The Laws are Unjust

As we’ve seen over the many years that this rag has been written (and beyond) companies who are able to fund whole teams dedicated to data security have been wholly ineffective at storing that data safely.

With the passage of this new law EU officials are actively putting citizens in harm’s way by irresponsibly trying to force bitcoin users to collect and store each other’s data. This is if you believe that is the actual intention behind this move.

In reality, this move likely serves as a pure intimidation tactic to coerce people to use trusted third parties when transacting with bitcoin.

A heavy handed shove into easily controlled vectors. If too many users are in control of their own private keys, run their own nodes, and are up to date on best privacy practices when transacting it is much harder to stop bitcoin.

And make no mistake, these people want to stop bitcoin at all costs.

They do not want you to be free.

They are quickly losing their grasp of control on the populace and they are moving as quickly as possible to clamp down in an attempt to retain control.

You are not meant to have privacy in their eyes. You are inherently a criminal in their eyes. These people think you are disgusting cattle who needs to be led at every turn.

It does not have to be this way. You do not have to succumb to the madness of these people. All it takes are a few decisions.


Speak up!

Act!

Disobey!


There is a silent majority out there who knows this type of attempted control is inherently wrong.


It is anti-human!

It is evil!


This silent majority needs to begin developing the courage to speak up.

Call out the abject insanity of allowing unelected institutions like the Financial Action Task Force write freedom restricting guidelines that get adopted by governments like the EU.

Learn how to run your own node, how to produce your own private/public key pairs, and how to destroy chain analysis heuristics with privacy best practices.


Make the tyrant’s job as hard as possible!

Disobey!


Stand up and defend freedom in the Digital Age by actively defying their unjust laws.


“If a law is unjust, a man is not only right to disobey it, he obligated to do so.”


It is your duty as an individual to disobey these incredibly invasive and tyrannical “laws”.

If you don’t disobey your progeny may not have the opportunity to. The time to counter punch is right now. Get on it.


Source: https://tftc.io/








Convergence of blockchain with AI and IOT


IoT and AI are growing exponentially

Internet of Things – IoT

A future of transacting intelligent machines


• Individually, each of these technologies deserves all the attention they’re getting as enablers and disruptors

• But, taken together?

• Their transformative effect becomes multiplicative

A future driven by machine connectivity, data exchange and commercial services:

  • IoT connects billions of machines and sensors generate unprecedented quantities of real-time data
  • AI enables the machines to act on data and trigger services
  • Blockchain functions are the transaction layer where data and service contracts are securely stored and payments for services are settled

How does blockchain support intelligent connected machines?


Smart Contracts enable self-executing and self-enforcing contractual states

  • Custom financial instruments (tokens), records of ownership of an underlying physical asset (smart property), any
  • complex business logic that can be programmable
  • Can such applications be ideal for intelligent (AI) and connected (IoT) machines?
  • These machines are intelligent enough to negotiate contracts, but need a technology allowing them to securely sign and enforce them

Digital currencies create new forms of money

  • Programmable and active
  • Will such money be ideal for intelligent (AI) and connected (IoT) machines?
  • These machines will need digital currency to pay for services assigned through the smart contracts

How will the three technologies work together?


IoT – Internet of Things

  • Sensors allow us to cost-effectively gather tremendous amounts of data.
  • Connectivity allows us to transmit/broadcast these data.
  • But, there is a missing element: intelligence to process these data.

AI – Artificial Intelligence

  • Intelligence at the very edges of the network (mini-brains).
  • Combine with IoT and you have the ability to recognize meaningful patterns buried in mountains of data in ways that would be impossible for most humans, or even non-AI algorithms, to do.
  • But, there is a missing element: a secure storage layer for data and a transaction layer for services

DLT (blockchain) – Distributed Ledger Technology

  • Decentralized governance, coupled with no single point of failure, disintermediation, unalterable and searchable records of events.
  • Digital currencies and tokenized custom financial instruments.
  • Combine with AI and IoT and you have a new world of autonomous systems interacting with each other, procuring services from each other and settling transactions.

