Bitcoin surges after accidentally released Treasury statement
Prices of Bitcoin and other cryptocurrencies have soared following the apparent accidental release of a U.S. Treasury statement on Biden’s expected executive order on digital assets.
The premature statement by Treasury Secretary Yellen, which was dated March 9, has since been removed.
“President Biden’s historic executive order calls for a coordinated and comprehensive approach to digital asset policy. This approach will support responsible innovation that could result in substantial benefits for the nation, consumers, and businesses.
It will also address risks related to illicit finance, protecting consumers and investors, and preventing threats to the financial system and broader economy.”
Quote from the now deleted statement
At the time of writing, Bitcoin is up nearly 8% in the last 24 hours.
Biden’s executive order aims to regulate the crypto market while also reaping the benefits of digital currencies.
So far, like most countries in the world, the US has tended to react to developments and has limited itself to pointing to a political-economic approach that is yet to be developed.
Statement by Secretary of the Treasury Janet L. Yellen on President Biden’s Executive Order on Digital Assets
March 9, 2022
WASHINGTON – U.S. Secretary of the Treasury Janet L. Yellen released the following statement on President Biden’s executive order on digital assets.
“President Biden’s historic executive order calls for a coordinated and comprehensive approach to digital asset policy. This approach will support responsible innovation that could result in substantial benefits for the nation, consumers, and businesses. It will also address risks related to illicit finance, protecting consumers and investors, and preventing threats to the financial system and broader economy.
Under the executive order, Treasury will partner with interagency colleagues to produce a report on the future of money and payment systems. We’ll also convene the Financial Stability Oversight Council to evaluate the potential financial stability risks of digital assets and assess whether appropriate safeguards are in place. And, because the questions raised by digital assets often have important cross-border dimensions, we’ll work with our international partners to promote robust standards and a level playing field.
This work will complement ongoing efforts by Treasury. Already, the Department has worked with the President’s Working Group on Financial Markets, the FDIC, and OCC to study one particular kind of digital asset – stablecoins– and to make recommendations. Under the executive order, Treasury and interagency partners will build upon the recently published National Risk Assessments, which identify key illicit financing risks associated with digital assets.
As we take on this important work, we’ll be guided by consumer and investor protection groups, market participants, and other leading experts. Treasury will work to promote a fairer, more inclusive, and more efficient financial system, while building on our ongoing work to counter illicit finance, and prevent risks to financial stability and national security.”
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Why this crazyness with rabbits ?!? And their holes, you would ask ?!? Why is the rabbit hole so deep ?¿
And what does the rabbit hole has to do with that BitCorn thing I keep hearing about all over the place ?¿
I like to start from the begining, as I think so I am 😋😂
Rabbit Hole is a play written by David Lindsay-Abaire. It was the recipient of the 2007 Pulitzer Prize for Drama. The play premiered on Broadway in 2006, and it has also been produced by regional theatres in cities such as Los Angeles, Philadelphia and Pittsburgh. The play had its Spanish language premiere in San Juan, Puerto Rico in Autumn of 2010.
The play deals with the ways family members survive a major loss, and includes comedy as well as tragedy. Cynthia Nixon won the 2006 Tony Award for Best Performance by a Leading Actress in a Play for her performance as Becca in the New York production, and the play was nominated for several other Tony awards.
Rabbit Hole
A situation, journey, or process that is particularly strange, problematic, difficult, complex, or chaotic, especially one that becomes increasingly so as it develops or unfolds.
An allusion to “Alice’s Adventures in Wonderland” by Lewis Carroll, it is used especially in the phrase “(go) down the rabbit hole.”
Overhauling the current tax legislation is a rabbit hole I don’t think this administration should go down at this point.I’ve stayed away from drugs and alcohol since coming to college. I have an addictive personality, so I decided to just avoid that rabbit hole altogether.
What does rabbit hole mean?
Used especially in the phrase going down the rabbit hole or fallingdown the rabbit hole, a rabbit hole is a metaphor for something that transports someone into a wonderfully (or troublingly) surreal state or situation.
On the internet, a rabbit holefrequently refers to an extremely engrossing and time-consuming topic.
Where does rabbit hole come from?
Alice’s Adventures in WonderLand
Literally, a rabbit hole is what the animal digs for its home. The earliest written record of the phrase dates back to the 17th century. But the figurative rabbit hole begins with Lewis Carroll’s 1865 classic, Alice’s Adventures in Wonderland.
