CBDC’s Tyranny Is Coming

How & Why You should Prepare


Or Not !!!
For the Future Generations sake…

Here are just a few examples of what that sort of total control may look like:

Government in total control

The government could not only withhold money whenever they deemed fit but they could also devalue the currency.


Lack of privacy

The government will be aware of all of your financial information, what you owe and to whom, what you are spending money on, and what assets you have.


The end of personal security

No longer can you “hide” savings under your mattress. The government will always know how much you have and will have access to it.


Tracking of purchases

The government will be able to track everything you purchase—and potentially stop you from buying it. Let’s say it is something the political party in charge disagrees with, such as legalized marijuana. They can track you and prevent you from purchasing it again.


Tracking pornography purchases, abortion payments, tax evasion, and more…

While you may not think this is a bad idea, what if it goes a step further? What if they think you need to eat less red meat?


Hacking and data breaches

My head spins just thinking of all the ways a CBDC could be attacked by hackers or cyber terrorists.


Educate Yourselves folks :

https://news.bitcoin.com/why-the-rise-of-the-cbdc-is-bad-for-your-privacy

https://edwardsnowden.substack.com/p/cbdcs

https://www.themainewire.com/2022/11/cbdc-bitcoin

https://www.dallasnews.com/opinion/2022/11/06/a-central-bank-cryptocurrency-the-us-should-reject-it

https://www.nasdaq.com/articles/bitcoin-policy-institute-calls-on-u.s.-to-reject-its-central-bank-digital-currency

https://fee.org/articles/why-a-digital-dollar-is-a-really-bad-idea

https://theconversation.com/central-bank-digital-currencies-could-mean-the-end-of-democracy-187505

https://www.adamseconomics.com/post/the-potential-orwellian-horror-of-central-bank-digital-currencies

https://www.coindesk.com/layer2/2022/10/14/against-cbdcs-and-the-politicization-of-money

https://mises.org/wire/digital-currency-fed-moves-toward-monetary-totalitarianism

https://www.cato.org/blog/update-two-thirds-commenters-concerned-about-cbdc

https://www.coincenter.org/without-privacy-do-we-really-want-a-digital-dollar

https://bitcoinmagazine.com/culture/digital-dollar-threat-civil-liberties

https://www.newsweek.com/cbdcs-will-end-american-freedom-opinion-1673676

https://beincrypto.com/problem-cbdcs-surrendering-total-surveillance-control

https://www.cato.org/working-paper/central-bank-digital-currency-assessing-risks-dispelling-myths

https://www.cato.org/briefing-paper/central-bank-digital-currency

https://www.dallasnews.com/opinion/2022/11/06/a-central-bank-cryptocurrency-the-us-should-reject-it

https://www.theepochtimes.com/central-bank-digital-currency-tyranny-is-coming-how-to-prepare_5054210.html

https://cointelegraph.com/news/us-senator-ted-cruz-tries-again-with-new-bill-to-block-cbdc

https://tokenhell.com/congressmen-voice-concerns-over-the-features-of-the-us-cbdc

https://www.forbes.com/sites/norbertmichel/2022/04/12/central-bank-digital-currencies-are-about-control–they-should-be-stopped

https://www.forbes.com/sites/norbertmichel/2022/12/15/the-federal-reserve-should-drop-fednow-and-any-plans-to-launch-a-cbdc

https://pomp.substack.com/p/central-bank-digital-currencies-will

https://hackernoon.com/cbdcs-the-folly-of-digital-fiat

https://www.btcpolicy.org/articles/why-the-u-s-should-reject-central-bank-digital-currencies


Cbdc Initiatives




100 Based things



Here is a list of 100 of the best based things:

  • Writing clever, articulate and edgy raps – Based
  • Eating food with no care for nutrition – based
  • Making jokes at the expense of politcally correct people – based
  • Creating witty and inspired retorts – based
  • Refusing to conform to society’s expectations – based
  • Developing viral content – based
  • Dreaming without the boundaries of reality – based
  • Taking no sh*t from anyone – based
  • Standing up for what is right – based
  • Throwing away society’s conventions – based
  • Experimenting with new ideas – based
  • Making creative use of your skills – based
  • Celebrating all forms of success – based
  • Questioning the world around you – based
  • Expressing yourself through Art – based
  • Learning from your mistakes – based
  • Breaking the mold – based
  • Making bold statements – based
  • Improvising on the fly – based
  • Challenging the status quo – based
  • Working hard without complaining – based
  • Respecting others’ opinions – based
  • Venturing beyond your comfort zone – based
  • Befriending other outliers – based
  • Taking risks, but staying safe – based
  • Developing mental strength – based
  • Acknowledging the beauty of the world – based
  • Choosing courage over fear – based
  • Embracing your uniqueness – based
  • Worrying less, but achieving more – based
  • Being a loyal friend – based
  • Working to help others – based
  • Succeeding in your own way – based
  • Standing up for the weak – based
  • Being honest about your failures – based
  • Tackling the world with passion – based
  • Leading without authority – based
  • Accepting your flaws – based
  • Owning up to them – based
  • Motivating yourself to go further – based
  • Making informed decisions – based
  • Listening to and understanding others –based
  • Analyzing problems and finding solutions – based
  • Seeing the world differently – based
  • Working against money-grubbing corporations – based
  • Refusing to be controlled by social media – based
  • Taking responsibility for your actions – based
  • Rejecting the influence of peer pressure – based
  • Showing gratitude for what you have – based
  • Developing a thick skin – based
  • Not taking no for an answer – based
  • Embracing the joy of risk-taking – based
  • Winning without gloating – based
  • Taking time for yourself – based
  • Diversifying your investments – based
  • Helping others around you succeed – based
  • Avoiding useless debates – based
  • Refusing to give into oppression – based
  • Going against the grain – based
  • Moving through life with grace – based
  • Not caring about popular opinion – based
  • Not caving into herd mentality – based
  • Outwitting conventional wisdom – based
  • Standing your ground against bullies – based
  • Reclaiming lost ground – based
  • Detaching yourself from material possessions – based
  • Questioning authority – based
  • Resisting unjust power – based
  • Ignoring criticism – based
  • Seeing through deception – based
  • Overcoming adversity – based
  • Pursuing excellence – based
  • Living life without regrets – based
  • Becoming Unbreakable – based
  • Following your gut feeling – based
  • Slaying the dragon of Conformity – based
  • Crushing comfort zones – based
  • Exploring the unknown – based
  • Keeping a cool head in a crisis – based
  • Analyzing data intelligently – based
  • Not wasting time with gossip – based
  • Adopting a Zero-Tolerance policy – based
  • Connecting with likeminded people – based
  • Committing thought crimes – based
  • Spreading your message – based
  • Asserting your autonomy – based
  • Resolving conflicts quickly – based
  • Not conforming to gender roles – based
  • Refusing to settle for mediocrity – based
  • Not taking life too seriously – based
  • Living life to the fullest – based
  • Rewriting stories with your own pen – based
  • Expressing yourself without limits – based
  • Being You – based

Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to truly ensure that what someone is saying is true is to verify it yourself.

Relying on trust to make important decisions is the same as not making decisions at all, which would be why wise people have always told each other to never trust anyone, ever.

Instead, one should always verify all information, or else make use of carefully-chosen massive liabilities and hedges, so as to eliminate the need to trust.


Btw, did I mentioned the list was made by a Non-Human, Red-Pilled Entity 😁😋🤣

I would love to hear thoughts, opinions and critics about this, from you all dear readers.





CypherPunk Movement

THE CYPHERPUNK MOVEMENT

Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s.

Cryptography for the People

Encryption was primarily used for military purposes before the 1970s. People at that time were living in an analog world. Few had computers and even fewer could imagine a technology that would connect almost every human being on the planet – the internet.

Two publications brought cryptography into the open, namely the “Data Encryption Standard” published by the US Government, and a paper called “New Directions in Cryptography” by Dr. Whitfield Diffie and Dr. Martin Hellman, published in 1976.

Dr. David Chaum started writing on topics such as anonymous digital cash and pseudonymous reputation systems in the 1980s, such as the ones described in “Security without Identification: Transaction Systems to make Big Brother Obsolete”. This was the first step toward the digital currencies we see today.

The Cypherpunks

We walk on shoulders of Giants!
Hughes, May, Back, Finney, Gilmore, Szabo

It wasn’t until 1992 that a group of cryptographers in the San Francisco Bay area started meeting up on a regular basis to discuss their work and related ideas. They built a basis for years of cryptographic research to come.

Besides their regular meetings, they also started the Cypherpunk mailing list in which they discussed many ideas including those which led to the birth of Bitcoin.

In late 1992 Eric Hughes, one of the first cypherpunks, wrote “A Cypherpunk’s Manifesto” laying out the ideals and vision of the movement.

Note: We encourage you to read A Cypherpunk’s Manifesto. The Manifesto is just as relevant today as it was in 1992. This short read takes only a few minutes of your time. It’s astonishing to see how much foresight the early members had when most people didn’t even think about computers yet.


A Cypherpunks’s Manifesto

An excerpt from the Manifesto:

“Privacy is necessary for an open society in the electronic age.