The technology stack of the future


Technology Stack of the Future

Toward a world of machine commerce


A world of Machine Commerce

M2M will need SSI (self-sovereign identities) – for objects!


Human Identities types

Object identities can be SSI by default

  • Multi-source, multi-verifier
  • Digitally signed, verifiable credentials that can prove issuer, holder and status
  • Secure peer-to-peer connections (permanent or session-based)
  • Exchange full credentials, partial credentials or ZKPs derived from credentials

Next milestone: Decentralized Organizations (DOs)


DOs are good at:

  • Coordinating resources that do not know/trust each other (including hybrid
  • H/M)
  • Governing in a geography-agnostic, censorship-resistant manner
  • Enabling short-term or informal organizational structures  (networks/communities)
  • Tracking and rewarding contribution

Challenges

  • Jurisdictional issues
  • Legislating new types of work for humans and work rules for machines
  • Governance modalities, including external supervision


Challenges


New/upgraded system architectures

• From legacy to blockchain/AI/IoT-native systems
• Integration, interoperability, backward compatibility
• ROI obvious ex post, difficult ex ante – Bootstrapping

Advanced analytics capabilities

• As devices at the edge become smarter, the smart contracts enabled by blockchain platforms will require more advanced data analytics capabilities and gateways to the physical world.

New Business Models

  • Disruptive innovation will dominate – but not without boom-and-bust cycles and big failures along the way.
  • Winners will NOT be the ones focusing on efficiency gains, but on disruptive models.

Key takeaways

• IoT, AI and DLT (blockchain) are foundational and exponentially growing technologies

  • When combined, they will create a new internet of connected, intelligent and commercially transacting machines
  • An era machine-to-machine (M2M) and human-to-machine (H2M) commerce is likely to emerge, with profound consequences on social and economic dynamics
  • New forms of corporations or organizational formats (code-only, autonomous) will emerge

• There are numerous challenges that must be overcome

  • IoT has outpaced the human internet, but is still a largely passive, insecure and privacy-vulnerable network
  • AI has made huge leaps, but still requires immense computational resources and is largely incompatible with edge computing
  • DLT is a new technology, largely untested at scale; both smart contracts and digital assets lack the regulatory clarity required for mass adoption

This work is available under a Creative Commons Attribution-Non-Commercial-No Derivatives license
© University of Nicosia,
Institute for the Future, unic.ac.cy/blockchain





With 💚

P.O.W In Human History


Proof Of Work

in the

History of Humankind


Great Pyramid of Giza (a.k.a)
Pyramid of Khu
Egypt

The Great Pyramid of Giza (also known as the Pyramid of Khufu or the Pyramid of Cheops) is the oldest and largest of the  pyramids in the Giza pyramid complex  bordering present-day Giza  in Greater Cairo, Egypt.

It is the oldest of the Seven Wonders of the Ancient World, and the only one to remain largely intact.

Egyptologists conclude that the pyramid was built as a tomb for the Fourth Dynasty  Egyptian pharaoh Khufu and estimate that it was built in the 26th century BC during a period of around 27 years.

Initially standing at 146.5 metres (481 feet), the Great Pyramid was the tallest man-made structure in the world for more than 3,800 years.

Over time, most of the smooth white limestone casing was removed, which lowered the pyramid’s height to the present 138.5 metres (454.4 ft).

What is seen today is the underlying core structure. The base was measured to be about 230.3 metres (755.6 ft) square, giving a volume of roughly 2.6 million cubic metres (92 million cubic feet), which includes an internal hillock.

The dimensions of the pyramid were 280 royal cubits (146.7 m; 481.4 ft) high, a base length of 440 cubits (230.6 m; 756.4 ft), with a seked of 5+1/2 palms (a slope of 51°50’40”).

The Great Pyramid was built by quarrying an estimated 2.3 million large blocks weighing 6 million tonnes total.

The majority of stones are not uniform in size or shape and are only roughly dressed.The outside layers were bound together by mortar.

Primarily local limestone from the Giza Plateau was used. Other blocks were imported by boat down the Nile: White limestone from Tura for the casing, and granite blocks from Aswan, weighing up to 80 tonnes, for the King’s Chamber structure.

