Seven common mistakes crypto investors and traders make?


Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.

Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.

Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.

Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.

Losing your keys

Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.

On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.

Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.

Storing coins in online wallets

Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.

There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.

Not keeping a hard copy of your seed phrase

To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.

Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.

Fat-finger error

A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.

One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.

Sending to the wrong address

Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.

This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.

Over diversification

Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.

Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.

Not setting up a stop-loss arrangement

A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.

In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.

That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.

Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.

Source: https://bitcointalk.org/





Seven common mistakes crypto investors and traders make?


Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.

Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.

Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.

Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.

Losing your keys

Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.

On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.

Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.

Storing coins in online wallets

Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.

There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.

Not keeping a hard copy of your seed phrase

To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.

Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.

Fat-finger error

A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.

One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.

Sending to the wrong address

Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.

This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.

Over diversification

Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.

Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.

Not setting up a stop-loss arrangement

A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.

In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.

That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.

Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.

Source: https://bitcointalk.org/





Seven common mistakes crypto investors and traders make?


Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.

Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.

Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.

Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.

Losing your keys

Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.

On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.

Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.

Storing coins in online wallets

Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.

There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.

Not keeping a hard copy of your seed phrase

To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.

Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.

Fat-finger error

A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.

One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.

Sending to the wrong address

Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.

This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.

Over diversification

Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.

Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.

Not setting up a stop-loss arrangement

A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.

In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.

That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.

Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.

Source: https://bitcointalk.org/





Blockchain Spectrum

The Blockchain Spectrum

Now, even if someone does not have the drawbacks of decades-long experience and mental models with a specific asset class, it is still very hard to understand Bitcoin.

Why? Because Bitcoin is the intersection of many, many different fields.

To truly understand Bitcoin, there is no other way than being a polymath.

Even if one has made it as far to (a) realize Bitcoin is something completely new and solely using existing heuristics and mental models will not work and (b) with Bitcoin, more than anything else, we do not know what we do not know — understanding still requires a very broad set of competences.

The correct approach to understand when one starts going down the Bitcoin rabbit hole is therefore to assume one knows nothing and any experience and insight one has from previous aspects of life brings
very little to the table.

First principles thinking is required.
We can, however, try to define a little deeper what Bitcoin is. Below is listed some different ways of wrapping one’s head around Bitcoin.

Not an exhaustive list.

A living organism

Bitcoin is Free and Open Source software. It is not a piece of IP owned by a centralized joint-stock company that needs to optimize for the bottom line of the next quarter and is incapable of cannibalizing itself. Since the Bitcoin whitepaper was released and the
genesis block was mined, we have seen an explosion of experiments, ideas and creative geniuses get involved in Bitcoin and crypto as a whole. To think of Bitcoin as a living, technological organism that adjusts, develops and constantly changes to survive can be useful.

A religion.

Money, as many have learned and realized in recent decade, is just a social
construction we are all part of. The value therefore comes from the amount of true believers.

Continuing this line of thinking, one could describe the religion as consisting of:

  • Prophet: Satoshi. No longer present. Impossible to ask questions.
  • Convictions: Decentralization.
  • Rituals: Running nodes. Mining. Hodling.
  • Holy scriptures: Bitcoin whitepaper. As with all holy scriptures, people interpret them in their own way.
  • Sacred objects: Genesis block, lowercase bitcoin
  • Sects: Different interpretations resulting in different factions/sects: small blockers, big blockers, etc.

An emerging economy

  • The consensus protocol can be thought of as the constitution
  • The society as the constituency (users on the demand-side; miners on the supply-side)
  • Core developers as the executive department who write the code and execute on the strategy, but amendments to the protocol (i.e., constitution) require approval from the constituency)
  • The native token is the internal currency
  • The investors underwrite the currency

Additionally, many one-liners and memes exist to describe Bitcoin. Not an exhaustive list.

