Satoshi Nakamoto Quotes


CODE IS LAW

โ€œ It might make sense just to get some in case it catches on.

If enough people think the same way, that becomes a self fulfilling prophecy.

Once it gets bootstrapped, there are so many appliยญcaยญtions if you could effortยญlessly pay a few cents to a website as easily as dropping coins in a vending machine. โ€

Get some in case it catches on

โ€œ In this sense, itโ€™s more typical of a precious metal.

Instead of the supply changing to keep the value the same, the supply is predeยญterยญmined and the value changes.

As the number of users grows, the value per coin increases.

It has the potenยญtial for a positive feedback loop; as users increase, the value goes up, which could attract more users to take advanยญtage of the increasing value. โ€

Potential for a positive feedback loop

โ€œ Maybe it could get an initial value circuยญlarly as youโ€™ve suggested, by people foreseeing its potenยญtial usefulยญness for exchange. (I would definitely want some)

Maybe collecยญtors, any random reason could spark it.

I think the tradiยญtional qualiยญfiยญcaยญtions for money were written with the assumpยญtion that there are so many competing objects in the world that are scarce, an object with the automatic bootstrap of intrinsic value will surely win out over those without intrinsic value.

But if there were nothing in the world with intrinsic value that could be used as money, only scarce but no intrinsic value, I think people would still take up something. (Iโ€™m using the word scarce here to only mean limited potenยญtial supply) โ€

โ€œ A rational market price for something that is expected to increase in value will already reflect the present value of the expected future increases. “

Rational market price

In your head, you do a probaยญbility estimate balancing the odds that it keeps increasing. โ€

Probability

โ€œ Iโ€™m sure that in 20ย years there will either be very large transยญacยญtion volume or noย volume. โ€

In 20 Years

โ€œ Bitcoins have no dividend or potenยญtial future dividend, thereยญfore not like a stock.

More like a collectible or commodity.โ€œ

Collectible vs Commodity

” [Lengthy exposition of vulnerability of a systm to use-of-force monopolies ellided.]

You will not find a solution to political problems in cryptography.

Yes, but we can win a major battle in the arms race and gain a new territory of freedom for several years.

Governments are good at cutting off the heads of a centrally controlled networks like Napster, but pure P2P networks like Gnutella and Tor seem to be holding their own. “

Pure P2P networks

” It’s very attractive to the libertarian viewpoint if we can explain it properly.

I’m better with code than with words though. “

Libertarian Viewpoint

” The proof-of-work is a Hashcash style SHA-256 collision finding.

It’s a memoryless process where you do millions of hashes a second, with a small chance of finding one each time.

The 3 or 4 fastest nodes’ dominance would only be proportional to their share of the total CPU power.

Anyone’s chance of finding a solution at any time is proportional to their CPU power.

There will be transaction fees, so nodes will have an incentive to receive and include all the transactions they can.

Nodes will eventually be compensated by transaction fees alone when the total coins created hits the pre-determined ceiling. “

Transactions Fees

” Right, it’s ECC digital signatures.

A new key pair is used for every transaction.

It’s not pseudonymous in the sense of nyms identifying people, but it is at least a little pseudonymous in that the next action on a coin can be identified as being from the owner of that coin.”

Pseudonymous

Bitcoin is a new electronic cash system that uses a peer-to-peer network to prevent double-spending.

It’s completely decentralized
with no server or central authority

New electronic cash system

Total circulation will be 21,000,000 coins.

It’ll be distributed to network nodes when they make blocks, with the amount cut in half every 4 years

first 4 years: 10,500,000 coins

next 4 years: 5,250,000 coins

next 4 years: 2,625,000 coins

next 4 years: 1,312,500 coins
etc…

When that runs out, the system can support transaction fees if needed.

It’s based on open market competition, and there will probably always be nodes willing to process transactions for free.

Open Market Competition

” I would be surprised if 10 years from now we’re not using electronic currency in some way, now that we know a way to do it that won’t inevitably get dumbed down when the trusted third party gets cold feet.

It could get started in a narrow niche like reward points, donation tokens, currency for a game or micropayments for adult sites.

Initially it can be used in proof-of-work applications for services that could almost be free but not quite.

POW applications

It can already be used for pay-to-send e-mail.

The send dialog is resizeable and you can enter as long of a message as you like.

It’s sent directly when it connects.

The recipient doubleclicks on the transaction to see the full message.

If someone famous is getting more e-mail than they can read, but would still like to have a way for fans to contact them, they could set up Bitcoin and give out the IP address on their website. “

Pay-to-Send Email

“Send X bitcoins to my priority hotline at this IP and I’ll read the message personally.”

Send bitcoin

You can securely control neither your land nor your digitally centralized financial assets without the help of government. Thus the locality & importance of legal ownership in these things. You can securely control your globally seamless Bitcoin without the help of government.

Nick Szabo


From the People For the People !!!                Be your Own Bank !!!                              REVOLUTIONARY IMMUTABLE                                            PUBLIC                                  COLLABORATIVE                                      OPEN                                                  RESISTANT                            DECENTRALIZED

Made with  ๐Ÿ’š  by Free Spirit

โœŒ & ๐Ÿ’š

Did you find this article helpful?

If so, please consider a donation to help the evolution and development of more helpful articles in the future, and show your support for alternative articles.

Your generosity is ๐Ÿ’š ly appreciated

You can donate in any crypto your ๐Ÿ’š desires ๐Ÿ˜Š

Thank you all for your time !!!