There are three known chambers inside the Great Pyramid. The lowest was cut into the bedrock, upon which the pyramid was built, but remained unfinished. The so-called Queen’s Chamber and King’s Chamber, that contains a granite sarcophagus, are higher up, within the pyramid structure. Khufu’s vizier, Hemiunu (also called Hemon), is believed by some to be the architect of the Great Pyramid.

Many varying scientific and alternative hypotheses attempt to explain the exact construction techniques.

The funerary complex around the pyramid consisted of two mortuary temples  connected by a causeway (one close to the pyramid and one near the Nile), tombs for the immediate family and court of Khufu, including three smaller pyramids for Khufu’s wives, an even smaller “satellite pyramid” and five buried solar barges.


Flavian Amphitheatre
a.k.a Colloseum
Rome – Italy

The Colosseum (Colosseo[kolosˈsɛːo]) is an oval amphitheatre in the centre of the city of Rome, Italy, just east of the Roman Forum.

It is the largest ancient amphitheatre ever built, and is still the largest standing amphitheatre in the world today, despite its age.

Construction began under the emperor Vespasian (r. 69–79 AD) in 72 and was completed in 80 AD under his successor and heir, Titus (r. 79–81).

Further modifications were made during the reign of Domitian (r. 81–96).

The three emperors that were patrons of the work are known as the Flavian dynasty, and the amphitheatre was named the Flavian Amphitheatre (Latin: Amphitheatrum Flavium; Italian: Anfiteatro Flavio[aɱfiteˈaːtro ˈflaːvjo]) by later classicists and  archaeologists for its association with their family name (Flavius).

The Colosseum is built of travertine limestone, tuff (volcanic rock), and brick-faced concrete.

The Colosseum could hold an estimated 50,000 to 80,000 spectators at various points in its history  having an average audience of some 65,000; it was used for gladiatorial  contests and  public spectacles including  animal hunts, executions, re-enactments of famous battles, and dramas based on Roman mythology, and briefly mock sea battles.

The building ceased to be used for entertainment in the early medieval era.

It was later reused for such purposes as housing, workshops, quarters for a religious order, a fortress, a quarry, and a Christian shrine.

Although substantially ruined because of earthquakes and stone-robbers (for spolia), the Colosseum is still an iconic symbol of Imperial Rome and was listed as one of the New 7 Wonders of the World.

It is one of Rome’s most popular tourist attractions and also has links to the Roman Catholic Church, as each Good Friday  the Pope leads a torchlit “Way of the Cross” procession that starts in the area around the Colosseum.

The Colosseum is also depicted on the Italian version of the five-cent euro coin.


The Ming dynasty
Great Wall
at Jinshanling

The Great Wall of China (traditional Chinese: 萬里長城; simplified Chinese: 万里长城; pinyinWànlǐ Chángchéng) is a series of fortifications that were built across the historical northern borders of ancient Chinese states and Imperial China as protection against various nomadic groups from the Eurasian Steppe.

Several walls were built from as early as the 7th century BC,with selective stretches later joined together by Qin Shi Huang  (220–206 BC), the first emperor of China.

Little of the Qin wall remains. Later on, many successive dynasties built and maintained multiple stretches of border walls. The best-known sections of the wall were built by the Ming dynasty (1368–1644).

Apart from defense, other purposes of the Great Wall have included border controls, allowing the imposition of duties on goods transported along the Silk Road, regulation or encouragement of trade and the control of immigration and emigration.

Furthermore, the defensive characteristics of the Great Wall were enhanced by the construction of watchtowers, troop barracks, garrison stations, signaling capabilities through the means of smoke or fire, and the fact that the path of the Great Wall also served as a transportation corridor.

The frontier walls built by different dynasties have multiple courses. Collectively, they stretch from Liaodong in the east to Lop Lake in the west, from the present-day Sino–Russian border in the north to Tao River (Taohe) in the south; along an arc that roughly delineates the edge of the Mongolian steppe; spanning 21,196.18 km (13,170.70 mi) in total.