  • Sound money
  • Digital gold
  • “An insurance policy against an Orwellian future”
  • “A tool for freeing humanity from oligarchs and tyrants, dressed up as a get-rich-quick scheme”
  • Censorship- judgment & seizure-resistant money
  • Peer to peer digital cash
  • Swiss Bank account in your pocket
  • Unstoppable and uncensorable hard money

Source: https://backed.ai/





Trilemma of International Finance

Trilemma of International Finance

The relative value of any two curren-
cies—the exchange rate—is determined
through their sale and purchase on the global foreign exchange market. If government policy interferes with this market by changing the relative supply or demand of currencies, the exchange rate is managed.

The trilemma of international finance, is a restriction on government policy that follows immediately from the interaction of exchange rates, monetary policy and international capital flows.


Trilemma of International Finance

The trilemma states that any country can have only two of the following:

  • (1) Unrestricted international capital markets.
  • (2) A managed exchange rate.
  • (3) An independent monetary policy.

If the government wants a managed exchange rate but does not want to interfere
with international capital flows, it must use
monetary policy to accommodate changes
in the demand for its currency in order to
stabilize the exchange rate.

In the extreme, this would take the form of a currency board arrangement, where the domestic currency is fully backed by a foreign currency (as in the case of Hong Kong).

In such a situation, monetary policy can no longer be used for domestic purposes (it is no longer independent).

If a country wishes to maintain control over monetary policy to reduce domestic unemployment or inflation, for example, it must limit trades of its currency in the international capital market (it no longer has free international capital markets).

A country that chooses to have both unrestricted inter-national capital flows and an independent monetary policy can no longer influence its exchange rate and, therefore, cannot have a managed exchange rate.



Pieters and Vivanco (2016), government
attempts to regulate the globally accessible
bitcoin markets are generally unsuccessful,
and, as shown in Pieters (2016), bitcoin exchange rates tend to reflect the
market, not official exchange rates.

Should the flows allowed by bitcoin become big enough, all countries will have, by default, unrestricted international capital markets.

Thus, with bitcoin, (1) unrestricted
international capital markets is chosen by
default.

Therefore, the only remaining policy choice is between (2) managed exchange rates or (3) independent monetary policy.

If the country chooses (1) and (2), it must use reactive monetary policy to achieve the managed exchange rate.

If the country chooses (1) and (3), it must have a floating exchange rate because it has no remaining tools with which to maintain a managed exchange rate.

Ali et al. (2014), the European Central
Bank (2015) and the Bank for International
Settlements (2015) all concur that cryptocur-
rencies may eventually undermine monetary policy.





With 💚

Convergence of blockchain with AI and IOT


IoT and AI are growing exponentially

Internet of Things – IoT

A future of transacting intelligent machines


• Individually, each of these technologies deserves all the attention they’re getting as enablers and disruptors

• But, taken together?

• Their transformative effect becomes multiplicative

A future driven by machine connectivity, data exchange and commercial services:

  • IoT connects billions of machines and sensors generate unprecedented quantities of real-time data
  • AI enables the machines to act on data and trigger services
  • Blockchain functions are the transaction layer where data and service contracts are securely stored and payments for services are settled

How does blockchain support intelligent connected machines?


Smart Contracts enable self-executing and self-enforcing contractual states

  • Custom financial instruments (tokens), records of ownership of an underlying physical asset (smart property), any
  • complex business logic that can be programmable
  • Can such applications be ideal for intelligent (AI) and connected (IoT) machines?
  • These machines are intelligent enough to negotiate contracts, but need a technology allowing them to securely sign and enforce them

Digital currencies create new forms of money

  • Programmable and active
  • Will such money be ideal for intelligent (AI) and connected (IoT) machines?
  • These machines will need digital currency to pay for services assigned through the smart contracts

How will the three technologies work together?


IoT – Internet of Things

  • Sensors allow us to cost-effectively gather tremendous amounts of data.
  • Connectivity allows us to transmit/broadcast these data.
  • But, there is a missing element: intelligence to process these data.

