The Art of War Quotes


The Art of War


The Art of War (Chinese: ๅญซๅญๅ…ตๆณ•; lit. ‘Sun Tzu’s Military Method’, pinyin: Sลซnzi bฤซngfวŽ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC).

The work, which is attributed to the ancient Chinese military strategist Sun Tzu (“Master Sun”), is composed of 13 chapters. Each one is devoted to a different set of skills or art related to warfare and how it applies to military strategy and tactics.

For almost 1,500 years it was the lead text in an anthology that was formalized as the Seven Military Classics by Emperor Shenzong of Song in 1080.

The Art of War remains the most influential strategy text in East Asian warfare and has influenced both East Asian and Western military theory and thinking and has found a variety of applications in a myriad of competitive non-military endeavors across the modern world including espionage, culture, politics, business, and sports.

When you start to read Sun Tzuโ€™s words, you may realize that they have very real applications to modern life, especially if you are in a position of leadership or if you deal regularly with strategic questions.

These musings can be applied to practical problems you may be trying to solve, and they can also be good starting points for more theoretical reflection.

Topics that span from philosophy and wisdom to strategy and leadership, here are the most notable quotes from The Art of War.


Quotes on the Philosophy of War


  • โ€œThe art of war is of vital importance to the State. It is a matter of life and death, a road either to safety or to ruin.โ€
  • โ€œAll warfare is based on deception.โ€
  • โ€œIt is only one who is thoroughly acquainted with the evils of war that can thoroughly understand the profitable way of carrying it on.โ€
  • โ€œThe skillful soldier does not raise a second levy, neither are his supply-wagons loaded more than twice.โ€
  • โ€œTo fight and conquer in all your battles is not supreme excellence; supreme excellence consists in breaking the enemy’s resistance without fighting.โ€
  • โ€œHe will win who knows when to fight and when not to fight.โ€
  • โ€œIf you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer defeat. If you know neither the enemy nor yourself, you will succumb in every battle.โ€
  • โ€œWhat the ancients called a clever fighter is one who not only wins, but excels in winning with ease.โ€
  • โ€œMaking no mistakes is what establishes the certainty of victory, for it means conquering an enemy that is already defeated.โ€
  • โ€œWater shapes its course according to the nature of the ground over which it flows; the soldier works out his victory in relation to the foe whom he is facing.โ€
  • โ€œSuccess in warfare is gained by carefully accommodating ourselves to the enemy’s purpose.โ€
  • โ€œEnergy may be likened to the bending of a crossbow; decision, to the releasing of the trigger.โ€
  • โ€œAnger may in time change to gladness; vexation may be succeeded by content. But a kingdom that has once been destroyed can never come again into being; nor can the dead ever be brought back to life.โ€
  • โ€œIf your opponent is of choleric temper, seek to irritate him. Pretend to be weak, that he may grow arrogant.โ€
  • โ€œIn war, practice dissimulation, and you will succeed.โ€
  • โ€œIf the enemy leaves a door open, you must rush in.โ€
  • โ€œWe cannot enter into alliances until we are acquainted with the designs of our neighbors.โ€
  • โ€œThe experienced soldier, once in motion, is never bewildered; once he has broken camp, he is never at a loss.โ€
  • โ€œIf you know the enemy and know yourself, your victory will not stand in doubt.โ€

Quotes on War and Leadership


It is clear throughout The Art of War that victory is explicitly related to the strength of an armyโ€™s leader. Sun Tzuโ€™s advice for generals and commanders applies to many kinds of leaders.

  • โ€œThe general who wins a battle makes many calculations in his temple ere the battle is fought. The general who loses a battle makes but few calculations beforehand.โ€
  • โ€œThe general who is skilled in defense hides in the most secret recesses of the earth; he who is skilled in attack flashes forth from the topmost heights of heaven.โ€
  • โ€œThe consummate leader cultivates the moral law, and strictly adheres to method and discipline; thus it is in his power to control success.โ€
  • โ€œSimulated disorder postulates perfect discipline; simulated fear postulates courage; simulated weakness postulates strength.โ€
  • โ€œWhoever is first in the field and awaits the coming of the enemy, will be fresh for the fight; whoever is second in the field and has to hasten to battle will arrive exhausted.โ€
  • โ€œThe quality of decision is like the well-timed swoop of a falcon which enables it to strike and destroy its victim.โ€
  • โ€œAll men can see the tactics whereby I conquer, but what none can see is the strategy out of which victory is evolved.โ€
  • โ€œDo not repeat the tactics which have gained you one victory, but let your methods be regulated by the infinite variety of circumstances.โ€
  • โ€œHe who can modify his tactics in relation to his opponent and thereby succeed in winning, may be called a heaven-born captain.โ€
  • โ€œThe difficulty of tactical maneuvering consists in turning the devious into the direct, and misfortune into gain.โ€
  • โ€œManeuvering with an army is advantageous; with an undisciplined multitude, most dangerous.โ€
  • โ€œWe are not fit to lead an army on the march unless we are familiar with the face of the countryโ€”its mountains and forests, its pitfalls and precipices, its marshes and swamps.โ€
  • โ€œMove not unless you see an advantage; use not your troops unless there is something to be gained; fight not unless the position is critical.โ€
  • โ€œNo ruler should put troops into the field merely to gratify his own spleen; no general should fight a battle simply out of pique.โ€
  • โ€œWhat enables the wise sovereign and the good general to strike and conquer, and achieve things beyond the reach of ordinary men, is foreknowledge.โ€
  • โ€œWhen the general is weak and without authority; when his orders are not clear and distinct; when there are no fixed duties assigned to officers and men, and the ranks are formed in a slovenly haphazard manner, the result is utter disorganization.โ€
  • โ€œIf fighting is sure to result in victory, then you must fight, even though the ruler forbid it; if fighting will not result in victory, then you must not fight even at the ruler’s bidding.โ€
  • โ€œRegard your soldiers as your children, and they will follow you into the deepest valleys; look upon them as your own beloved sons, and they will stand by you even unto death.โ€
  • โ€œThe general who advances without coveting fame and retreats without fearing disgrace, whose only thought is to protect his country and do good service for his sovereign, is the jewel of the kingdom.โ€
  • โ€œA leader leads by example not by force.โ€

Quotes on War and Strategy


Sun Tzuโ€™s strategic counsel can still be used in the 21st century. Whether you are creating a business strategy or devising steps to pursue a personal goal, these quotes from The Art of War may offer some valuable insights and guidance.