Today, the defensive system of the Great Wall is generally recognized as one of the most impressive architectural feats in history.


As history has left behind, monumental architectural constructions that we can admire and reamain in awe as we look at them, after thousands of years since the first stone was put, in today’s world our digital PoW can be seen and admired the same as the Great Wall of China or the Piramid of Giza !!!

Wich brings us to the question, what is Free talking about ?!?


Long Live the CypherPunks

CypherPunks Write Code

Genesis

Bitcoin Genesis Block
Mined 03 January 2009

The Times
January 3, 2009

Bitcoin – Proof Of Work


Bitcoin-type Proof Of Work


In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work digital currency that, like Finney’s RPoW, is also based on the Hashcash PoW.

But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW.

Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are “mined” using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network.

The difficulty is periodically adjusted to keep the block time around a target time.

Since the creation of Bitcoin, proof-of-work has been the predominant design of peer-to-peer cryptocurrency. Studies have estimated the total energy consumption of cryptocurrency mining.

The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. Recent estimates from the University of Cambridge put Bitcoin’s energy consumption as equal to that of Switzerland.

History modification

Each block that is added to the blockchain, starting with the block containing a given transaction, is called a confirmation of that transaction.

Ideally, merchants and services that receive payment in the cryptocurrency should wait for at least one confirmation to be distributed over the network, before assuming that the payment was done.

The more confirmations that the merchant waits for, the more difficult it is for an attacker to successfully reverse the transaction in a blockchain—unless the attacker controls more than half the total network power, in which case it is called a 51% attack.

2ASICs and mining pools

Within the Bitcoin community there are groups working together in mining pools.

Some miners use application-specific integrated circuits (ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.

Some PoWs claim to be ASIC-resistant,  i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude.

ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a 51% attack against a cryptocurrency.


Plant the Seed
The choice is Yours

Choose Wisely
The Choice is Yours




With 💚


Free Spirit’s Wondering…

Some moments of my online wondering…

R&D, wisdom, knowledge, curiosities, answers and many more questions 🙂🤣🙃




You have a Choice !!!

Power to the People !!!
Wake the F… Up !!!
No more excuses, you have a choice now !!!

WHO as in WORLD HEALTH ORGANISATION

P F I Z E R  Insider

Poem of the Legacy

Being Curious…

Of course it doesn’t comply…

The Problem with centralized Social-Media

10 Principles of Strategic Leadership

Global Reserve Currency

Psychology of a Market Cycle


Success

Triangle of Success



Be like a Tree…

If anyone understands this please enlighten me too 😊🤭🤗

http://www.revelationtimelinedecoded.com

ESG

For those that think WE are the Center of the Universe 🤣😅😂

Confident vs. Insecure People

Day by day…

Managing Complex Change

The Cone of Learning

The Hero’s Journey

Electromagnetic Field of the Heart

I-Ching

Language creates Reality

Sex Organs of the Machine World


Philosopher’s Stone

Isaac Newton

Abracadabra

Singularity

Multi-Mind Thought Control Process
APPLE INC.

Retrocausality

CERN


EGO

SYSCOIN ECOSYSTEM


JagStein

SysCoin

Bitcoin might bury FIAT 🙂 🤭 🙃

DEFI Ecosystem on Ethereum

DeFi Stack


Bitcoin Mining Ecosystem Map

…the other 6 Billion

bitcoin

This is about the other 6 Billion…

Top NFT Projects



Defender of the Flower

Flower of Life

Sacred Geometry

Seed & Flower of Life

Knowledge – An Antidote to Fear

JOIN THE REVOLUTION 😋 🤣 😋

Emotion – Judgement – Action

…violent recolution inevitable.

E S B I

Every generation…

LOVE YOUR RAGE
NOT YOUR CAGE

Revolution

The Times – January 3, 2009

REVOLUTION

Bitcoin Genesis Block – 03 January 2009

Introduction to Bitcoin

Introduction to Decentralized Finance

Introduction to Digital Currencies










All Metals We Mined

Map to Multiplication
Nikola Tesla

Top VC’s Investing in BlockChain Companies

Athmospheres of the Solar System

Global GDP 2021

Map of CyberSecurity Domains

21 Questions

Six Innovation Models

What May Happen in the next 100 Years

Abstract – “…to pull the body out
of dimension so that the person
can walk through solid objects
such as wooden doors.”
Okay 🤯 😳 🤯 ?¿?