AI – Artificial Intelligence

  • Intelligence at the very edges of the network (mini-brains).
  • Combine with IoT and you have the ability to recognize meaningful patterns buried in mountains of data in ways that would be impossible for most humans, or even non-AI algorithms, to do.
  • But, there is a missing element: a secure storage layer for data and a transaction layer for services

DLT (blockchain) – Distributed Ledger Technology

  • Decentralized governance, coupled with no single point of failure, disintermediation, unalterable and searchable records of events.
  • Digital currencies and tokenized custom financial instruments.
  • Combine with AI and IoT and you have a new world of autonomous systems interacting with each other, procuring services from each other and settling transactions.

The technology stack of the future


Technology Stack of the Future

Toward a world of machine commerce


A world of Machine Commerce

M2M will need SSI (self-sovereign identities) – for objects!


Human Identities types

Object identities can be SSI by default

  • Multi-source, multi-verifier
  • Digitally signed, verifiable credentials that can prove issuer, holder and status
  • Secure peer-to-peer connections (permanent or session-based)
  • Exchange full credentials, partial credentials or ZKPs derived from credentials

Next milestone: Decentralized Organizations (DOs)


DOs are good at:

  • Coordinating resources that do not know/trust each other (including hybrid
  • H/M)
  • Governing in a geography-agnostic, censorship-resistant manner
  • Enabling short-term or informal organizational structures  (networks/communities)
  • Tracking and rewarding contribution

Challenges

  • Jurisdictional issues
  • Legislating new types of work for humans and work rules for machines
  • Governance modalities, including external supervision


Challenges


New/upgraded system architectures

• From legacy to blockchain/AI/IoT-native systems
• Integration, interoperability, backward compatibility
• ROI obvious ex post, difficult ex ante – Bootstrapping

Advanced analytics capabilities

• As devices at the edge become smarter, the smart contracts enabled by blockchain platforms will require more advanced data analytics capabilities and gateways to the physical world.

New Business Models

  • Disruptive innovation will dominate – but not without boom-and-bust cycles and big failures along the way.
  • Winners will NOT be the ones focusing on efficiency gains, but on disruptive models.

Key takeaways

• IoT, AI and DLT (blockchain) are foundational and exponentially growing technologies

  • When combined, they will create a new internet of connected, intelligent and commercially transacting machines
  • An era machine-to-machine (M2M) and human-to-machine (H2M) commerce is likely to emerge, with profound consequences on social and economic dynamics
  • New forms of corporations or organizational formats (code-only, autonomous) will emerge

• There are numerous challenges that must be overcome

  • IoT has outpaced the human internet, but is still a largely passive, insecure and privacy-vulnerable network
  • AI has made huge leaps, but still requires immense computational resources and is largely incompatible with edge computing
  • DLT is a new technology, largely untested at scale; both smart contracts and digital assets lack the regulatory clarity required for mass adoption

This work is available under a Creative Commons Attribution-Non-Commercial-No Derivatives license
© University of Nicosia,
Institute for the Future, unic.ac.cy/blockchain





With 💚

A.I.


Artificial Inteligence

Can computers be ‘intelligent’?

AI is about machines performing tasks normally requiring human intelligence

  • Visual perception, natural language processing, complex decision making (automated reasoning), artificial creativity, etc.
  • “AI is whatever hasn’t been done by computers yet” (Larry Tesler’s Theorem)
  • When AI solves a problem, it stops being considered AI and becomes part of everyday computing
  • So, in 1998, playing chess and optical character recognition were considered AI applications
  • Now, AI is more about autonomous robots and self-driving vehicles
  • In a few years time, these applications might not be considered AI anymore
  • AI is crossing into our everyday lives:
  • Face recognition, digital assistants, language translation and other applications on our mobile phones
  • New computer interfaces (e.g. non-invasive brain-machine interfaces)


Stages of AI

Artificial Narrow Intelligence (ANI)