Privacy is not secrecy.

A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know.

Privacy is the power to selectively reveal oneself to the world.”

“Privacy in an open society also requires cryptography.

If I say something, I want it heard only by those for whom I intend it.

If the content of my speech is available to the world, I have no privacy.

To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy.”

“We must defend our own privacy if we expect to have any.

We must come together and create systems which allow anonymous transactions to take place.

People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers.

The technologies of the past did not allow for strong privacy, but electronic technologies do.”

“We the Cypherpunks are dedicated to building anonymous systems.

We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.”


Electronic Cash

Although you might have just heard about this movement for the first time, you have most definitely benefitted from the efforts of some of their members in building Tor, BitTorrent, SSL, and PGP encryption. It should not surprise you that many concepts and ideas that originated from this group led to the emergence of cryptocurrencies.

In 1997, Dr. Adam Back created HashCash, which he proposed as a measure against spam. A little later, in 1998, Wei Dai published his idea for b-money and conceived the ideas of Proof-of-Work and Proof-of-Stake to achieve consensus across a distributed network. In 2005 Nick Szabo published a proposal for Bit Gold. There was no cap on the maximum supply but he introduced the idea to value each unit of Bit Gold by the amount of computational work that went into producing it. Although this is not how cryptocurrencies are valued, the price of production (comprised of hardware and electricity cost) plays a role in the pricing of these digital assets.

In 2008, Satoshi Nakamoto released the Bitcoin white paper, citing and building upon HashCash and b-money. Citations from his early communications and parts of his white paper, such as the following on privacy, suggest Nakamoto was close to the cypherpunk movement.

“The traditional banking model achieves a level of privacy by limiting access to information to the parties involved and the trusted third party. The necessity to announce all transactions publicly precludes this method, but privacy can still be maintained by breaking the flow of information in another place: by keeping public keys anonymous. The public can see that someone is sending an amount to someone else, but without information linking the transaction to anyone. This is similar to the level of information released by stock exchanges, where the time and size of individual trades, the ‘tape’, is made public, but without telling who the parties were.”

Technology did not enable strong privacy prior to the 20th century, but neither did it enable affordable mass surveillance. We believe in the human right to privacy and work towards enabling anyone who wishes to claim his or her privacy to do so. We see a cryptocurrency with selective privacy as a good step in the right direction of reclaiming our privacy.





Block 170 – First ever bitcoin transaction


2009-01-12 04:30
#1 bitcoin transaction

The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170.

P2PK is no longer used because it is a more expensive, less private, and less secure way of receiving bitcoin than other methods.

Pay-to-Public-Key (P2PK)
Quick facts
• Transaction:
f4184fc596403b9d638783cf57adfe4c75c605f6356fbc91338530e9831e9e16

Timestamp: ‎

2009-01-12 04:30 (14 years ago)

Fee: 0 sat / $0.00

Fee rate: 0.00 sat/vB

• Details

Size : 275 B

Virtual size: ‎275 vB

Weight: ‎1.1 kWU

Version : 1

Locktime : 0

Transaction hex:

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

• Inputs & Outputs

P2PK: ‎50.00000000 BTC

ScriptSig (ASM):

OP_PUSHBYTES_71 304402204e45e16932b8af514961a1d3a1a25fdf3f4f7732e9d624c6c61548ab5fb8cd410220181522ec8eca07de4860a4acdd12909d831cc56cbbac4622082221a8768d1d0901

ScriptSig (HEX):
47304402204e45e16932b8af514961a1d3a1a25fdf3f4f7732e9d624c6c61548ab5fb8cd410220181522ec8eca07de4860a4acdd12909d831cc56cbbac4622082221a8768d1d0901

nSequence: 0xffffffff

Previous output script:

OP_PUSHBYTES_65 0411db93e1dcdb8a016b49840f8c53bc1eb68a382e97b1482ecad7b148a6909a5cb2e0eaddfb84ccf9744464f82e160bfa9b8b64f9d4c03f999b8643f656b412a3
OP_CHECKSIG

Previous output type: P2PK

P2PK: ‎10.00000000 BTC

ScriptPubKey(ASM):

OP_PUSHBYTES_65 04ae1a62fe09c5f51b13905f07f06b99a2f7159b2225f374cd378d71302fa28414e7aab37397f554a7df5f142c21c1b7303b8a0626f1baded5c72a704f7e6cd84c
OP_CHECKSIG

ScriptPubKey (HEX):

4104ae1a62fe09c5f51b13905f07f06b99a2f7159b2225f374cd378d71302fa28414e7aab37397f554a7df5f142c21c1b7303b8a0626f1baded5c72a704f7e6cd84cac