China’s Social Credit System

Blockchain Platforms Comparison (BCP)


ARISE



With 💚

Staking Vs. Yield Farming Vs. Liquidity Mining

staking-vs-yield-farming-vs-liquidity-mining

Staking Vs. Yield Farming Vs. Liquidity Mining – Key Differences

The DeFi space is growing, and there is no reason to deny it. Enterprises and individuals want to capitalize on the benefits of decentralized finance with the newly emerging solutions. Decentralized finance has not only opened up the possibilities for improved financial inclusion throughout the world but also strengthened the possibilities for using and managing digital assets.

The most notable factor which comes up in discussions about DeFi trading would refer to the staking vs. yield farming vs. liquidity mining differences.

All three of them are popular solutions in the domain of DeFi for obtaining plausible returns on crypto assets.

The three approaches differ in the way participants have to pledge their crypto assets in decentralized protocols or applications. 

In addition, the underlying technologies also provide further indications of differences between staking and the other two approaches.

Understanding Yield Farming

The first thing that you should take into account about yield farming is its definition. Yield generation is a popular approach for obtaining returns on crypto assets.

Basically, it offers a flexible approach for earning passive income through depositing crypto assets in a liquidity pool.

The liquidity pools in the case of yield farming could refer to bank accounts in the conventional sense.

Yield generation is the practice that involves investors locking in their crypto assets in liquidity pools based on smart contracts.

The assets locked in the liquidity pools are available for other users to borrow in the same protocol. 

Yield farming is a crucial aspect of the DeFi ecosystem as it supports the foundation of DeFi protocols for enabling exchange and lending services.

It is also essential for maintaining the liquidity of crypto assets on different decentralized exchanges or DEXs.

Yield farmers could also earn rewards in the form of APY. 

Working of Yield Generation

In order to develop a better impression of yield generation in staking vs. yield farming vs. liquidity mining, it is important to understand how to yield generation works. First of all, it is important to note that Automated Market Makers or AMMs are responsible for yield farming. 

AMMs are just smart contracts that leverage mathematical algorithms for enabling  digital asset trading.

Automated Market Makers play a highly critical role in yield farming for maintaining consistent liquidity as the transactions do not need any counterparties for the transaction.

You could find two distinct components in AMMs such as liquidity pools and liquidity providers. 

Liquidity pools are basically the smart contracts that drive the DeFi ecosystem. The pools include digital assets which can help users in purchasing, selling, borrowing, lending, and swapping tokens.

Liquidity providers are the users or investors who have locked their assets in the liquidity pool.

Yield farming also offers a plausible foundation for easier trading of tokens with low trading volume in the open market. 

Risks in Yield Farming

The understanding of staking vs. yield farming vs. liquidity mining can only get better with an awareness of risks with each.

It is important to note that yield generation offers high risk and high reward ventures for investment.

The notable risks with yield farming include impermanent loss, smart contract risk, composability risk, and liquidation risk.   

Understanding Staking

The second important entry in a debate on staking vs. yield farming vs. liquidity mining would obviously bring another notable and common consensus algorithm. Staking is basically an interesting way of pledging crypto assets as collateral in the case of blockchain networks leveraging the Proof-of-Stake algorithm. Just like miners use computational power for achieving consensus in Proof-of-Work blockchains, users with the highest stakes are selected for validating transactions on the PoS blockchains. 

Working of the Proof of Stake Consensus

You might be wondering about the potential rewards for staking your crypto assets in a PoS blockchain-based DeFi protocol. First of all, you are investing in a highly scalable blockchain consensus algorithm with staking, which also ensures improved energy efficiency. Proof-of-Stake algorithms also create new avenues of opportunities for earning rewards. 