  • โ€œHold out baits to entice the enemy. Feign disorder, and crush him.โ€
  • โ€œIf equally matched, we can offer battle; if slightly inferior in numbers, we can avoid the enemy; if quite unequal in every way, we can flee from him.โ€
  • โ€œThus it is that in war the victorious strategist only seeks battle after the victory has been won, whereas he who is destined to defeat first fights and afterwards looks for victory.โ€
  • โ€œThe control of a large force is the same principle as the control of a few men: it is merely a question of dividing up their numbers.โ€
  • โ€œThe clever combatant looks to the effect of combined energy, and does not require too much from individuals.โ€
  • โ€œYou can be sure of succeeding in your attacks if you only attack places which are undefended.โ€
  • โ€œO divine art of subtlety and secrecy! Through you we learn to be invisible, through you inaudible; and hence we can hold the enemy’s fate in our hands.โ€
  • โ€œNumerical weakness comes from having to prepare against possible attacks; numerical strength, from compelling our adversary to make these preparations against us.โ€
  • โ€œKnowing the place and the time of the coming battle, we may concentrate from the greatest distances in order to fight.โ€
  • โ€œIn making tactical dispositions, the highest pitch you can attain is to conceal them.โ€
  • โ€œCarefully compare the opposing army with your own, so that you may know where strength is superabundant and where it is deficient.โ€
  • โ€œTo take a long and circuitous route, after enticing the enemy out of the way, and though starting after him, to contrive to reach the goal before him, shows knowledge of the artifice of deviation.โ€
  • โ€œLet your rapidity be that of the wind, your compactness that of the forest.โ€
  • โ€œIn raiding and plundering be like fire, in immovability like a mountain.โ€
  • โ€œPlace your army in deadly peril, and it will survive; plunge it into desperate straits, and it will come off in safety.โ€
  • โ€œForestall your opponent by seizing what he holds dear, and subtly contrive to time his arrival on the ground.โ€
  • โ€œWalk in the path defined by rule, and accommodate yourself to the enemy until you can fight a decisive battle.โ€
  • โ€œAt first, then, exhibit the coyness of a maiden, until the enemy gives you an opening; afterwards emulate the rapidity of a running hare, and it will be too late for the enemy to oppose you.โ€
  • โ€œIf it is to your advantage, make a forward move; if not, stay where you are.โ€
  • โ€œIf you know the enemy and know yourself, your victory will not stand in doubt; if you know Heaven and know Earth, you may make your victory complete.โ€
  • โ€œLet your plans be dark and impenetrable as night, and when you move, fall like a thunderbolt.โ€




Beware of Scams !!!

Beware !!!

Just as the crypto industry is expanding and getting local adoption from individuals, co-operations, organisations and few countries  the same rate at which we have crypto enthusiast increasing in number which i see so worrisome and also a call for major concern.

Reason been that as more people get involved in the crypto business the more scammers are likely to increase their technique and the more scammers get recruited.

To avoid walking on scammers path, requires to be well informed of every new technique they can ever deploy against their potential victim.


To stay off scammers path users must:


  • Avoid phishing links.
  • Make sure to pay attention to the spelling of the website, as well as their URL as this can reveal whether it is a phishing site or not.
  • Never invest in a project without a well structured community
  • Pay close attention to the engagement within the community for suspicious activities
  • Ensure you assets are off CEX
  • Be more smart and less greedy
  • Don’t jump into a project/coin only based on the hype from advertisers (especially twitter)
  • Avoid any “too good to be true” investment
  • Avoid send me 1$ and I’ll send back 2$ scams, no matter how reputable is the account calling for that
  • Protect your coins (keep your coins on your wallet, use hardware wallet where possible, never give out wallet’s seed, keep backup seed offline)
  • Don’t be greedy and/or illiterate.
  • Be sure to feed yourself with necessary knowledge, if you want to invest.
  • Knowledge from experience is good but you can also take legitimate one from other people.
  • Not everything that is being offered to you is true. Do not be deceived.
  • Be careful who you are trusting.
  • Always be skeptical !!!
  • Enable Two-factor authentication for all your accounts.
  • Using of firewalls.
  • Installing an up to date anti virus software.
  • Use strong passwords and yet easily accessible ones for your convenience.
  • Stay away from malicious links or attachments you come across on the web.
  • Make sure your private keys are well stored and in hard wallet
  • Make sure your passwords are not vulnerable online to attacks i.e donโ€™t store passwords online or any website
  • Whenever a stranger message you first for a business or an investment, it is a Red flag.
  • Someone who doesn’t know you would want you to make big money, another Red flag.
  • Whenever they introduce a” business opportunity” to you and then hasten you in order make you take a hasty decision it’s not  genuine, they are trying their best to make you take a fast decision without telling your loved ones and friends who will discourage you.
  • It is safer to  assume anyone you don’t know, communicating with you is a scammer until it is proven otherwise.
  • Read the whitepaper and research well of the company where you are going to invest because many scams are done by this method.
  • Check whether it is genuine or fake.
  • Scammers are constantly upgrading their scam methods and anyone can be the next target.
  • Loss doesn’t just happen due to an internal or intentional mistake, and when it does happen everyone has a similar sense of remorse and risks that are absolute consequences.
  • You’ll be fooled many times by those scammers that have maintained a well structured fake community.
  • They can hire those PRs and people talking inside their community to make it look like they’re a legit community.
  • As for their workers, they’ll just tell that they need engagement but the purpose of it, they’re not talking about it because that’s what the main purpose it.
  • And that’s to make it look genuine that they have real people inside the community. But in reality, it’s all fake people that they’ve hired just to make discussions all over their place.
  • It’s safe to say as well that it’s not just the crypto industry that is not safe for newbies, everything that talks about money is not safe for everyone.
  • Crypto is the latest thing and in the last 5 years it become so successful that scammers make this as their paradise as there are a lot of naive investors in the market.
  • Do your investigations, and don’t listen to influencers and believe them.
  • Think that this is your hard earn money so you need to be careful where you are going to invest it.
  • Don’t be Greedy.
  • Don’t jump on it like a hungry cow.
  • Don’t trust the sweet words they offer you. Most of them are too good to be true but they will always sound inviting to invest with.
  • Make a wall to not fully support them unless they have proven themselves worthy of that kind of respect.
  • Always be in doubt. That will be the shield that will protect you from being scammed.
  • Must simply assume that our coins are never really safe despite our best efforts, so it is important to always be on alert and protect our coins to the best of our ability.
  • Improve the security of your coins by an important margin by buying a hardware wallet, since they are very secure devices and they are relatively cheap, instead of risking storing our coins in our computers or at an exchange.
  • Always good to know how to make technical and fundamental analysis so that you can get specific information what is the situation of the projects you want to invest
  • Many projects are delivering a good testament, but they always ended into a scam , so we need to be smart enough and have a lot of preparation before investing or trading