Type: P2PK

P2PK: ‎40.00000000 BTC

ScriptPubKey (ASM):

OP_PUSHBYTES_65 0411db93e1dcdb8a016b49840f8c53bc1eb68a382e97b1482ecad7b148a6909a5cb2e0eaddfb84ccf9744464f82e160bfa9b8b64f9d4c03f999b8643f656b412a3
OP_CHECKSIG

ScriptPubKey (HEX):
410411db93e1dcdb8a016b49840f8c53bc1eb68a382e97b1482ecad7b148a6909a5cb2e0eaddfb84ccf9744464f82e160bfa9b8b64f9d4c03f999b8643f656b412a3ac

Type : P2PK

50.00000000 BTC

• Details

Size: ‎275 B

Virtual size: ‎275 vB

Weight : 1.1 kWU

Version: ‎1

Locktime: 0

Transaction hex:

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

Source: https://mempool.space/





The Art of War Quotes


The Art of War


The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC).

The work, which is attributed to the ancient Chinese military strategist Sun Tzu (“Master Sun”), is composed of 13 chapters. Each one is devoted to a different set of skills or art related to warfare and how it applies to military strategy and tactics.

For almost 1,500 years it was the lead text in an anthology that was formalized as the Seven Military Classics by Emperor Shenzong of Song in 1080.

The Art of War remains the most influential strategy text in East Asian warfare and has influenced both East Asian and Western military theory and thinking and has found a variety of applications in a myriad of competitive non-military endeavors across the modern world including espionage, culture, politics, business, and sports.

When you start to read Sun Tzu’s words, you may realize that they have very real applications to modern life, especially if you are in a position of leadership or if you deal regularly with strategic questions.

These musings can be applied to practical problems you may be trying to solve, and they can also be good starting points for more theoretical reflection.

Topics that span from philosophy and wisdom to strategy and leadership, here are the most notable quotes from The Art of War.


Quotes on the Philosophy of War


  • “The art of war is of vital importance to the State. It is a matter of life and death, a road either to safety or to ruin.”
  • “All warfare is based on deception.”
  • “It is only one who is thoroughly acquainted with the evils of war that can thoroughly understand the profitable way of carrying it on.”
  • “The skillful soldier does not raise a second levy, neither are his supply-wagons loaded more than twice.”
  • “To fight and conquer in all your battles is not supreme excellence; supreme excellence consists in breaking the enemy’s resistance without fighting.”
  • “He will win who knows when to fight and when not to fight.”
  • “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”
  • “What the ancients called a clever fighter is one who not only wins, but excels in winning with ease.”
  • “Making no mistakes is what establishes the certainty of victory, for it means conquering an enemy that is already defeated.”
  • “Water shapes its course according to the nature of the ground over which it flows; the soldier works out his victory in relation to the foe whom he is facing.”
  • “Success in warfare is gained by carefully accommodating ourselves to the enemy’s purpose.”
  • “Energy may be likened to the bending of a crossbow; decision, to the releasing of the trigger.”
  • “Anger may in time change to gladness; vexation may be succeeded by content. But a kingdom that has once been destroyed can never come again into being; nor can the dead ever be brought back to life.”
  • “If your opponent is of choleric temper, seek to irritate him. Pretend to be weak, that he may grow arrogant.”
  • “In war, practice dissimulation, and you will succeed.”
  • “If the enemy leaves a door open, you must rush in.”
  • “We cannot enter into alliances until we are acquainted with the designs of our neighbors.”
  • “The experienced soldier, once in motion, is never bewildered; once he has broken camp, he is never at a loss.”
  • “If you know the enemy and know yourself, your victory will not stand in doubt.”

Quotes on War and Leadership


It is clear throughout The Art of War that victory is explicitly related to the strength of an army’s leader. Sun Tzu’s advice for generals and commanders applies to many kinds of leaders.

