antidote to Fear

JOIN THE REVOLUTION 😋 🤣 😋

Emotion – Judgement – Action

…violent recolution inevitable.

E S B I

Every generation…

LOVE YOUR RAGE
NOT YOUR CAGE

Revolution

The Times – January 3, 2009

REVOLUTION

Bitcoin Genesis Block – 03 January 2009

Introduction to Bitcoin

Introduction to Decentralized Finance

Introduction to Digital Currencies










All Metals We Mined

Map to Multiplication
Nikola Tesla

Top VC’s Investing in BlockChain Companies

Athmospheres of the Solar System

Global GDP 2021

Map of CyberSecurity Domains

21 Questions

Six Innovation Models

What May Happen in the next 100 Years

Abstract – “…to pull the body out
of dimension so that the person
can walk through solid objects
such as wooden doors.”
Okay 🤯 😳 🤯 ?¿?

China’s Social Credit System

Blockchain Platforms Comparison (BCP)


ARISE



With 💚

Anarchy Legacy

A Crypto Anarchist’s Legacy

Airfoil Dec 20, 2018

Timothy May on the cover of the second issue of Wired magazine with 2 fellow cypherpunks

Sadly, this past week we lost an icon that helped to spur the cypherpunk movement. Timothy May, who wrote The Crypto Anarchist Manifesto in 1988, lauched a movement that is still very prominent today.

For the uninitiated, a Crypto-Anarchist focuses on subverting the current laws and using new technologies to the benefit of the common man.

In the original manifesto, May says crypto-anarchy focuses on “encryption, digital money, anonymous networks, digital pseudonyms, zero-knowledge, reputations, information markets, black markets, collapse of governments”.

The manifesto was written just before the first crypto wars began during the early 1990’s.

The governments of the world fiercely opposed the general public using cryptographic encryption protocols.

The idea that a normal citizen could completely hide what they say in an electronic message was their biggest concern.

The governments cited national security as a concern (We’ve heard this excuse used many times before).

Tim May was embroiled in the center of this alongside his group of fellow cypherpunks.

RSA Security, a leading computer securty company founded by world-renowned cryptologists, created this poster against a hardware chip that used a US-government supplied encryption standard

The legislation of the anti-encryption laws would also affect payment processing technology. There was a large push back from tech companies that would have to deal with these issues first-hand.

The crypto wars of the 1990’s ended with the concession from the government that encryption was readily available around the world.

The public had won their first bout against the government surveillance state. Alongside the public, you had the cypherpunks and large tech companies that were all fighting a common threat.

There was not much of an issue in terms of encryption for quite a few more years.

Every few years afterward, the idea of backdoors into encryption schemes were brought up but nothing ever came about these new ideations.

The Crypto Wars Redux

The expansion of computational power and development of more efficient processing equipment closed the gap as to who can gain access to encryption software.

The widespread availabilty of software/hardware that can perform these cryptographic calculations involved in encryption and the ease of use has made it possible for the layman to encrypt their own personal messages, video calls,emails, and notes.

Encrypting an email with someone who has never imported a key to their keyring, or generated their own PGP public/private key pair is a thing of the past.

Many of the services that exist today offer these solutions out of the box. The process has become much easier for all parties involved.

Anyone that is now using this technology benefits from this on a privacy and security level.

With all parties benefitting, the leviathan rears its head once more. Australia has passed an anti-encryption bill that will force large tech companies to allow the Australian government to obtain hardware access(citing national security as a major reason).

Outrage has spilled out of the larger tech companies. The end-to-end zero knowledge messaging/calling app, Signal, has taken a stand against this bill.

This sounds very similar to the issues Tim May was battling with during the early days of the First Crypto War.

The cypherpunks came out on top and I’m sure this legislation will face a similar fate.

May’s Impact on the World

The imprint that Timothy May left on the world is profound. The mass adoption of encryption as well as cryptocurrencies shows just how far ahead of the times he was.

May urged the importance of privacy.

He insisted on the use of encryption to keep your communications private.

Currently on a majority of mobile phones there are applications that provide encrypted communications. Whatsapp uses the Signal protocol which was developed by cypherpunk Moxie Marlinspike.

The rise of cryptocurrencies is an ideal that May was very hopeful for.

May did come out against the anti-privacy issues of bitcoin.

There are projects that offer solutions for this privacy debate.

Much of the developer-base of these certain cryptocurrencies have their foundation based in the cypherpunk tradition.