With higher stakes in the protocol, investors could get better rewards from the network. It is important to note that rewards in the case of staking are allocated on-chain. Therefore, new tokens of the cryptocurrency are minted and distributed as staking rewards for the validation of each block. PoS blockchain does not imply the need for expensive computational equipment, thereby providing better usability. 

Risks in Staking

The risks associated with Proof-of-Stake protocols are also another highlight in discussions on staking vs. yield farming vs. liquidity mining.

Interestingly, the aspect of risk is considerably lower in the case of staking when compared to other approaches for passive investment. You should note that the safety of the staked tokens depends directly on the safety of the protocol. 

At the same time, you would still notice some prominent risks in staking cryptocurrencies, such as slashing, volatility risks, validator risks, and server risks. In addition, you might have to encounter issues of loss or theft of funds, waiting periods for rewards, project failure, liquidity risks, minimum holdings, and extended lock-up periods. 

Understanding Liquidity Mining

The final entry in the staking vs. yield farming vs. liquidity mining also deserves adequate attention when it comes to discussions on DeFi. As a matter of fact, liquidity mining serves as the core highlight in any DeFi project. Furthermore, it also focuses on offering improved liquidity in the DeFi protocols

Participants have to offer their crypto assets to liquidity pools in DeFi protocols for the purpose of crypto trading. However, it is important to note that participants do not offer crypto assets into liquidity pools for crypto lending and borrowing in the case of liquidity mining. Investors place their crypto assets in trading pairs such as ETH/USDT, and the protocol offers a Liquidity Provider or LP token to them. 

Working of Liquidity Mining

A deeper understanding of how liquidity mining works can help in anticipating its differences with the other strategies for crypto investment.

The investors would receive rewards from the protocol for the tokens they place in the liquidity pool.

The rewards in liquidity mining are in the form of native governance tokens, which are mined at every block. 

In addition, investors also have the LP token from the first stage of locking their crypto assets into the liquidity pool.

It is important to note that the reward in liquidity mining depends profoundly on the share in total pool liquidity.

Furthermore, the newly minted tokens could also offer access to governance of a project alongside prospects for exchanging to obtain other cryptocurrencies or better rewards. 

Risks in Liquidity Mining

The understanding of staking vs. yield farming vs. liquidity mining would be complete with an impression of their risks.

Just like the other two approaches, liquidity mining also presents some notable risks such as impermanent loss, smart contract risks, and project risks. In addition, liquidity miners are also vulnerable to the rug pull effect in their projects. 

Staking vs. Yield Farming vs. Liquidity Mining – Key Differences

Staking vs Yield Farming vs Liquidity Mining
Staking vs Yield Farming vs Liquidity Mining

The differences between the three players in staking vs. yield farming vs. liquidity mining would refer directly to some key pointers. Here are some of them outlined in brief for your understanding. 

Yield farming is a proven approach for investing your crypto assets in liquidity pools of protocols.

Staking involves locking your crypto assets in the protocol in return for privileges to validate transactions on the protocol.

Liquidity mining involves locking in crypto assets in protocols in return for governance privileges in the protocol.

In terms of objectives, yield farming aims to offer you the highest possible returns on the crypto assets of users. On the other hand, liquidity mining focuses on improving liquidity of a DeFi protocol. Furthermore, staking emphasizes maintaining the security of a blockchain network.

Bottom Line 

On a concluding note, it is quite clear that staking as well as yield generation and liquidity miners provide distinct approaches for investing crypto assets.

The growing attention towards crypto assets is undoubtedly opening up many new opportunities for investors.

However, investors need to understand the strategies they need to follow for the type of returns they are expecting. 

Therefore, a clear impression of staking vs. yield farming vs. liquidity mining  differences could help in making a plausible decision.

Yield generation, liquidity mining, and Proof-of-Stake blockchains also have some setbacks you should look for.

Start discovering more about yield farming and the other two crypto investment strategies now.


*Disclaimer: The article should not be taken as, and is not intended to provide any investment advice. Claims made in this article do not constitute investment advice and should not be taken as such. 101 Blockchains shall not be responsible for any loss sustained by any person who relies on this article. Do your own research!

Shared with 💚 by Free Spirit

✌ & 💚

BitHouse with 💚