  • “The general who wins a battle makes many calculations in his temple ere the battle is fought. The general who loses a battle makes but few calculations beforehand.”
  • “The general who is skilled in defense hides in the most secret recesses of the earth; he who is skilled in attack flashes forth from the topmost heights of heaven.”
  • “The consummate leader cultivates the moral law, and strictly adheres to method and discipline; thus it is in his power to control success.”
  • “Simulated disorder postulates perfect discipline; simulated fear postulates courage; simulated weakness postulates strength.”
  • “Whoever is first in the field and awaits the coming of the enemy, will be fresh for the fight; whoever is second in the field and has to hasten to battle will arrive exhausted.”
  • “The quality of decision is like the well-timed swoop of a falcon which enables it to strike and destroy its victim.”
  • “All men can see the tactics whereby I conquer, but what none can see is the strategy out of which victory is evolved.”
  • “Do not repeat the tactics which have gained you one victory, but let your methods be regulated by the infinite variety of circumstances.”
  • “He who can modify his tactics in relation to his opponent and thereby succeed in winning, may be called a heaven-born captain.”
  • “The difficulty of tactical maneuvering consists in turning the devious into the direct, and misfortune into gain.”
  • “Maneuvering with an army is advantageous; with an undisciplined multitude, most dangerous.”
  • “We are not fit to lead an army on the march unless we are familiar with the face of the country—its mountains and forests, its pitfalls and precipices, its marshes and swamps.”
  • “Move not unless you see an advantage; use not your troops unless there is something to be gained; fight not unless the position is critical.”
  • “No ruler should put troops into the field merely to gratify his own spleen; no general should fight a battle simply out of pique.”
  • “What enables the wise sovereign and the good general to strike and conquer, and achieve things beyond the reach of ordinary men, is foreknowledge.”
  • “When the general is weak and without authority; when his orders are not clear and distinct; when there are no fixed duties assigned to officers and men, and the ranks are formed in a slovenly haphazard manner, the result is utter disorganization.”
  • “If fighting is sure to result in victory, then you must fight, even though the ruler forbid it; if fighting will not result in victory, then you must not fight even at the ruler’s bidding.”
  • “Regard your soldiers as your children, and they will follow you into the deepest valleys; look upon them as your own beloved sons, and they will stand by you even unto death.”
  • “The general who advances without coveting fame and retreats without fearing disgrace, whose only thought is to protect his country and do good service for his sovereign, is the jewel of the kingdom.”
  • “A leader leads by example not by force.”

Quotes on War and Strategy


Sun Tzu’s strategic counsel can still be used in the 21st century. Whether you are creating a business strategy or devising steps to pursue a personal goal, these quotes from The Art of War may offer some valuable insights and guidance.

  • “Hold out baits to entice the enemy. Feign disorder, and crush him.”
  • “If equally matched, we can offer battle; if slightly inferior in numbers, we can avoid the enemy; if quite unequal in every way, we can flee from him.”
  • “Thus it is that in war the victorious strategist only seeks battle after the victory has been won, whereas he who is destined to defeat first fights and afterwards looks for victory.”
  • “The control of a large force is the same principle as the control of a few men: it is merely a question of dividing up their numbers.”
  • “The clever combatant looks to the effect of combined energy, and does not require too much from individuals.”
  • “You can be sure of succeeding in your attacks if you only attack places which are undefended.”
  • “O divine art of subtlety and secrecy! Through you we learn to be invisible, through you inaudible; and hence we can hold the enemy’s fate in our hands.”
  • “Numerical weakness comes from having to prepare against possible attacks; numerical strength, from compelling our adversary to make these preparations against us.”
  • “Knowing the place and the time of the coming battle, we may concentrate from the greatest distances in order to fight.”
  • “In making tactical dispositions, the highest pitch you can attain is to conceal them.”
  • “Carefully compare the opposing army with your own, so that you may know where strength is superabundant and where it is deficient.”
  • “To take a long and circuitous route, after enticing the enemy out of the way, and though starting after him, to contrive to reach the goal before him, shows knowledge of the artifice of deviation.”
  • “Let your rapidity be that of the wind, your compactness that of the forest.”
  • “In raiding and plundering be like fire, in immovability like a mountain.”
  • “Place your army in deadly peril, and it will survive; plunge it into desperate straits, and it will come off in safety.”
  • “Forestall your opponent by seizing what he holds dear, and subtly contrive to time his arrival on the ground.”
  • “Walk in the path defined by rule, and accommodate yourself to the enemy until you can fight a decisive battle.”
  • “At first, then, exhibit the coyness of a maiden, until the enemy gives you an opening; afterwards emulate the rapidity of a running hare, and it will be too late for the enemy to oppose you.”
  • “If it is to your advantage, make a forward move; if not, stay where you are.”
  • “If you know the enemy and know yourself, your victory will not stand in doubt; if you know Heaven and know Earth, you may make your victory complete.”
  • “Let your plans be dark and impenetrable as night, and when you move, fall like a thunderbolt.”




20 Security Rules for bitcoin


Questions & Answers Chapter

20 Rules for Security in bitcoin

Here’s a short list of common sense Rules, to use and implement for a better Security while using bitcoin and other cryptocurrencies.

In the hopes that they are quite self-explanatory Rules, please do try for your own good and your assets, to follow them…

If you have any questions, please do not hesitate to ask in the comments.