In its opening chapter, “Down the Rabbit-Hole,” Alice follows the White Rabbit into his burrow, which transports her to the strange, surreal, and nonsensical world of Wonderland.
Since then, Carroll’s rabbit hole has proved a popular and useful reference. The Oxford English Dictionary finds the first allusive rabbit hole in a 1938 edition of TheYale Law Journal: “It is the Rabbit-Hole down which we fell into the Law, and to him who has gone down it, no queer performance is strange.”
Over much of the 20th century, rabbit hole has been used to characterize bizarre and irrational experiences. It’s especially used to reference magical, challenging, and even dangerous places or positions, similar to Carroll’s topsy-turvy Wonderland.
Rabbit holehas many metaphorical applications—from frustrating red tape to the mind-bending complexity of science to hallucinations during altered states—all united by a common sense of passing into some labyrinthine, logic-defying realm that, once entered, is hard to get out of.
One can fall down the rabbit hole of government bureaucracy, healthcare, obtaining a green card, tax law, the political economy of modern Japan, puberty, college admissions, or quantum mechanics.
If you’re Neo in the hit film The Matrix, you can take the red pill—a pill that shows you the truth, as opposed to the blue pill, which keeps you in ignorance—and “see how deep the rabbit hole goes.”
In a related note, some people literally take pills and go down the rabbit hole of a psychedelic drug trip.
But as Kathryn Schulz observed for The New Yorker in 2015, rabbit hole has further evolved in the information age: “These days…when we say that we fell down the rabbit hole, we seldom mean that we wound up somewhere psychedelically strange. We mean that we got interested in something to the point of distraction—usually by accident, and usually to a degree that the subject in question might not seem to merit.”
Thanks to the abundance, variety, and instant access of content online, many fall down internet rabbit holes which are often spectacularly, and addictively, niche: scary stories, obscure conspiracy theories, or famous last meals, for instance.
Other rabbit holes tend to be opened up by specific services or social media, which serve users item after item, link after link: Wikipedia, Netflix, Amazon, Facebook, YouTube, and so forth.
These rabbit holes have become so common that people sometimes swap out rabbit for the name of the particular site, e.g. “I’ve fallen down an Instragram hole” or “I’m falling down a wikihole.”
Who uses rabbit hole?
From formal documents to internet status updates, rabbit hole is a very popular and widespread expression. Unlike earlier iterations of the metaphor, internet rabbit holes convey less a sense of weirdness, disorientation, or difficulty than they do of an intensely captivating diversion.
Rabbit hole is also showing increasing use as a modifier, e.g. a rabbit-hole question or phenomenon.
Now… that we have a basic and broader understanding about this Hole and it’s rabbit that digged it 😋😂
Let me show you a journey that I took to get to know, understand, admire, be amazed and support the BitCorn everybody is so crazy about …
Bitcoin Glossary
Block
Blocks are found in the Bitcoin blockchain. Blocks connect all transactions together. Transactions are combined into single blocks and are verified every ten minutes through mining. Each subsequent block strengthens the verification of the previous blocks, making it impossible to double spend bitcoin transactions (see double spend below).
BIP
Bitcoin Improvement Proposal or BIP, is a technical design document providing information to the bitcoin community, or describing a new feature for bitcoin or its processes or environment which affect the Bitcoin protocol. New features, suggestions, and design changes to the protocol should be submitted as a BIP. The BIP author is responsible for building consensus within the community and documenting dissenting opinions.
Blockchain
The Bitcoin blockchain is a public record of all Bitcoin transactions. You might also hear the term used as a “public ledger.” The blockchain shows every single record of bitcoin transactions in order, dating back to the very first one. The entire blockchain can be downloaded and openly reviewed by anyone, or you can use a block explorer to review the blockchain online.
Block Height
The block height is just the number of blocks connected together in the block chain. Height 0 for example refers to the very first block, called the “genesis block.”
Block Reward
When a block is successfully mined on the bitcoin network, there is a block reward that helps incentivize miners to secure the network. The block reward is part of a “coinbase” transaction which may also include transaction fees. The block rewards halves roughly every four years; see also “halving.”