  • Also known as Weak AI
  • Machines can perform a narrow set of specific tasks (e.g. play chess, sustain a dialogue with a human, identify faces in a picture, etc.)
  • Machine learning can be based on rules (reactive AI) or examples (limited memory AI)
  • Today’s AI is ANI

Artificial General Intelligence (AGI)

  • Also known as Strong AI
  • Machines possess human-like abilities to think and make decisions (theory of mind AI, self-aware AI)
  • In AGI, machines will be able to keep on learning by experience and develop their intelligence, much like humans do (but, presumably, faster and deeper)

Artificial Super Intelligence (ASI)

  • This is just a hypothesis at this stage: machines with AGI might one day reach a stage where they are collectively (much) smarter than humans
  • Singularity

Enterprise AI Companies – 2020


Sources:

https://topbots.com/
https://techreaserchonline.com/
https://muted.com/
https://rmit.edu.au/




With 💚

Bitcoin surges after accidentally released Treasury statement


Bitcoin surges after accidentally released Treasury statement



Prices of Bitcoin and other cryptocurrencies have soared following the apparent accidental release of a U.S. Treasury statement on Biden’s expected executive order on digital assets.

The premature statement by Treasury Secretary Yellen, which was dated March 9, has since been removed.

“President Biden’s historic executive order calls for a coordinated and comprehensive approach to digital asset policy.  This approach will support responsible innovation that could result in substantial benefits for the nation, consumers, and businesses. 

It will also address risks related to illicit finance, protecting consumers and investors, and preventing threats to the financial system and broader economy.”

Quote from the now deleted statement

At the time of writing, Bitcoin is up nearly 8% in the last 24 hours.

Biden’s executive order aims to regulate the crypto market while also reaping the benefits of digital currencies.

So far, like most countries in the world, the US has tended to react to developments and has limited itself to pointing to a political-economic approach that is yet to be developed.


Statement by Secretary of the Treasury Janet L. Yellen on President Biden’s Executive Order on Digital Assets


March 9, 2022

WASHINGTON –  U.S. Secretary of the Treasury Janet L. Yellen released the following statement on President Biden’s executive order on digital assets. 

“President Biden’s historic executive order calls for a coordinated and comprehensive approach to digital asset policy.  This approach will support responsible innovation that could result in substantial benefits for the nation, consumers, and businesses.  It will also address risks related to illicit finance, protecting consumers and investors, and preventing threats to the financial system and broader economy.

Under the executive order, Treasury will partner with interagency colleagues to produce a report on the future of money and payment systems. We’ll also convene the Financial Stability Oversight Council to evaluate the potential financial stability risks of digital assets and assess whether appropriate safeguards are in place. And, because the questions raised by digital assets often have important cross-border dimensions, we’ll work with our international partners to promote robust standards and a level playing field.

This work will complement ongoing efforts by Treasury. Already, the Department has worked with the President’s Working Group on Financial Markets, the FDIC, and OCC to study one particular kind of digital asset – stablecoins– and to make recommendations. Under the executive order, Treasury and interagency partners will build upon the recently published National Risk Assessments, which identify key illicit financing risks associated with digital assets. 

As we take on this important work, we’ll be guided by consumer and investor protection groups, market participants, and other leading experts.  Treasury will work to promote a fairer, more inclusive, and more efficient financial system, while building on our ongoing work to counter illicit finance, and prevent risks to financial stability and national security.”


Sources:

https://forbes.com/

https://disclose.tv/

https://bloomberg.com/

https://web.archive.org/web/20220309014601/https://home.treasury.gov/news/press-releases/jy0643




With 💚

ASICs vs. SuperComputers

Asics
SuperComputers

ASICs vs Supercomputers


Assigning the most powerful supercomputer to mine bitcoin would be comparable to hiring a grandmaster chess player to move a pile of bricks by hand.

The job would get done eventually but the chess player is much better at thinking and playing chess than exerting energy to repetitively move bricks. 

Likewise, combining the computing power of the most powerful supercomputers in the world and using them to mine bitcoin would essentially be pointless when compared to the ASIC machines used today.