  1. Keep your private keys safe and secure, and never share them with anyone.
  2. Use a hardware wallet to store your bitcoins offline and away from potential hackers.
  3. Use a strong and unique password for your wallet and any exchange account.
  4. Be wary of phishing attempts and never click on links from unknown sources.
  5. Use multi-factor authentication (MFA) whenever possible to secure your accounts.
  6. Use a different password for each account and change them frequently.
  7. Avoid using public Wi-Fi networks for sensitive transactions.
  8. Keep your computer and mobile devices secure with updated antivirus and anti-malware software.
  9. Use a separate address for each transaction, and avoid reusing addresses.
  10. Verify the authenticity of any website or service you use for Bitcoin transactions.
  11. Use a reputable and secure Bitcoin exchange or wallet service.
  12. Use a hardware token or other secure means of 2FA, avoid using SMS.
  13. Be mindful of social engineering and do not reveal personal information to unknown parties
  14. Use a unique email address and phone number for every exchange account.
  15. Keep a copy of your private key, Seed Phrase or wallet recovery phrase in a safe place.
  16. Be skeptical of unsolicited offers, promotions or services.
  17. Learn about the security features of your wallet and use them.
  18. Do not leave your funds on exchange for long time.
  19. Educate yourself about the risks of using Bitcoin and other cryptocurrencies.
  20. Regularly monitor your accounts and transactions for suspicious activity.




With 🧡

Running bitcoin – Hal Finney


Wonder In Peace Bright Mind

Join Honorary Chair Fran Finney and the Running Bitcoin Challenge Committee as we honor legendary cypher punk, Hal Finney.

This is THE EVENT that combines Hal Finney’s love of running and Bitcoin and is raising funds and awareness to help defeat ALS, which ultimately claimed his life in 2014.

You are challenged to run (or walk, roll, or hike) the equivalent of a half marathon — cumulatively or all at once — by the end of January 10, 2023.

From wherever you are, spread the word about Bitcoin, participate in a healthy activity, feel good about doing your part to defeat ALS, and start the year off right


Hal Finney, one of the earliest bitcoin contributors, died eight years ago from complications of nervous system disease amyotrophic lateral sclerosis (ALS).

His spouse, Fran Finney, is now organizing a half marathon to raise funds for ALS research via bitcoin.



The “Running Bitcoin Challenge” is set to take place between Jan. 1 and Jan. 10. The timing of the occasion leads up to the anniversary of Hal Finney’s “Running bitcoin” tweet, in which Finney famously disclosed he was deploying a Bitcoin node.

There is no set location — participants can choose to join anywhere they wish. Players are encouraged to either run, walk, roll or hike the equivalent of a half marathon (Hal’s favorite distance) either in one go or over the entire 10-day period.

Donors contributing at least $100 will receive an official shirt with the half marathon’s logo, while the event’s top 25 fundraisers will get a Hal Finney collectible signed by his wife.

As of Wednesday morning, the event has already managed to secure nearly $10,000 in bitcoin donations.

An advocate of cryptography and digital privacy, Finney was the recipient of the first-ever bitcoin transfer from the network’s pseudonymous creator Satoshi Nakamoto.

The bitcoin community often suspected Finney was Nakamoto, a claim he consistently denied. He reportedly found out about his condition in 2009 and decided to move away from the project.

Hal’s name is high in the Bitcoin pantheon as one of the first people to voice support for Satoshi Nakamoto’s invention and for being the first person to receive a Bitcoin transaction from Satoshi.

He was, for a time, considered one of the top contenders on the list of potential Satoshis himself (many in blockchain who reject Dr. Craig Wright’s statements still falsely believe Finney to be Bitcoin’s real creator).

Hal, who referred to himself as a “cypherpunk,” was a cryptographic activist who went from developing video games to working on the Pretty Good Privacy (PGP) project in the 1990s. He described his PGP work as “dedicated to the goal of making Big Brother obsolete.”

PGP creator Phil Zimmerman hired Hal as his first employee when PGP became PGP Corporation in the early 2000s. He described Hal as a “gregarious man” who loved skiing and long-distance running.

Despite gradual paralysis that eventually forced him to stop working, Hal continued to code software and follow the Bitcoin project.

Almost as famous as his 2009 tweet is his “Bitcoin and me” post on BitcoinTalk.org in March 2013, the last he’d ever make.

It’s a long post, and Hal was “essentially paralyzed” at the time, using an eye tracker to type. Forum stats show the post has been read over 278,000 times.