Change
Let’s say you are spending $1.90 in your local supermarket, and you give the cashier $2.00. You will get back .10 cents in change. The same logic applies to bitcoin transactions. Bitcoin transactions are made up of inputs and outputs. When you send bitcoins, you can only send them in a whole “output.” The change is then sent back to the sender.
Cold Storage
The term cold storage is a general term for different ways of securing your bitcoins offline (disconnected from the internet). This would be the opposite of a hot wallet or hosted wallet, which is connected to the web for day-to-day transactions. The purpose of using cold storage is to minimize the chances of your bitcoins being stolen from a malicious hacker and is commonly used for larger sums of bitcoins.
Confirmation
A confirmation means that the bitcoin transaction has been verified by the network, through the process known as mining. Once a transaction is confirmed, it cannot be reversed or double spent. Transactions are included in blocks.
Cryptography
Cryptography is used in multiple places to provide security for the Bitcoin network. Cryptography, which is essentially mathematical and computer science algorithms used to encrypt and decrypt information, is used in bitcoin addresses, hash functions, and the blockchain.
Decentralized
Having a decentralized bitcoin network is a critical aspect. The network is “decentralized,” meaning that it’s void of a centralized company or entity that governs the network. Bitcoin is a peer-to-peer protocol, where all users within the network work and communicate directly with each other, instead of having their funds handled by a middleman, such as a bank or credit card company.
Difficulty
Difficulty is directly related to Bitcoin mining (see mining below), and how hard it is to verify blocks in the Bitcoin network. Bitcoin adjusts the mining difficulty of verifying blocks every 2016 blocks. Difficulty is automatically adjusted to keep block verification times at ten minutes.
Double Spend
If someone tries to send a bitcoin transaction to two different recipients at the same time, this is double spending. Once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. The more confirmations that a transaction has, the harder it is to double spend the bitcoins.
Full Node
A full node is when you download the entire blockchain using a bitcoin client, and you relay, validate, and secure the data within the blockchain. The data is bitcoin transactions and blocks, which is validated across the entire network of users.
Halving
Bitcoins have a finite supply, which makes them scarce. The total amount that will ever be issued is 21 million. The number of bitcoins generated per block is decreased 50% every four years. This is called “halving.” The final halving will take place in the year 2140.
Hash Rate
The hash rate is how the Bitcoin mining network processing power is measured. In order for miners to confirm transactions and secure the blockchain, the hardware they use must perform intensive computational operations which is output in hashes per second.
Hash (txid)
A transaction hash (sometimes referred to as a transaction ID or txid) is a unique identifier that can be used on any block explorer to look up all of the public details of a particular transaction. Every on-chain transaction has a unique hash made up of a long string of alphanumeric characters.
Mining
Bitcoin mining is the process of using computer hardware to do mathematical calculations for the Bitcoin network in order to confirm transactions. Miners collect transaction fees for the transactions they confirm and are awarded bitcoins for each block they verify.
Pool
As part of bitcoin mining, mining “pools” are a network of miners that work together to mine a block, then split the block reward among the pool miners. Mining pools are a good way for miners to combine their resources to increase the probability of mining a block, and also contribute to the overall health and decentralization of the bitcoin network.
Private Key
A private key is a string of data that shows you have access to bitcoins in a specific wallet. Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.
Proof of Work
Proof of work refers to the hash of a block header (blocks of bitcoin transactions). A block is considered valid only if its hash is lower than the current target. Each block refers to a previous block adding to previous proofs of work, which forms a chain of blocks, known as a blockchain. Once a chain is formed, it confirms all previous Bitcoin transactions and secures the network.
Public Address
A public bitcoin address is cryptographic hash of a public key. A public address typically starts with the number “1.” Think of a public address like an email address. It can be published anywhere and bitcoins can be sent to it, just like an email can be sent to an email address.
RBF
RBF stands for Replace By Fee, and refers to a method that allows a sender to replace a “stuck” or unconfirmed transaction with a new one that uses a higher fee. This is done to make sure a transaction confirms as quickly as possible. The “replacement” transaction uses the same inputs as the original one. This is not considered a double spend, as the receiving address(es) typically remain the same.
Satoshi Nakamoto
Bitcoin’s existence began with an academic paper written in 2008 by a developer under the name of Satoshi Nakamoto. Satoshi is the name used as the original inventor of Bitcoin.