Controlled Supply

Bitcoin

“A fixed money supply, or a supply altered only in accord with objective and calculable criteria, is a necessary condition to a meaningful just price of money.”

Fr. Bernard W. Dempsey, S.J. (1903-1960)

In a centralized economy, currency is issued by a central bank at a rate that is supposed to match the growth of the amount of goods that are exchanged so that these goods can be traded with stable prices. The monetary base is controlled by a central bank. In the United States, the Fed increases the monetary base by issuing currency, increasing the amount banks have on reserve or by a process called Quantitative Easing.

In a fully decentralized monetary system, there is no central authority that regulates the monetary base. Instead, currency is created by the nodes of a peer-to-peer network.

The Bitcoin generation algorithm defines, in advance, how currency will be created and at what rate. Any currency that is generated by a malicious user that does not follow the rules will be rejected by the network and thus is worthless.


Currency with Finite Supply


Block reward halving
Controlled supply

Bitcoins are created each time a user discovers a new block. The rate of block creation is adjusted every 2016 blocks to aim for a constant two week adjustment period (equivalent to 6 per hour.)

The number of bitcoins generated per block is set to decrease geometrically, with a 50% reduction every 210,000 blocks, or approximately four years. The result is that the number of bitcoins in existence will not exceed slightly less than 21 million.

Speculated justifications for the unintuitive value “21 million” are that it matches a 4-year reward halving schedule; or the ultimate total number of Satoshis that will be mined is close to the maximum capacity of a 64-bit floating point number. Satoshi has never really justified or explained many of these constants.

Cumulated bitcoin supply

This decreasing-supply algorithm was chosen because it approximates the rate at which commodities like gold are mined. Users who use their computers to perform calculations to try and discover a block are thus called Miners.





Blockchain Spectrum



The Blockchain Spectrum

Now, even if someone does not have the drawbacks of decades-long experience and mental models with a specific asset class, it is still very hard to understand Bitcoin.

Why? Because Bitcoin is the intersection of many, many different fields.

To truly understand Bitcoin, there is no other way than being a polymath.

Even if one has made it as far to (a) realize Bitcoin is something completely new and solely using existing heuristics and mental models will not work and (b) with Bitcoin, more than anything else, we do not know what we do not know โ€” understanding still requires a very broad set of competences.

The correct approach to understand when one starts going down the Bitcoin rabbit hole is therefore to assume one knows nothing and any experience and insight one has from previous aspects of life brings
very little to the table.

First principles thinking is required.
We can, however, try to define a little deeper what Bitcoin is. Below is listed some different ways of wrapping one’s head around Bitcoin.

Not an exhaustive list.

A living organism

Bitcoin is Free and Open Source software. It is not a piece of IP owned by a centralized joint-stock company that needs to optimize for the bottom line of the next quarter and is incapable of cannibalizing itself. Since the Bitcoin whitepaper was released and the
genesis block was mined, we have seen an explosion of experiments, ideas and creative geniuses get involved in Bitcoin and crypto as a whole. To think of Bitcoin as a living, technological organism that adjusts, develops and constantly changes to survive can be useful.

A religion

Money, as many have learned and realized in recent decade, is just a social
construction we are all part of. The value therefore comes from the amount of true believers.

Continuing this line of thinking, one could describe the religion as consisting of:

  • Prophet: Satoshi. No longer present. Impossible to ask questions.
  • Convictions: Decentralization.
  • Rituals: Running nodes. Mining. Hodling.
  • Holy scriptures: Bitcoin whitepaper. As with all holy scriptures, people interpret them in their own way.
  • Sacred objects: Genesis block, lowercase bitcoin
  • Sects: Different interpretations resulting in different factions/sects: small blockers, big blockers, etc.

An emerging economy

  • The consensus protocol can be thought of as the constitution
  • The society as the constituency (users on the demand-side; miners on the supply-side)
  • Core developers as the executive department who write the code and execute on the strategy, but amendments to the protocol (i.e., constitution) require approval from the constituency)
  • The native token is the internal currency
  • The investors underwrite the currency

Additionally, many one-liners and memes exist to describe Bitcoin. Not an exhaustive list.

  • Sound money
  • Digital gold
  • โ€œAn insurance policy against an Orwellian futureโ€
  • โ€œA tool for freeing humanity from oligarchs and tyrants, dressed up as a get-rich-quick schemeโ€
  • Censorship- judgment & seizure-resistant money
  • Peer to peer digital cash
  • Swiss Bank account in your pocket
  • Unstoppable and uncensorable hard money

Source: https://backed.ai/





Convergence of blockchain with AI and IOT


IoT and AI are growing exponentially

Internet of Things – IoT

A future of transacting intelligent machines


โ€ข Individually, each of these technologies deserves all the attention they’re getting as enablers and disruptors

โ€ข But, taken together?