“When Satoshi announced the first release of the software, I grabbed it right away,” he wrote. “I think I was the first person besides Satoshi to run bitcoin. I mined block 70-something, and I was the recipient of the first bitcoin transaction when Satoshi sent ten coins to me as a test.

I carried on an email conversation with Satoshi over the next few days, mostly me reporting bugs and him fixing them.”

Hal himself always denied being Satoshi Nakamoto, adding later that he’d sold most of the Bitcoins he mined (at pre-2014 prices) to pay for his treatments. He also mentioned putting some in a safe deposit box for his children.

“And, of course, the price gyrations of bitcoins are entertaining to me.

I have skin in the game.

But I came by my bitcoins through luck, with little credit to me.

I lived through the crash of 2011.

So I’ve seen it before.

Easy come, easy go.”

Hal Finney

www.runningbitcoin.us

Admiration and great Respect


With 🧡

Happy New Year 2023



Only One Wish for 2023




Bitcoin WhitePaper Day

Bitcoin – A Peer-to-Peer
Electronic Cash System

It’s bitcoin White Paper Day.

The mailing list was hosted by Metzdow and run by a group of cypherpunks who shared ideas on creating a kind of digital currency and payment system. Satoshi shared the whitepaper in a message that read, “Bitcoin P2P e-cash paper,” which outlined the main properties of the system.


“Bitcoin P2P e-cash paper
Satoshi Nakamoto satoshi at vistomail.com
Fri Oct 31 14:10:00 EDT 2008
Previous message: Fw: SHA-3 lounge
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
I’ve been working on a new electronic cash system that’s fully
peer-to-peer, with no trusted third party.

The paper is available at:
http://www.bitcoin.org/bitcoin.pdf

The main properties:
Double-spending is prevented with a peer-to-peer network.
No mint or other trusted parties.
Participants can be anonymous.
New coins are made from Hashcash style proof-of-work.
The proof-of-work for new coin generation also powers the
network to prevent double-spending.

Bitcoin: A Peer-to-Peer Electronic Cash System

Abstract. A purely peer-to-peer version of electronic cash would
allow online payments to be sent directly from one party to another
without the burdens of going through a financial institution.
Digital signatures provide part of the solution, but the main
benefits are lost if a trusted party is still required to prevent
double-spending. We propose a solution to the double-spending
problem using a peer-to-peer network. The network timestamps
transactions by hashing them into an ongoing chain of hash-based
proof-of-work, forming a record that cannot be changed without
redoing the proof-of-work. The longest chain not only serves as
proof of the sequence of events witnessed, but proof that it came
from the largest pool of CPU power. As long as honest nodes control
the most CPU power on the network, they can generate the longest
chain and outpace any attackers. The network itself requires
minimal structure. Messages are broadcasted on a best effort basis,
and nodes can leave and rejoin the network at will, accepting the
longest proof-of-work chain as proof of what happened while they
were gone.

Full paper at:
http://www.bitcoin.org/bitcoin.pdf

Satoshi Nakamoto

———————————————————————
The Cryptography Mailing List
Unsubscribe by sending “unsubscribe cryptography” to majordomo at metzdowd.com”


Source:
https://www.metzdowd.com/pipermail/cryptography/2008-October/014810.html


The pseudonymous Bitcoin creator disclosed that they had been working on a new electronic cash system that uses a Proof-of-Work (PoW) consensus algorithm that required no trusted third party. Although the document met mixed reactions, it was the beginning of what is known today as blockchain technology.

A couple of months after the release, the Bitcoin network was launched, with the first block mined on January 3, 2009. About eight days later, Hal Finney received the first transaction of 10 BTC from Nakamoto, after which he posted a legendary tweet that read:

In the 14 years since that day, bitcoin’s value rose from zero to a peak of $68,990 last November and was hovering above $20,000 on Monday, according to CoinDesk data. The cryptocurrency currently has a market capitalization of over $390 billion. It also inspired the creation of more than 20,000 different cryptocurrencies currently in circulation, while bitcoin remains the largest by market cap.

Over the years, several people have been rumored to be Nakamoto, including early bitcoin contributor Hal Finney, cryptographer Nick Szabo, physicist Dorian Nakamoto and even Tesla’s chief executive Elon Musk, who all denied the claims.

Satoshi’s identity is still a mystery, but Finney was well-known for his contribution to the creation of Bitcoin. He worked hand-in-hand with Nakamoto to find and fix bugs in Bitcoin’s underlying infrastructure. Before his death in 2014, Finney shared a detailed story about his journey with Bitcoin

About a year after the launch of Bitcoin, the cryptocurrency went on to record its first real-world commercial use case when a Florida man spent 10,000 BTC to purchase two large Papa John’s pizzas on May 22, 2010.