Transaction
A transaction is when data is sent to and from one bitcoin address to another. Just like financial transactions where you send money from one person to another, in bitcoin you do the same thing by sending data (bitcoins) to each other. Bitcoins have value because it’s based on the properties of mathematics, rather than relying on physical properties (like gold and silver) or trust in central authorities, like fiat currencies.
Wallet
Just like with paper dollars you hold in your physical wallet, a bitcoin wallet is a digital wallet where you can store, send, and receive bitcoins securely. There are many varieties of wallets available, whether you’re looking for a web or mobile solution. Ideally, a bitcoin wallet will give you access to your public and private keys. This means that only you have rightful access to spend these bitcoins, whenever you choose to.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
The Great Pyramid of Giza (also known as the Pyramid of Khufu or the Pyramid of Cheops) is the oldest and largest of the pyramids in the Giza pyramid complex bordering present-day Giza in Greater Cairo, Egypt.
Egyptologists conclude that the pyramid was built as a tomb for the Fourth Dynasty Egyptian pharaoh Khufu and estimate that it was built in the 26th century BC during a period of around 27 years.
Initially standing at 146.5 metres (481 feet), the Great Pyramid was the tallest man-made structure in the world for more than 3,800 years.
Over time, most of the smooth white limestone casing was removed, which lowered the pyramid’s height to the present 138.5 metres (454.4 ft).
What is seen today is the underlying core structure. The base was measured to be about 230.3 metres (755.6 ft) square, giving a volume of roughly 2.6 million cubic metres (92 million cubic feet), which includes an internal hillock.
The dimensions of the pyramid were 280 royal cubits (146.7 m; 481.4 ft) high, a base length of 440 cubits (230.6 m; 756.4 ft), with a seked of 5+1/2 palms (a slope of 51°50’40”).
The Great Pyramid was built by quarrying an estimated 2.3 million large blocks weighing 6 million tonnes total.
The majority of stones are not uniform in size or shape and are only roughly dressed.The outside layers were bound together by mortar.
Primarily local limestone from the Giza Plateau was used. Other blocks were imported by boat down the Nile: White limestone from Tura for the casing, and granite blocks from Aswan, weighing up to 80 tonnes, for the King’s Chamber structure.
There are three known chambers inside the Great Pyramid. The lowest was cut into the bedrock, upon which the pyramid was built, but remained unfinished. The so-called Queen’s Chamber and King’s Chamber, that contains a granite sarcophagus, are higher up, within the pyramid structure. Khufu’s vizier, Hemiunu (also called Hemon), is believed by some to be the architect of the Great Pyramid.
Many varying scientific and alternative hypotheses attempt to explain the exact construction techniques.
The funerary complex around the pyramid consisted of two mortuary temples connected by a causeway (one close to the pyramid and one near the Nile), tombs for the immediate family and court of Khufu, including three smaller pyramids for Khufu’s wives, an even smaller “satellite pyramid” and five buried solar barges.
Flavian Amphitheatre a.k.a Colloseum Rome – Italy
The Colosseum (Colosseo[kolosˈsɛːo]) is an oval amphitheatre in the centre of the city of Rome, Italy, just east of the Roman Forum.
It is the largest ancient amphitheatre ever built, and is still the largest standing amphitheatre in the world today, despite its age.
Construction began under the emperor Vespasian (r. 69–79 AD) in 72 and was completed in 80 AD under his successor and heir, Titus (r. 79–81).
Further modifications were made during the reign of Domitian (r. 81–96).
The three emperors that were patrons of the work are known as the Flavian dynasty, and the amphitheatre was named the Flavian Amphitheatre (Latin: Amphitheatrum Flavium; Italian: Anfiteatro Flavio[aɱfiteˈaːtro ˈflaːvjo]) by later classicists and archaeologists for its association with their family name (Flavius).
The Colosseum is built of travertine limestone, tuff (volcanic rock), and brick-faced concrete.
The Colosseum could hold an estimated 50,000 to 80,000 spectators at various points in its history having an average audience of some 65,000; it was used for gladiatorial contests and public spectacles including animal hunts, executions, re-enactments of famous battles, and dramas based on Roman mythology, and briefly mock sea battles.
The building ceased to be used for entertainment in the early medieval era.
It was later reused for such purposes as housing, workshops, quarters for a religious order, a fortress, a quarry, and a Christian shrine.
Although substantially ruined because of earthquakes and stone-robbers (for spolia), the Colosseum is still an iconic symbol of Imperial Rome and was listed as one of the New 7 Wonders of the World.