ASICs are designed to do one thing as quickly and efficiently as possible, whereas a supercomputer is designed to do complicated tasks or math problems.

Since Bitcoin mining is a lottery based on random trial and error rather than complex math, specialization (ASICs) beats general excellence (supercomputers) everytime.


End of Lesson !!!



Made with 💚 by Free Spirit

✌ & 💚



With 💚

Veritas … In pictures…



Gold is Money…

Uni-Verse

Success



Genes that erase memories

Researches can erase painful memories from the brain


Pokemon Go users give away all privacy rights




Compounding Interest






Play the role of a fool…

Occult – Anatomy

20 Fastest Growing + Declining Jobs

Causes and Effects of Inflation

The History of Logistics

SSG 16.9 – Legal Identity for all

Scientists call for Protection from Non-Ionizing Electromagnetic Field Exposure

Protest’s are Illegal and punished with Jail Time in a “Free” Society !!!?¿!!!

Human Value Chain

Opposition to the use of Blockchain Identity – Part 1

Opposition to the use of Blockchain Identity – Part 2

Human Capital Performance Bond

Strategies for Investing in Undervalued Human Capital

U.S Army TRADOC G-2

Digitizing Government-to-Person (G2P) Payments

Will be Always Updated !!!


Made with 💚 by Free Spirit

✌ & 💚


Bitcoin Mining – Where the Profitable Future Lies



The Times – January 3, 2009

Bitcoin Genesis Block
Mined 03 January 2009

Cypherpunks Write Code

CODE IS LAW
THE SOONER HUMANKIND ACCEPTS IT,
THE SOONER IT CAN BUILD AROUND IT

Yeah.. I wonder Why 😂


Bitcoin made easy

How a Bitcoin transaction works

A humble Miner


How Bitcoin Mining Works

Mining Difficulty

Bitcoin Halving

Bitcoin Previous Halvings

Pools

Bitcoin Wallets

Bitcoin Stakeholders

Bitcoin Facts

Power to the People

Totalitarian Governments can kiss my 256-bit key

Bitcoin – People’s Money

Bitcoin cannot be Shut Down


The power of the long tail…



Central Bank’s 3 Strategies

F**k them, Enough !!!



Upcoming Smart Contracts Networks

Bitcoin Yearly Candles

Bitcoin Price History – Log Scale

Bitcoin Mining Ecosystem Map

Defi Ecosystem in Ethereum

DeFi Stack: Product& Application View

Syscoin Ecosystem


Syscoin

BSC Ecosystem

Popular Cryptocurrency

Crpto Ecosystem

Public Companies that own Bitcoin

Top Banks investing in Crypto

Bitcoin Inflation vs. Time

When you’re Ready…



Choose Wisely

Make bitcoin thrive, let fiat become humus…



Veritas non Auctoritas
Facit Legem

Most people misunderstand what bitcoin miners actually do, and as a result they don’t fully grasp the level of security provided by bitcoin’s hashrate.

In this article, we’ll explain proof of work in a non-technical way so that you’ll be able to counter the misinformation about supercomputers and quantum computers attacking the Bitcoin network in the future. 

Simply put, mining is a lottery to create new blocks in the Bitcoin blockchain. There are two main purposes for mining:

  1. To permanently add transactions to the blockchain without the permission of any entity.
  2. To fairly distribute the 21 million bitcoin supply by rewarding new coins to miners who spend real world resources (i.e. electricity) to secure the network.

To understand what is actually happening in this lottery system, let’s look at a simple analogy where every Bitcoin hash is equivalent to a dice roll.


Luck, Gambling, and SHA-256


Imagine that miners in the Bitcoin Network are all individuals gambling at a casino. In this example, each of these gamblers have a 1000 sided dice. They roll their die as quickly as possible, trying to get a number less than 10. Statistically, this may take a very long time, but as more gamblers join the game, the time it takes to hit a number less than 10 gets reduced. In short, more gamblers equals quicker rounds.