โ€ข Their transformative effect becomes multiplicative

โ€ข A future driven by machine connectivity, data exchange and commercial services:

  • IoT connects billions of machines and sensors generate unprecedented quantities of real-time data
  • AI enables the machines to act on data and trigger services
  • Blockchain functions are the transaction layer where data and service contracts are securely stored and payments for services are settled

How does blockchain support intelligent connected machines?


โ€ข Smart Contracts enable self-executing and self-enforcing contractual states

  • Custom financial instruments (tokens), records of ownership of an underlying physical asset (smart property), any
  • complex business logic that can be programmable
  • Can such applications be ideal for intelligent (AI) and connected (IoT) machines?
  • These machines are intelligent enough to negotiate contracts, but need a technology allowing them to securely sign and enforce them

โ€ข Digital currencies create new forms of money

  • Programmable and active
  • Will such money be ideal for intelligent (AI) and connected (IoT) machines?
  • These machines will need digital currency to pay for services assigned through the smart contracts

How will the three technologies work together?


IoT – Internet of Things

  • Sensors allow us to cost-effectively gather tremendous amounts of data.
  • Connectivity allows us to transmit/broadcast these data.
  • But, there is a missing element: intelligence to process these data.

AI – Artificial Intelligence

  • Intelligence at the very edges of the network (mini-brains).
  • Combine with IoT and you have the ability to recognize meaningful patterns buried in mountains of data in ways that would be impossible for most humans, or even non-AI algorithms, to do.
  • But, there is a missing element: a secure storage layer for data and a transaction layer for services

DLT (blockchain) – Distributed Ledger Technology

  • Decentralized governance, coupled with no single point of failure, disintermediation, unalterable and searchable records of events.
  • Digital currencies and tokenized custom financial instruments.
  • Combine with AI and IoT and you have a new world of autonomous systems interacting with each other, procuring services from each other and settling transactions.

The technology stack of the future


Technology Stack of the Future

Toward a world of machine commerce


A world of Machine Commerce

M2M will need SSI (self-sovereign identities) – for objects!


Human Identities types

Object identities can be SSI by default

  • Multi-source, multi-verifier
  • Digitally signed, verifiable credentials that can prove issuer, holder and status
  • Secure peer-to-peer connections (permanent or session-based)
  • Exchange full credentials, partial credentials or ZKPs derived from credentials

Next milestone: Decentralized Organizations (DOs)


DOs are good at:

  • Coordinating resources that do not know/trust each other (including hybrid
  • H/M)
  • Governing in a geography-agnostic, censorship-resistant manner
  • Enabling short-term or informal organizational structures  (networks/communities)
  • Tracking and rewarding contribution

Challenges

  • Jurisdictional issues
  • Legislating new types of work for humans and work rules for machines
  • Governance modalities, including external supervision


Challenges


New/upgraded system architectures

โ€ข From legacy to blockchain/AI/IoT-native systems
โ€ข Integration, interoperability, backward compatibility
โ€ข ROI obvious ex post, difficult ex ante โ€“ Bootstrapping

Advanced analytics capabilities

โ€ข As devices at the edge become smarter, the smart contracts enabled by blockchain platforms will require more advanced data analytics capabilities and gateways to the physical world.

New Business Models

  • Disruptive innovation will dominate โ€“ but not without boom-and-bust cycles and big failures along the way.
  • Winners will NOT be the ones focusing on efficiency gains, but on disruptive models.

Key takeaways

โ€ข IoT, AI and DLT (blockchain) are foundational and exponentially growing technologies

  • When combined, they will create a new internet of connected, intelligent and commercially transacting machines
  • An era machine-to-machine (M2M) and human-to-machine (H2M) commerce is likely to emerge, with profound consequences on social and economic dynamics
  • New forms of corporations or organizational formats (code-only, autonomous) will emerge

โ€ข There are numerous challenges that must be overcome

  • IoT has outpaced the human internet, but is still a largely passive, insecure and privacy-vulnerable network
  • AI has made huge leaps, but still requires immense computational resources and is largely incompatible with edge computing
  • DLT is a new technology, largely untested at scale; both smart contracts and digital assets lack the regulatory clarity required for mass adoption

This work is available under a Creative Commons Attribution-Non-Commercial-No Derivatives license
ยฉ University of Nicosia,
Institute for the Future, unic.ac.cy/blockchain





With ๐Ÿ’š

Veritas … In pictures…



Gold is Money…

Uni-Verse

Success



Genes that erase memories

Researches can erase painful memories from the brain


Pokemon Go users give away all privacy rights




Compounding Interest






Play the role of a fool…

Occult – Anatomy

20 Fastest Growing + Declining Jobs

Causes and Effects of Inflation

The History of Logistics

SSG 16.9 – Legal Identity for all

Scientists call for Protection from Non-Ionizing Electromagnetic Field Exposure

Protest’s are Illegal and punished with Jail Time in a “Free” Society !!!?ยฟ!!!

Human Value Chain

Opposition to the use of Blockchain Identity – Part 1

Opposition to the use of Blockchain Identity – Part 2

Human Capital Performance Bond

Strategies for Investing in Undervalued Human Capital

U.S Army TRADOC G-2

Digitizing Government-to-Person (G2P) Payments

Will be Always Updated !!!