It is one of Rome’s most popular tourist attractions and also has links to the Roman Catholic Church, as each Good Friday the Pope leads a torchlit “Way of the Cross” procession that starts in the area around the Colosseum.
The Colosseum is also depicted on the Italian version of the five-cent euro coin.
Several walls were built from as early as the 7th century BC,with selective stretches later joined together by Qin Shi Huang (220–206 BC), the first emperor of China.
Little of the Qin wall remains. Later on, many successive dynasties built and maintained multiple stretches of border walls. The best-known sections of the wall were built by the Ming dynasty (1368–1644).
Apart from defense, other purposes of the Great Wall have included border controls, allowing the imposition of duties on goods transported along the Silk Road, regulation or encouragement of trade and the control of immigration and emigration.
Furthermore, the defensive characteristics of the Great Wall were enhanced by the construction of watchtowers, troop barracks, garrison stations, signaling capabilities through the means of smoke or fire, and the fact that the path of the Great Wall also served as a transportation corridor.
The frontier walls built by different dynasties have multiple courses. Collectively, they stretch from Liaodong in the east to Lop Lake in the west, from the present-day Sino–Russian border in the north to Tao River (Taohe) in the south; along an arc that roughly delineates the edge of the Mongolian steppe; spanning 21,196.18 km (13,170.70 mi) in total.
Today, the defensive system of the Great Wall is generally recognized as one of the most impressive architectural feats in history.
As history has left behind, monumental architectural constructions that we can admire and reamain in awe as we look at them, after thousands of years since the first stone was put, in today’s world our digital PoW can be seen and admired the same as the Great Wall of China or the Piramid of Giza !!!
Wich brings us to the question, what is Free talking about ?!?
Long Live the CypherPunksCypherPunks Write CodeGenesisBitcoin Genesis Block Mined 03 January 2009The Times January 3, 2009Bitcoin – Proof Of Work
Bitcoin-type Proof Of Work
In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work digital currency that, like Finney’s RPoW, is also based on the Hashcash PoW.
But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW.
Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are “mined” using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network.
The difficulty is periodically adjusted to keep the block time around a target time.
Since the creation of Bitcoin, proof-of-work has been the predominant design of peer-to-peer cryptocurrency. Studies have estimated the total energy consumption of cryptocurrency mining.
The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. Recent estimates from the University of Cambridge put Bitcoin’s energy consumption as equal to that of Switzerland.
History modification
Each block that is added to the blockchain, starting with the block containing a given transaction, is called a confirmation of that transaction.
Ideally, merchants and services that receive payment in the cryptocurrency should wait for at least one confirmation to be distributed over the network, before assuming that the payment was done.
The more confirmations that the merchant waits for, the more difficult it is for an attacker to successfully reverse the transaction in a blockchain—unless the attacker controls more than half the total network power, in which case it is called a 51% attack.
2ASICs and mining pools
Within the Bitcoin community there are groups working together in mining pools.
Some miners use application-specific integrated circuits (ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.
Some PoWs claim to be ASIC-resistant, i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude.
ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a 51% attack against a cryptocurrency.
Plant the Seed The choice is YoursChoose Wisely The Choice is Yours
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Fear is SicknessGold is Money…Uni-VerseSuccessGenes that erase memoriesResearches can erase painful memories from the brainScientists deletes “Fearful” memories of RatsPokemon Go users give away all privacy rights“Broken People” = Raw MaterialRobert NoyceCompounding InterestSimple & Compound Interest FormulaSimple Interest & Compound InterestPBIS RewardsROI – Return On InvestmentPlay the role of a fool…Occult – Anatomy20 Fastest Growing + Declining JobsCauses and Effects of InflationThe History of LogisticsSSG 16.9 – Legal Identity for allScientists call for Protection from Non-Ionizing Electromagnetic Field ExposureProtest’s are Illegal and punished with Jail Time in a “Free” Society !!!?¿!!!Human Value ChainOpposition to the use of Blockchain Identity– Part 1Opposition to the use of Blockchain Identity– Part 2Human Capital Performance BondStrategies for Investing in Undervalued Human CapitalU.S Army TRADOC G-2Digitizing Government-to-Person (G2P) Payments
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Government Bans Bitcoin ✊ 😂 😅 😂 😅 😂 ✊Veritas… Something LinkedIn doesn’t like !Your Account has been permanently Restricted!