Once somebody successfully rolls a number less than 10, all gamblers at the table can look down and verify the number. This lucky gambler takes the prize money and the next round begins.

Ultimately, the process of mining bitcoin is very similar. All miners on the network are using Application Specific Integrated Circuits (ASICs), which are specialized computers designed to compute hashes as quickly as possible.

To “compute a hash” simply means plugging any random input into a mathematical function and producing an output.

More hashes per second (i.e. higher hashrate) is equivalent to more dice rolls per second, and thus a greater probability of success.

Miners propose a potential Bitcoin block of transactions, and use this for an input. The block is plugged into the SHA256 hash function which yields a fixed-sized output, known as a hash. A single hash can be computed in less than a millisecond, as it involves no complex math.

If the hash value is lower than the Bitcoin Network difficulty, then the miner who proposed the block wins. If not, then the miner continues trying by computing more hashes.

The successful miner’s block is then added to the blockchain, the miner is rewarded with newly issued bitcoin for their work, and the “next round” begins.


Sources :

https://wikipedia.com/

https://braiins.com/

https://blockdata.com/

https://coin98analytics.com/

https://scoopwhoop.com/

https://stakingrewards.com/

https://syscoin.org/

https://galaxydigitalresearch.com/

https://surveycrest.com/

The Times

The Economist

"Internet of Money" - Andreas Antonopoulus

Hal Finney Quotes

Timothy C. May Quote

Free Spirit Digital Art

!°! If I forgot someone, sorry ! Do tell and I'll add you as a source of inspiration on the list !!! Thanks for understanding !!!


Questions, opinions, critics and requests always welcomed and as time allows will be accomodated !!! 🤓 🙂 😉


Did you find this article helpful?

If so, please consider a donation to help the evolution and development of more helpful articles in the future, and show your support for alternative articles.

Your generosity is 💚 ly appreciated

You can donate in any crypto your 💚 desires 😊

Thank you all for your time !!!

✌ & 💚


Bitcoin (BTC) :

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


LiteCoin(LTC) :

LYAdiSpsTJ36EWCJ5HF9EGy9iWGCwoLhed


Ethereum(ETH) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


EthereumClassic(ETC) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


Cardano(ADA) :

addr1q88c5cccnrqy6xesszzvf7rd4tcz87klt0m0h6uvltywqe8txwmsrrqdnpq27594tyn9vz59zv0n8367lvyc2atvrzvqlvdm9d


BinanceCoin(BNB) :

bnb1wwfnkzs34knsrv2g026t458l0mwp5a3tykeylx


BitcoinCash (BCH)

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


Bitcoin SV (BSV)

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


ZCash(ZEC) :

t1fSSQX4gEhove9ngcvFafQaMPq5dtNNsNF


Dash(DASH) :

XcWmbFw1VmxEPxvF9CWdjzKXwPyDTrbMwj


Shiba(SHIB) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


Tron(TRX) :

TCsJJkqt9xk1QZWQ8HqZHnqexR15TEowk8


Stellar(XLM) :

GBL4UKPHP2SXZ6Y3PRF3VRI5TLBL6XFUABZCZC7S7KWNSBKCIBGQ2Y54


A world where anything is possible…
The choice is yours People !!!


With 💚

The other 6 Billion

Free Spirit’s Wondering…

Some moments of my online wondering…

R&D, wisdom, knowledge, curiosities, answers and many more questions 🙂🤣🙃




You have a Choice !!!

Power to the People !!!
Wake the F… Up !!!
No more excuses, you have a choice now !!!