Made with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š


Bitcoin Mining – Where the Profitable Future Lies



The Times – January 3, 2009

Bitcoin Genesis Block
Mined 03 January 2009

Cypherpunks Write Code

CODE IS LAW
THE SOONER HUMANKIND ACCEPTS IT,
THE SOONER IT CAN BUILD AROUND IT

Yeah.. I wonder Why ๐Ÿ˜‚


Bitcoin made easy

How a Bitcoin transaction works

A humble Miner


How Bitcoin Mining Works

Mining Difficulty

Bitcoin Halving

Bitcoin Previous Halvings

Pools

Bitcoin Wallets

Bitcoin Stakeholders

Bitcoin Facts

Power to the People

Totalitarian Governments can kiss my 256-bit key

Bitcoin – People’s Money

Bitcoin cannot be Shut Down


The power of the long tail…



Central Bank’s 3 Strategies

F**k them, Enough !!!



Upcoming Smart Contracts Networks

Bitcoin Yearly Candles

Bitcoin Price History – Log Scale

Bitcoin Mining Ecosystem Map

Defi Ecosystem in Ethereum

DeFi Stack: Product& Application View

Syscoin Ecosystem


Syscoin

BSC Ecosystem

Popular Cryptocurrency

Crpto Ecosystem

Public Companies that own Bitcoin

Top Banks investing in Crypto

Bitcoin Inflation vs. Time

When you’re Ready…



Choose Wisely

Make bitcoin thrive, let fiat become humus…



Veritas non Auctoritas
Facit Legem

Most people misunderstand what bitcoin miners actually do, and as a result they don’t fully grasp the level of security provided by bitcoin’s hashrate.

In this article, we’ll explain proof of work in a non-technical way so that youโ€™ll be able to counter the misinformation about supercomputers and quantum computers attacking the Bitcoin network in the future. 

Simply put, mining is a lottery to create new blocks in the Bitcoin blockchain. There are two main purposes for mining:

  1. To permanently add transactions to the blockchain without the permission of any entity.
  2. To fairly distribute the 21 million bitcoin supply by rewarding new coins to miners who spend real world resources (i.e. electricity) to secure the network.

To understand what is actually happening in this lottery system, let’s look at a simple analogy where every Bitcoin hash is equivalent to a dice roll.


Luck, Gambling, and SHA-256


Imagine that miners in the Bitcoin Network are all individuals gambling at a casino. In this example, each of these gamblers have a 1000 sided dice. They roll their die as quickly as possible, trying to get a number less than 10. Statistically, this may take a very long time, but as more gamblers join the game, the time it takes to hit a number less than 10 gets reduced. In short, more gamblers equals quicker rounds.

Once somebody successfully rolls a number less than 10, all gamblers at the table can look down and verify the number. This lucky gambler takes the prize money and the next round begins.

Ultimately, the process of mining bitcoin is very similar. All miners on the network are using Application Specific Integrated Circuits (ASICs), which are specialized computers designed to compute hashes as quickly as possible.

To โ€œcompute a hashโ€ simply means plugging any random input into a mathematical function and producing an output.

More hashes per second (i.e. higher hashrate) is equivalent to more dice rolls per second, and thus a greater probability of success.

Miners propose a potential Bitcoin block of transactions, and use this for an input. The block is plugged into the SHA256 hash function which yields a fixed-sized output, known as a hash. A single hash can be computed in less than a millisecond, as it involves no complex math.

If the hash value is lower than the Bitcoin Network difficulty, then the miner who proposed the block wins. If not, then the miner continues trying by computing more hashes.

The successful minerโ€™s block is then added to the blockchain, the miner is rewarded with newly issued bitcoin for their work, and the โ€œnext roundโ€ begins.


Sources :

https://wikipedia.com/

https://braiins.com/

https://blockdata.com/

https://coin98analytics.com/

https://scoopwhoop.com/

https://stakingrewards.com/

https://syscoin.org/

https://galaxydigitalresearch.com/

https://surveycrest.com/

The Times

The Economist

"Internet of Money" - Andreas Antonopoulus

Hal Finney Quotes

Timothy C. May Quote

Free Spirit Digital Art

!ยฐ! If I forgot someone, sorry ! Do tell and I'll add you as a source of inspiration on the list !!! Thanks for understanding !!!


Questions, opinions, critics and requests always welcomed and as time allows will be accomodated !!! ๐Ÿค“ ๐Ÿ™‚ ๐Ÿ˜‰


Did you find this article helpful?

If so, please consider a donation to help the evolution and development of more helpful articles in the future, and show your support for alternative articles.

Your generosity is ๐Ÿ’š ly appreciated

You can donate in any crypto your ๐Ÿ’š desires ๐Ÿ˜Š

Thank you all for your time !!!

โœŒ & ๐Ÿ’š


Bitcoin (BTC) :

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


LiteCoin(LTC) :

LYAdiSpsTJ36EWCJ5HF9EGy9iWGCwoLhed


Ethereum(ETH) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


EthereumClassic(ETC) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


Cardano(ADA) :

addr1q88c5cccnrqy6xesszzvf7rd4tcz87klt0m0h6uvltywqe8txwmsrrqdnpq27594tyn9vz59zv0n8367lvyc2atvrzvqlvdm9d


BinanceCoin(BNB) :

bnb1wwfnkzs34knsrv2g026t458l0mwp5a3tykeylx


BitcoinCash (BCH)

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


Bitcoin SV (BSV)

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


ZCash(ZEC) :

t1fSSQX4gEhove9ngcvFafQaMPq5dtNNsNF


Dash(DASH) :

XcWmbFw1VmxEPxvF9CWdjzKXwPyDTrbMwj


Shiba(SHIB) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


Tron(TRX) :

TCsJJkqt9xk1QZWQ8HqZHnqexR15TEowk8


Stellar(XLM) :

GBL4UKPHP2SXZ6Y3PRF3VRI5TLBL6XFUABZCZC7S7KWNSBKCIBGQ2Y54


A world where anything is possible…
The choice is yours People !!!


With ๐Ÿ’š

The other 6 Billion

Choose Wisely

” Popular crowdfunding platform GoFundMe blocked the fundraising efforts of the Canadian trucker convoy Friday, preventing its receipt of $10 million in donations, claiming the movement violated its terms of service.”

Down bellow you have a few sources for your choice !!!