In a Society that changes, molds the Truth as it suits best some…
People will never be Free !!!
DECENTRALIZATION IS FREEDOM OF CHOICE !!!
Just because I didn’t gave them my ID or Passport to be on the site !!!
A social media site needs an ID from the users ¿?!¿?
The Power of CENTRALIZATION huh ¿!?
The funny thing is… I even became friends with a lot of people on the site, and with a few even, we discovered to have common goals and interests, that made us walk together on the road of creation and envisioning new paths that many would benefit…
LinkedIn is a professional site… hmmm…
Well, I happend to be a PROFESSIONAL BITCOIN MINER SINCE ANCIENT TIMES !!!
With a deep and high regard for Privacy…
What’s wrong in that ?!?
Does that make me… Less Professional ?!?
THEN I PROPOSE TO VOTE THAT ALL BITCOIN TALK ON YOUR SITE TO BE RESTRICTED…
AS YOU DON’T HAVE ALSO THE ID OR PASS OF SATOSHI NAKAMOTO !!!
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
R&D, wisdom, knowledge, curiosities, answers and many more questions 🙂🤣🙃
You have a Choice !!!Power to the People !!! Wake the F… Up !!! No more excuses, you have a choice now !!!WHO as in WORLD HEALTH ORGANISATIONP F I Z E R InsiderPoem of the LegacyBeing Curious…Of course it doesn’t comply…The Problem with centralized Social-Media10 Principles of Strategic LeadershipGlobal Reserve CurrencyPsychology of a Market CycleSuccessSuccessTriangle of SuccessDon’t plan for travelling when old…😋😳😋Be like a Tree…If anyone understands this please enlighten me too 😊🤭🤗http://www.revelationtimelinedecoded.comESGFor those that think WE are the Center of the Universe 🤣😅😂Confident vs. Insecure PeopleDay by day…Managing Complex ChangeThe Cone of LearningThe Hero’s JourneyElectromagnetic Field of the HeartI-ChingLanguage creates RealitySex Organs of the Machine WorldPhilosopher’s StoneIsaac NewtonAbracadabraSingularityMulti-Mind Thought Control Process APPLE INC.RetrocausalityCERNEGOSYSCOIN ECOSYSTEMJagSteinSysCoinBitcoin might bury FIAT 🙂 🤭 🙃DEFI Ecosystem on EthereumDeFi StackBitcoin Mining Ecosystem Map…the other 6 BillionbitcoinThis is about the other 6 Billion…Top NFT ProjectsBusiness CyclesCentral’s Bank’s 3 StrategiesGlobal DebtDefender of the FlowerFlower of LifeSacred GeometrySeed & Flower of LifeKnowledge – An Antidote to FearJOIN THE REVOLUTION 😋 🤣 😋Emotion – Judgement – Action…violent recolution inevitable.E S B IEvery generation…LOVE YOUR RAGE NOT YOUR CAGERevolutionThe Times – January 3, 2009REVOLUTIONBitcoin Genesis Block – 03 January 2009Introduction to BitcoinIntroduction to Decentralized FinanceIntroduction to Digital CurrenciesAll Metals We MinedMap to Multiplication Nikola TeslaTop VC’s Investing in BlockChain CompaniesAthmospheres of the Solar SystemGlobal GDP 2021Map of CyberSecurity Domains21 QuestionsSix Innovation ModelsWhat May Happen in the next 100 YearsAbstract – “…to pull the body out of dimension so that the person can walk through solid objects such as wooden doors.” Okay 🤯 😳 🤯 ?¿?China’s Social Credit SystemBlockchain Platforms Comparison (BCP)ARISE
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Though his work failed to garner substantial attention during his lifetime, Schopenhauer had a posthumous impact across various disciplines, including philosophy, literature, and science.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
BTC total daily payout is 6.25 BTC * 6 times per hour * 24hours…on average = 900 BTC mined every day.
That has to be spread out, on average, evenly across then ENTIRE network. Granted, luck is involved, so it isn’t exactly even, but on average, it should be.
If network is running at 17,608,758 TH/s, and every TH gets an even share of the reward, then that would be 1800BTC / 17,608,758 TH/s = .00010222 BTC/(TH/s).
You then take that figure and multiply by number of TH for miner, and then you get daily BTC revenue ; )
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→