WHO as in WORLD HEALTH ORGANISATION

P F I Z E R  Insider

Poem of the Legacy

Being Curious…

Of course it doesn’t comply…

The Problem with centralized Social-Media

10 Principles of Strategic Leadership

Global Reserve Currency

Psychology of a Market Cycle


Success

Triangle of Success



Be like a Tree…

If anyone understands this please enlighten me too 😊🤭🤗

http://www.revelationtimelinedecoded.com

ESG

For those that think WE are the Center of the Universe 🤣😅😂

Confident vs. Insecure People

Day by day…

Managing Complex Change

The Cone of Learning

The Hero’s Journey

Electromagnetic Field of the Heart

I-Ching

Language creates Reality

Sex Organs of the Machine World


Philosopher’s Stone

Isaac Newton

Abracadabra

Singularity

Multi-Mind Thought Control Process
APPLE INC.

Retrocausality

CERN


EGO

SYSCOIN ECOSYSTEM


JagStein

SysCoin

Bitcoin might bury FIAT 🙂 🤭 🙃

DEFI Ecosystem on Ethereum

DeFi Stack


Bitcoin Mining Ecosystem Map

…the other 6 Billion

bitcoin

This is about the other 6 Billion…

Top NFT Projects



Defender of the Flower

Flower of Life

Sacred Geometry

Seed & Flower of Life

Knowledge – An Antidote to Fear

JOIN THE REVOLUTION 😋 🤣 😋

Emotion – Judgement – Action

…violent recolution inevitable.

E S B I

Every generation…

LOVE YOUR RAGE
NOT YOUR CAGE

Revolution

The Times – January 3, 2009

REVOLUTION

Bitcoin Genesis Block – 03 January 2009

Introduction to Bitcoin

Introduction to Decentralized Finance

Introduction to Digital Currencies










All Metals We Mined

Map to Multiplication
Nikola Tesla

Top VC’s Investing in BlockChain Companies

Athmospheres of the Solar System

Global GDP 2021

Map of CyberSecurity Domains

21 Questions

Six Innovation Models

What May Happen in the next 100 Years

Abstract – “…to pull the body out
of dimension so that the person
can walk through solid objects
such as wooden doors.”
Okay 🤯 😳 🤯 ?¿?

China’s Social Credit System

Blockchain Platforms Comparison (BCP)


ARISE



With 💚

Totalitarian Governments..

Totalitarianism is a form of government and political system that prohibits all opposition parties, outlaws individual opposition to the state and its claims, and exercises an extremely high degree of control and regulation over public and private life.

It is regarded as the most extreme and complete form of authoritarianism.

In totalitarian states, political power is often held by autocrats, such as  dictators  and absolute monarchs, who employ all-encompassing campaigns in which propaganda is broadcast by state-controlled mass media in order to control the citizenry.

It remains a useful word but the old 1950s theory was considered to be outdated by the 1980s,and is defunct among scholars.

The proposed concept gained prominent influence in Western anti-communist and McCarthyist political discourse during the Cold War era as a tool to convert pre-World War IIanti-fascism into post-war anti-communism.


Leaders who have been described as totalitarian rulers, from left to right and top to bottom in picture, include Joseph Stalin, former General Secretary of the Communist Party of the Soviet UnionAdolf Hitler, former Führer of Nazi GermanyAugusto Pinochet, former President of ChileMao Zedong, former Chairman of the Communist Party of ChinaBenito Mussolini, former Duce of Fascist Italy; and Kim Il-sung, the Eternal President of the Republic of North Korea

As a political ideology in itself, totalitarianism is a distinctly modernist  phenomenon, and it has very complex historical roots. Philosopher Karl Popper traced its roots to PlatoGeorg Wilhelm Friedrich Hegel‘s conception of the state, and the political philosophy of Karl Marx, although Popper’s conception of totalitarianism has been criticized in academia, and remains highly controversial.

Other philosophers and historians such as Theodor W. Adorno and Max Horkheimer trace the origin of totalitarian doctrines to the Age of Enlightenment, especially to the anthropocentrist idea that:

“Man has become the master of the world, a master unbound by any links to nature, society, and history.”

In the 20th century, the idea of absolute state power was first developed by Italian Fascists, and concurrently in Germany by a jurist and Nazi academic named Carl Schmitt during the Weimar Republic in the 1920s.