Although the coins were worth $41 at prices back then, at today’s price, the transaction is worth more than $200 million. To commemorate the event, the Bitcoin community celebrates Bitcoin Pizza Day every year on May 22.


Bitcoin / bitcoin / blockchain




Beware of Scams !!!

Beware !!!

Just as the crypto industry is expanding and getting local adoption from individuals, co-operations, organisations and few countries  the same rate at which we have crypto enthusiast increasing in number which i see so worrisome and also a call for major concern.

Reason been that as more people get involved in the crypto business the more scammers are likely to increase their technique and the more scammers get recruited.

To avoid walking on scammers path, requires to be well informed of every new technique they can ever deploy against their potential victim.

To stay off scammers path users must:

  • Avoid phishing links.
  • Make sure to pay attention to the spelling of the website, as well as their URL as this can reveal whether it is a phishing site or not.
  • Never invest in a project without a well structured community
  • Pay close attention to the engagement within the community for suspicious activities
  • Ensure you assets are off CEX
  • Be more smart and less greedy
  • Don’t jump into a project/coin only based on the hype from advertisers (especially twitter)
  • Avoid any “too good to be true” investment
  • Avoid send me 1$ and I’ll send back 2$ scams, no matter how reputable is the account calling for that
  • Protect your coins (keep your coins on your wallet, use hardware wallet where possible, never give out wallet’s seed, keep backup seed offline)
  • Don’t be greedy and/or illiterate.
  • Be sure to feed yourself with necessary knowledge, if you want to invest.
  • Knowledge from experience is good but you can also take legitimate one from other people.
  • Not everything that is being offered to you is true. Do not be deceived.
  • Be careful who you are trusting.
  • Always be skeptical !!!
  • Enable Two-factor authentication for all your accounts.
  • Using of firewalls.
  • Installing an up to date anti virus software.
  • Use strong passwords and yet easily accessible ones for your convenience.
  • Stay away from malicious links or attachments you come across on the web.
  • Make sure your private keys are well stored and in hard wallet
  • Make sure your passwords are not vulnerable online to attacks i.e don’t store passwords online or any website
  • Whenever a stranger message you first for a business or an investment, it is a Red flag.
  • Someone who doesn’t know you would want you to make big money, another Red flag.
  • Whenever they introduce a” business opportunity” to you and then hasten you in order make you take a hasty decision it’s not  genuine, they are trying their best to make you take a fast decision without telling your loved ones and friends who will discourage you.
  • It is safer to  assume anyone you don’t know, communicating with you is a scammer until it is proven otherwise.
  • Read the whitepaper and research well of the company where you are going to invest because many scams are done by this method.
  • Check whether it is genuine or fake.
  • Scammers are constantly upgrading their scam methods and anyone can be the next target.
  • Loss doesn’t just happen due to an internal or intentional mistake, and when it does happen everyone has a similar sense of remorse and risks that are absolute consequences.
  • You’ll be fooled many times by those scammers that have maintained a well structured fake community.
  • They can hire those PRs and people talking inside their community to make it look like they’re a legit community.
  • As for their workers, they’ll just tell that they need engagement but the purpose of it, they’re not talking about it because that’s what the main purpose it.
  • And that’s to make it look genuine that they have real people inside the community. But in reality, it’s all fake people that they’ve hired just to make discussions all over their place.
  • It’s safe to say as well that it’s not just the crypto industry that is not safe for newbies, everything that talks about money is not safe for everyone.
  • Crypto is the latest thing and in the last 5 years it become so successful that scammers make this as their paradise as there are a lot of naive investors in the market.
  • Do your investigations, and don’t listen to influencers and believe them.
  • Think that this is your hard earn money so you need to be careful where you are going to invest it.
  • Don’t be Greedy.
  • Don’t jump on it like a hungry cow.
  • Don’t trust the sweet words they offer you. Most of them are too good to be true but they will always sound inviting to invest with.
  • Make a wall to not fully support them unless they have proven themselves worthy of that kind of respect.
  • Always be in doubt. That will be the shield that will protect you from being scammed.
  • Must simply assume that our coins are never really safe despite our best efforts, so it is important to always be on alert and protect our coins to the best of our ability.
  • Improve the security of your coins by an important margin by buying a hardware wallet, since they are very secure devices and they are relatively cheap, instead of risking storing our coins in our computers or at an exchange.
  • Always good to know how to make technical and fundamental analysis so that you can get specific information what is the situation of the projects you want to invest
  • Many projects are delivering a good testament, but they always ended into a scam , so we need to be smart enough and have a lot of preparation before investing or trading