The Cryptocurrencies that aim for a privacy by default mechanism are monero and the soon to launch GRIN which uses the Mimblewimble Protocol (To see an extremely entertaining introduction to the GRIN project via talk-to-text chat for privacy preservation, listen to the creator of Grin).

Zcash is moving in the direction of private by default and the superior cryptography of the ZK range proofs will help to create a very private cryptocurrency.

Cody WIlson and Amir Taaki who worked on projects focused on the crypto-anarchic tradition including Dark Wallet and Defense Distributed

The impact Tim May made on the world by helping to create a social movement shows the importance and strength of his ideals.

He has impacted a generation of people that are growing up in the digital age.

He influenced builders in the 21st century.

You have people creating new currencies, exposing government surveillance on a national scale, circumventing the broken bueracratic system by creating their own markets, anonymous internet protocols, as well as making encryption applicable to the common man (You can find a list of prominent cypherpunks here and also here).

There isn’t enough that can be said about the applications in which he believed could positively affect us.

May was cognizant of the encroaching all-seeing eye of the state but I believe we are in much better shape now than we’ve ever been.

There may be negative news about what we currently face as individuals, from the unprecedented surveillance of the Snowden leaks to the aforementioned Australian anti-encryption bill, but looking at the grand scheme of our daily lives, these tools and their functions have helped to create a much better day than May could have imagined in 1988.

He was a proponent for the industriousness of human nature to outpace the slow moving regulation that would try to bog down any progress.

You can listen here to what he thought people/creators should do when they develop ground breaking technology.

Arise, you have nothing to lose but your barbed wire fences!

Timothy C. May – “The Crypto Anarchist Manifesto”

Shared with 💚 by Free Spirit

✌ & 💚

Arise…

Timothy C. May

Arise, you have nothing to lose but your barbed wired fences!

Timothy C. May

Wonder In Peace bright mind!

Thanks for the guidance and wisdom!

The world will never know how much they owe you!

✌ & 💚


Shared with 💚 by Free Spirit
& 💚



Cypherpunk’s Manifesto

A Cypherpunk’s Manifesto

Eric Hughes

by Eric Hughes

” Privacy is necessary for an open society in the electronic age.

Privacy is not secrecy.

A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know.

Privacy is the power to selectively reveal oneself to the world.

If two parties have some sort of dealings, then each has a memory of their interaction.

Each party can speak about their own memory of this; how could anyone prevent it?

One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all.

If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties.

The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.

Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction.

Since any information can be spoken of, we must ensure that we reveal as little as possible.

In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am.

When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees.

When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.

Therefore, privacy in an open society requires anonymous transaction systems.

Until now, cash has been the primary such system.

An anonymous transaction system is not a secret transaction system.

An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.

Privacy in an open society also requires cryptography.

If I say something, I want it heard only by those for whom I intend it.

If the content of my speech is available to the world, I have no privacy.

To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy.

Furthermore, to reveal one’s identity with assurance when the default is anonymity requires the cryptographic signature.

We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence.

It is to their advantage to speak of us, and we should expect that they will speak.

To try to prevent their speech is to fight against the realities of information.

Information does not just want to be free, it longs to be free.

Information expands to fill the available storage space.

Information is Rumor’s younger, stronger cousin;

Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.

We must defend our own privacy if we expect to have any.

We must come together and create systems which allow anonymous transactions to take place.

People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers.

The technologies of the past did not allow for strong privacy, but electronic technologies do.

We the Cypherpunks are dedicated to building anonymous systems.

We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.


Cypherpunks write code.


We know that someone has to write software to defend privacy, and since we can’t get privacy unless we all do, we’re going to write it.

We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide.

We don’t much care if you don’t approve of the software we write.

We know that software can’t be destroyed and that a widely dispersed system can’t be shut down.

Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act.

The act of encryption, in fact, removes information from the public realm.

Even laws against cryptography reach only so far as a nation’s border and the arm of its violence.

Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.

For privacy to be widespread it must be part of a social contract.

People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one’s fellows in society.

We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves.

We will not, however, be moved out of our course because some may disagree with our goals.

The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.

Onward.

Eric Hughes

 <hughes@soda.berkeley.edu>

9 March 1993


☆ Long Live the CypherPunks ☆


The world is in debt for your bright minds, even if it doesn’t know…

It’s minds like yours that always have changed the face of the earth for a better brighter future !

KUDOS TO YOU ALL !!!




Shared with 💚 by Free Spirit

✌ & 💚



BitHouse with 💚