It was the people’s choice to spend their hard earned cash for the people that march for F R E E D O M !!!

Here is your system you trust your hard earned money with !!!


https://www.nationalreview.com/news/gofundme-blocks-10-million-in-donations-to-canadian-trucker-convoy/

https://www.businessinsider.com/gofundme-blocks-donations-freedom-convoy-trump-elon-musk-canada-vaccine-2022-2?op=1&r=US&IR=T

https://www.businessinsider.com/gofundme-blocks-donations-freedom-convoy-trump-elon-musk-canada-vaccine-2022-2?op=1&r=US&IR=T

https://nypost.com/2022/02/05/canadian-anti-vax-truckers-has-millions-in-donations-blocked-by-gofundme/

https://gellerreport.com/2022/02/gofundme-steals-10-million-in-donations-from-truckers.html/

https://www.theglobeandmail.com/canada/article-gofundme-scuttles-campaign-for-trucker-convoy-stops-release-of-10/

https://www.foxbusiness.com/technology/gofundme-backtracks-canadian-trucker-money-fraud-investigation-threat

https://justthenews.com/nation/technology/gofundme-cancels-10-million-canadian-trucker-fund-claiming-protest-now-occupation

https://www.washingtonexaminer.com/news/gofundme-account-for-canada-anti-vaccine-mandate-truckers-nears-10-million-mark


etc… etc… etc…


Made with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š



Democracy is Dead

Long Live the People and…


bitcoin – People’s Money


With ๐Ÿ’š

Bitcoin/Crypto Wallet types

Choose the wallet that better suits You

You may choose a wallet based on what best suits your needs. we will explore various
types of wallets and clients:

โ€ข Web
โ€ข Desktop
โ€ข Mobile
โ€ข Hardware
โ€ข Paper (Not Secure Anymore)

Wallets and clients can be chosen based on a number of criteria:

  • How much bitcoin is being used / stored
  • IT proficiency (beginner vs. expert)
  • Type of device
  • Occasional use vs. everyday use
  • Security and privacy concerns
  • Cryptocurrencies being used
  • Type and complexity of transactions

Find the wallet thatโ€™s right for you:


https://bitcoin.org/en/choose-your-wallet

Made with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š

BitHouse with ๐Ÿ’š

Crypto Terminology

Crypto Terminology


Glossary of Terms


Bags

Cryptoassets being held, generally as longer-term plays; sometimes used self-deprecatingly for soft or losing positions one should close, but canโ€™t for whatever reason. โ€œToo bad none of my alt bags saw the moon that I did today. #cryptoeclipseโ€

Bitcoin Maximalists

The truest believers in bitcoinโ€™s original mission and design, often paired with a disdain for altcoins.

Block

Blocks are found in the Bitcoin block chain. Blocks connect all transactions together.

Transactions are combined into single blocks and are verified every ten minutes through mining.

Each subsequent block strengthens the verification of the previous blocks, making it impossible to double spend bitcoin transactions (see double spend below).

BIP

Bitcoin Improvement Proposal or BIP, is a technical design document providing information to the bitcoin community, or describing a new feature for bitcoin or its processes or environment which affect the Bitcoin protocol.

New features, suggestions, and design changes to the protocol should be submitted as a BIP.

The BIP author is responsible for building consensus within the community and documenting dissenting opinions.

Black Swans

A black swan is an event or occurrence that deviates beyond what is normally expected of a situation and is extremely difficult to predict.

Black swan events are typically random and unexpected.

The term was popularized by Nassim Nicholas Taleb, a finance professor, writer, and former Wall Street trader.

Block Chain

The Bitcoin block chain is a public record of all Bitcoin transactions. You might also hear the term used as a โ€œpublic ledgerโ€.

The block chain shows every single record of bitcoin transactions in order, dating back to the very first one.

The entire block chain can be downloaded and openly reviewed by anyone, or you can use a block explorer to review the block chain online.

Block Height

The block height is just the number of blocks connected together in the block chain. Height 0 for example refers to the very first block, called the โ€œgenesis blockโ€.

Block Reward

When a block is successfully mined on the bitcoin network, there is a block reward that helps incentivize miners to secure the network.

The block reward is part of a โ€œcoinbaseโ€ transaction which may also include transaction fees.

The block rewards halves roughly every four years; see also โ€œhalvingโ€.

BTFD | #BTFD

โ€œBuy the Fucking Dipโ€ Advice to other traders to pick up a coin thatโ€™s presumably hit its bottom.

โ€œ$GNT Golem making moves. Underpriced @ 7.5K If U are buying GNT under 10K still a good price 3 X LETS GO $ETH #CRYPTO #trading #BTFDโ€

Change

Letโ€™s say you are spending $9.90 in your local supermarket, and you give the cashier $10.00. You will get back .10 cents in change.

The same logic applies to bitcoin transactions.

Bitcoin transactions are made up of inputs and outputs.

When you send bitcoins, you can only send them in a whole โ€œoutputโ€.

The change is then sent back to the sender.

Cold Storage

The term cold storage is a general term for different ways of securing cryptocurrency offline (disconnected from the internet).

This would be the opposite of a hot wallet or hosted wallet, which is connected to the web for day-to-day transactions.

The purpose of using cold storage is to minimize the chances of your bitcoins being stolen from a malicious hacker and is commonly used for larger sums of bitcoins.

Cold Wallet and Hot Wallet

Cold storage is an offline wallet provided for storing cryptocurrency.

With cold storage, the digital wallet is stored on a platform that is not connected to the internet, thereby, protecting the wallet from unauthorized access, cyber hacks, and other vulnerabilities that a system connected to the internet is susceptible to.

Confirmation

A confirmation means that the bitcoin transaction has been verified by the network, through the process known as mining.

Once a transaction is confirmed, it cannot be reversed or double spent.

Transactions are included in blocks.

Cryptocurrency

Cryptocurrency is the broad name for digital currencies that use blockchain technology to work on a peer-to-peer basis.