Benito Mussolini, the founder of Italian Fascism, defined fascism as such: “Everything within the state, nothing outside the state, nothing against the state.”

Schmitt used the term Totalstaat (lit. ’Total state’) in his influential 1927 work titled The Concept of the Political, which described the legal basis of an all-powerful state.

Totalitarian regimes are different from other authoritarian regimes, as the latter denotes a state in which the single power holder, usually an individual dictator, a committee, a military junta, or an otherwise small group of political elites, monopolizes political power.

A totalitarian regime may attempt to control virtually all aspects of social life, including the economy, the education system, arts, science, and the private lives and morals of citizens through the use of an elaborate ideology. It can also mobilize the whole population in pursuit of its goals.

Definition

Totalitarian regimes are often characterized by extreme political repression, to a greater extent than those of authoritarian regimes, under an undemocratic government, widespread personality cultism around the person or the group which is in power, absolute control over the economy, large-scale censorship and mass surveillance systems, limited or non-existent freedom of movement (the freedom to leave the country), and the widespread usage of state terrorism.

Other aspects of a totalitarian regime include the extensive use of internment camps, an omnipresent secret police, practices of religious persecution or racism, the imposition of theocratic rule or state atheism, the common use of death penalties and show trials, fraudulent elections (if they took place), the possible possession of weapons of mass destruction, a potential for state-sponsored mass murders and genocides, and the possibility of engaging in a war, or colonialism against other countries, which is often followed by annexation of their territories.

Historian Robert Conquest describes a totalitarian state as a state which recognizes no limit on its authority in any sphere of public or private life and extends that authority to whatever length it considers feasible.

Totalitarianism is contrasted with authoritarianism. According to Radu Cinpoes, an authoritarian state is “only concerned with political power, and as long as it is not contested it gives society a certain degree of liberty.”

Cinpoes writes that authoritarianism “does not attempt to change the world and human nature.”

In contrast, Richard Pipes stated that the officially proclaimed ideology “penetrating into the deepest reaches of societal structure, and the totalitarian government seeks to completely control the thoughts and actions of its citizens.”

Carl Joachim Friedrich wrote that “[a] totalist ideology, a party reinforced by a secret police, and monopolistic control of industrial mass society are the three features of totalitarian regimes that distinguish them from other autocracies.”



Visualization of the AES round function

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael (Dutch pronunciation: [ˈrɛindaːl]), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

AES is a variant of the Rijndael block cipher developed by two  Belgian  cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposalto NIST during the AES selection process.

Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.

AES has been adopted by the U.S. government. It supersedes the Data Encryption Standard (DES), which was published in 1977.

The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.

In the United States, AES was announced by the NIST as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001.

This announcement followed a five-year standardization process in which fifteen competing designs were presented and evaluated, before the Rijndael cipher was selected as the most suitable.

AES is included in the ISO/IEC 18033-3  standard. AES became effective as a U.S. federal government standard on May 26, 2002, after approval by the U.S. Secretary of Commerce.

AES is available in many different encryption packages, and is the first (and only) publicly accessible cipher approved by the U.S. National Security Agency (NSA) for top secret information when used in an NSA approved cryptographic module.



Andreas M. Antonopoulos (born 1972 in London) is a British-Greek Bitcoin advocate, tech entrepreneur, and author.

He is a host on the Speaking of Bitcoin podcast (formerly called Let’s Talk Bitcoin!) and a teaching fellow for the M.Sc. Digital Currencies at the University of Nicosia.

Antonopoulos was born in 1972 in London, UK, and moved to Athens, Greece during the Greek Junta.

He spent his childhood there, and at the age of 17 returned to the UK.

Antonopoulos obtained his degrees in Computer science and Data Communications, Networks and Distributed Systems from University College London.

Books


All Credit goes to Andreas M. Antonopoulos


Shared with 💚 & Admiration by Free Spirit

✌ & 💚


BitHouse with 💚