Cryptocurrencies donโ€™t need a bank to carry out transactions between individuals.

The nature of the blockchain means that individuals can transact with each other, even if they donโ€™t trust each other.

The cryptocurrency network keeps track of all the transactions and ensures that no one tries to renege on a transaction.

Cryptocurrency 2.0

Also known as a decentralized app,(Dapp) a cryptocurrency 2.0 project uses the blockchain for something other than simply creating and sending money.

They typically involve decentralized versions of online services that were previously operated by a trusted third party.

Cryptography

Cryptography is used in multiple places to provide security for the Bitcoin network.

Cryptography, which is essentially mathematical and computer science algorithms used to encrypt and decrypt information, is used in bitcoin addresses, hash functions, and the block chain.

Cypherpunk

1. A person with an interest in encryption and privacy, especially one who uses encrypted email.

2. Cypherpunk, a term that appeared in Eric Hughesโ€™ โ€œA Cypherpunkโ€™s Manifestoโ€ in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong  encryption ( ciphertext is encrypted text) to preserve privacy.

Cypherpunk advocates believe that the use of strong encryption algorithms will enable individuals to have safely private transactions.

They oppose any kind of government regulation of cryptography.

They admit the likelihood that criminals and terrorists will exploit the use of strong encryption systems, but accept the risk as the price to be paid for the individualโ€™s right to privacy.

Dark Web

The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.

The Dark Web poses new and formidable challenges for law enforcement agencies around the world.

Decentralized

Having a decentralized bitcoin network is a critical aspect.

The network is โ€œdecentralizedโ€, meaning that itโ€™s void of a centralized company or entity that governs the network.

Bitcoin is a peer-to-peer protocol, where all users within the network work and communicate directly with each other, instead of having their funds handled by a middleman, such as a bank or credit card company.

Difficulty

Difficulty is directly related to Bitcoin mining (see mining below), and how hard it is to verify blocks in the Bitcoin network.

Bitcoin adjusts the mining difficulty of verifying blocks every 2016 blocks.

Difficulty is automatically adjusted to keep block verification times at ten minutes.

Dogecoin

Dogecoin is an altcoin that first started as a joke in late 2013. Dogecoin, which features a Japanese fighting dog as its mascot, gained a broad international following and quickly grew to have a multi-million dollar market capitalization.

Double Spend

If someone tries to send a bitcoin transaction to two different recipients at the same time, this is double spending. Once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. The more confirmations that a transaction has, the harder it is to double spend the bitcoins.

DYOR | #DYOR

โ€œDo Your Own Research.โ€ The traderโ€™s caveat that advice shouldnโ€™t be taken at face value.

โ€œ$BCY has an appealing risk/reward here. Could take a few months to play out, however, and will require patience. #DYORโ€

Exit Scam

Traditionally a term for darknet markets and vendors that, after building up a good reputation, accumulate bitcoins and disappear; exit scams are also feared by ICO participants who worry that, once theyโ€™ve raised hundreds of millions in hard-to-trace money, the developers will take the money and run.

Fiat

Government-issued money.

Full Node

A full node is when you download the entire block chain using a bitcoin client, and you relay, validate, and secure the data within the block chain.

The data is bitcoin transactions and blocks, which is validated across the entire network of users.

FOMO | #FOMO

โ€œFear of Missing Out.โ€ When a coin starts to moon, dumb money rushes in. โ€œ$LGD on a TEAR right now!!! It has major highs right now! Some major #FOMO going on!!! Sell while itโ€™s high. It WILL drop before fight!!!โ€

FUD

โ€œFear, Uncertainty, and Doubt.โ€

Another non-crypto term that describes attempts to scare weak-handed coin-holders into selling their positions, often with rumors of exit scams or hacks; the cheap, dumped coins are then picked up by the FUD-ers.

Fungibility

Fungibility is a good or assetโ€™s interchangeability with other individual goods or assets of the same type.

Assets possessing this fungibility property simplify the exchange and trade processes, as interchangeability assumes everyone values all goods of that class the same.

HODL

HOLD ON FOR DEAR LIFE!

The intentionally misspelled word hodl has its roots in a December 2013 post on the Bitcoin Talk forum, โ€œI AM HODLINGโ€; when the author, GameKyuubi, couldnโ€™t be bothered to fix his typo, the community instantly turned it into a verb: to hodl.


Along with other terms, hodl is an effective litmus test for sussing out newcomers, carpetbaggers, and tourists.

Halving

Bitcoins have a finite supply, which makes them scarce.

The total amount that will ever be issued is 21 million.

The number of bitcoins generated per block is decreased 50% every 210,000 blocks,roughtly four years.

This is called โ€œhalving.โ€

The final halving will take place in the year 2140.

Hash

A cryptographic hash is a mathematical function that takes a file and produces a relative shortcode that can be used to identify that file.

A hash has a couple of key properties:

โ€ข It is unique. 

Only a particular file can produce a particular hash, and two different files will never produce the same hash.

โ€ข It cannot be reversed.

You canโ€™t work out what a file was by looking at its hash.

Hashing is used to prove that a set of data has not been tampered with.

It is what makes bitcoin mining possible.

Hash Rate

The hash rate is how the Bitcoin mining network processing power is measured.

In order for miners to confirm transactions and secure the block chain, the hardware they use must perform intensive computational operations which is output in hashes per second.

Hash Converter

Use an online hash converter, such as https://hash.online-convert.com and enter the text you want to convert.

Then, try changing just a letter in the input text to see how the resulting hash varies significantly

Hard Fork

A hard fork is when a single cryptocurrency splits in two.

It occurs when a cryptocurrencyโ€™s existing code is changed, resulting in both an old and new version.

Meanwhile a soft fork is essentially the same thing, but the idea is that only one blockchain (and thus one coin) will remain valid as users adopt the update.

So both fork types create a split, but a hard fork is meant to create two blockchain/coins and a soft fork is meant to result in one.

Segwit was a soft fork, Bitcoin Cash, Bitcoin Gold, and Segwit2x are all hard forks.

Immutability

In object-oriented and functional programming, an immutable object (unchangeable object) is an object whose state cannot be modified after it is created.

This is in contrast to a mutable object (changeable object), which can be modified after it is created.

Lambo | #Lambo

A running joke among traders, youโ€™re cryptorich when you can buy a Lamborghini; though absurd, itโ€™s not unheard of โ€” when Alexandre Cazes, the suspected founder of a major darknet marketplace, was found hanged in his Bangkok jail cell, Thai media reported that he owned four Lamborghinis.

Mining

Bitcoin mining is the process of using computer hardware to do mathematical calculations for the Bitcoin network in order to confirm transactions.

Miners collect transaction fees for the transactions they confirm and are awarded bitcoins for each block they verify.

Moon | #Moon

A rapid price increase.

Peer-to-Peer

Typically, online applications are provided by a central party that organizes all the transactions.

Your bank runs its own computers, and all the customers log into the bankโ€™s computer to handle their transactions.

If Bob wants to send money to Alice, he asks the bank to do it, and the bank controls everything.

In a peer-to-peer arrangement, technology cuts out the middleman, meaning that people deal directly with each other.

Bob would send the money directly to Alice, and there wouldnโ€™t be any bank involved at all.

Pool

As part of bitcoin mining, mining โ€œpoolsโ€ are a network of miners that work together to mine a block, then split the block reward among the pool miners.

Mining pools are a good way for miners to combine their resources to increase the probability of mining a block, and also contribute to the overall health and decentralization of the bitcoin network.

Private Key

A private key is a string of data that shows you have access to bitcoins in a specific wallet.

Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.

Proof of Work

Proof of work refers to the hash of a block header (blocks of bitcoin transactions).

A block is considered valid only if its hash is lower than the current target.

Each block refers to a previous block adding to previous proofs of work, which forms a chain of blocks, known as a block chain.

Once a chain is formed, it confirms all previous Bitcoin transactions and secures the network.

Pump

A rapid price increase believed to be the result of market manipulation, a.k.a. pump and dump.

Public Address

A public bitcoin address is cryptographic hash of a public key.

A public address typically starts with the number โ€œ1.โ€

Think of a public address like an email address.

It can be published anywhere and bitcoins can be sent to it, just like an email can be sent to an email address.

Private Key

A private key is a string of data that shows you have access to bitcoins in a specific wallet.

Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.

Rekt | #Rekt

Meaning โ€œwreckedโ€.

โ€œI never sell because of #FUD, and I never buy because of #FOMO.

Thatโ€™s the easiest way to get #Rektโ€

Sats

Satoshis, currently the smallest unit of a single bitcoin, useful for tracking coin prices. โ€œAt the rate $XRPโ€™s moving, I wouldnโ€™t be surprised if it hits 10K sats by the end of the day.โ€

Security Tokens

A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.

The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob.

Shitcoins

Pejorative term for altcoins, especially low-cap coins, often affectionately used by shitcoin hodlers.

SEGWIT

SegWit is the process by which the block size limit on a blockchain is increased by removing signature data from Bitcoin transactions.

When certain parts of a transaction are removed, this frees up space or capacity to add more transactions to the chain.

Transaction

A transaction is when data is sent to and from one bitcoin address to another.

Just like financial transactions where you send money from one person to another, in bitcoin you do the same thing by sending data (bitcoins) to each other.

Bitcoins have value because itโ€™s based on the properties of mathematics, rather than relying on physical properties (like gold and silver) or trust in central authorities, like fiat currencies.

Wallet

Just like with paper dollars you hold in your physical wallet, a bitcoin wallet is a digital wallet where you can store, send, and receive bitcoins securely.

There are many varieties of wallets available, whether youโ€™re looking for a web or mobile solution.

Ideally, a bitcoin wallet will give you access to your public and private keys.

This means that only you have rightful access to spend these bitcoins, whenever you choose to.

Whale

Anyone who owns 5 percent of any given coin, often used as a boogeyman to explain unwanted price movements.

โ€œNice support $NEO. Clear whale manipulation.โ€


Blue Pill vs. Red Pill
Choose wisely

When You’re ready …



BitHouse with ๐Ÿ’š


Happy 13th BirthDay bitcoin

bitcoin – People’s Money

Brief history of Bitcoin

On January 3rd, 2009 Satoshi Nakamoto published the Genesis Block with the first 50 Bitcoins on Sourceforge. He also left a message on the blockchain at the time, quoting the headline in the British newspaper Times:

On January 3, 2009, the minister was on the verge of bailing out the banks.

Nakamoto started writing the white paper in 2008 and published it in October of that year.

The concept of a decentralized, anonymous, trusted currency emerged after the 2008 financial crisis, which left responsibility for the banks.

Satoshi neither supports the modern banking system nor does he like partial reserve banks.

A partial reserve bank is a bank that takes deposits and issues loans or investments, but only has to reserve a fraction of its liabilities for deposits. Basically, the bank is using money that it doesnโ€™t own.

Satoshi wants to get rid of banks and seedy middlemen whom he believes are corrupt and unreliable. As such, he created a more community-centric digital currency.

13 years later, Bitcoin is still going strong with a market cap of nearly $ 900 billion. It is currently held by billionaires, banks, celebrities, governments, and corporations. This is evidence of how far BTC has come in its brief existence.

The precarious banking situation and economic uncertainty are also in crisis again.

The price ofย Bitcoinย on its birthday ๐ŸŽ‚

13 years: $ 47,310
12 years: $ 33,400
11 years: $ 7,319
10 years: $ 3,783
9 years: $ 14,764
8 years: $ 1,084
7 years: $ 432
6 years: $ 275
5 years: $ 816
4 years: $ 13
3 years: $ 5
2 years: $ 0.29
1 year: $ 0.05


Happpy Birthday bitcoin !!!

Thanks for all the teachings and wealth of Knowledge I do now have thanks to you !!!


Made with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š