โœŒ & ๐Ÿ’š


Bitcoin (BTC) :

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


LiteCoin(LTC) :

LYAdiSpsTJ36EWCJ5HF9EGy9iWGCwoLhed


Ethereum(ETH) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


EthereumClassic(ETC) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


Cardano(ADA) :

addr1q88c5cccnrqy6xesszzvf7rd4tcz87klt0m0h6uvltywqe8txwmsrrqdnpq27594tyn9vz59zv0n8367lvyc2atvrzvqlvdm9d


BinanceCoin(BNB) :

bnb1wwfnkzs34knsrv2g026t458l0mwp5a3tykeylx


BitcoinCash (BCH)

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


Bitcoin SV (BSV)

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


ZCash(ZEC) :

t1fSSQX4gEhove9ngcvFafQaMPq5dtNNsNF


Dash(DASH) :

XcWmbFw1VmxEPxvF9CWdjzKXwPyDTrbMwj


Shiba(SHIB) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


Tron(TRX) :

TCsJJkqt9xk1QZWQ8HqZHnqexR15TEowk8


Stellar(XLM) :

GBL4UKPHP2SXZ6Y3PRF3VRI5TLBL6XFUABZCZC7S7KWNSBKCIBGQ2Y54


Anarchy Legacy

A Crypto Anarchistโ€™s Legacy

Airfoil Dec 20, 2018

Timothy May on the cover of the second issue of Wired magazine with 2 fellow cypherpunks

Sadly, this past week we lost an icon that helped to spur the cypherpunk movement. Timothy May, who wrote The Crypto Anarchist Manifesto in 1988, lauched a movement that is still very prominent today.

For the uninitiated, a Crypto-Anarchist focuses on subverting the current laws and using new technologies to the benefit of the common man.

In the original manifesto, May says crypto-anarchy focuses on โ€œencryption, digital money, anonymous networks, digital pseudonyms, zero-knowledge, reputations, information markets, black markets, collapse of governmentsโ€.

The manifesto was written just before the first crypto wars began during the early 1990โ€™s.

The governments of the world fiercely opposed the general public using cryptographic encryption protocols.

The idea that a normal citizen could completely hide what they say in an electronic message was their biggest concern.

The governments cited national security as a concern (Weโ€™ve heard this excuse used many times before).

Tim May was embroiled in the center of this alongside his group of fellow cypherpunks.

RSA Security, a leading computer securty company founded by world-renowned cryptologists, created this poster against a hardware chip that used a US-government supplied encryption standard

The legislation of the anti-encryption laws would also affect payment processing technology. There was a large push back from tech companies that would have to deal with these issues first-hand.

The crypto wars of the 1990โ€™s ended with the concession from the government that encryption was readily available around the world.

The public had won their first bout against the government surveillance state. Alongside the public, you had the cypherpunks and large tech companies that were all fighting a common threat.

There was not much of an issue in terms of encryption for quite a few more years.

Every few years afterward, the idea of backdoors into encryption schemes were brought up but nothing ever came about these new ideations.

The Crypto Wars Redux

The expansion of computational power and development of more efficient processing equipment closed the gap as to who can gain access to encryption software.

The widespread availabilty of software/hardware that can perform these cryptographic calculations involved in encryption and the ease of use has made it possible for the layman to encrypt their own personal messages, video calls,emails, and notes.

Encrypting an email with someone who has never imported a key to their keyring, or generated their own PGP public/private key pair is a thing of the past.

Many of the services that exist today offer these solutions out of the box. The process has become much easier for all parties involved.

Anyone that is now using this technology benefits from this on a privacy and security level.

With all parties benefitting, the leviathan rears its head once more. Australia has passed an anti-encryption bill that will force large tech companies to allow the Australian government to obtain hardware access(citing national security as a major reason).

Outrage has spilled out of the larger tech companies. The end-to-end zero knowledge messaging/calling app, Signal, has taken a stand against this bill.

This sounds very similar to the issues Tim May was battling with during the early days of the First Crypto War.

The cypherpunks came out on top and Iโ€™m sure this legislation will face a similar fate.

Mayโ€™s Impact on the World

The imprint that Timothy May left on the world is profound. The mass adoption of encryption as well as cryptocurrencies shows just how far ahead of the times he was.

May urged the importance of privacy.

He insisted on the use of encryption to keep your communications private.

Currently on a majority of mobile phones there are applications that provide encrypted communications. Whatsapp uses the Signal protocol which was developed by cypherpunk Moxie Marlinspike.

The rise of cryptocurrencies is an ideal that May was very hopeful for.

May did come out against the anti-privacy issues of bitcoin.

There are projects that offer solutions for this privacy debate.

Much of the developer-base of these certain cryptocurrencies have their foundation based in the cypherpunk tradition.

The Cryptocurrencies that aim for a privacy by default mechanism are monero and the soon to launch GRIN which uses the Mimblewimble Protocol (To see an extremely entertaining introduction to the GRIN project via talk-to-text chat for privacy preservation, listen to the creator of Grin).

Zcash is moving in the direction of private by default and the superior cryptography of the ZK range proofs will help to create a very private cryptocurrency.

Cody WIlson and Amir Taaki who worked on projects focused on the crypto-anarchic tradition including Dark Wallet and Defense Distributed

The impact Tim May made on the world by helping to create a social movement shows the importance and strength of his ideals.

He has impacted a generation of people that are growing up in the digital age.

He influenced builders in the 21st century.

You have people creating new currencies, exposing government surveillance on a national scale, circumventing the broken bueracratic system by creating their own markets, anonymous internet protocols, as well as making encryption applicable to the common man (You can find a list of prominent cypherpunks here and also here).

There isnโ€™t enough that can be said about the applications in which he believed could positively affect us.

May was cognizant of the encroaching all-seeing eye of the state but I believe we are in much better shape now than weโ€™ve ever been.

There may be negative news about what we currently face as individuals, from the unprecedented surveillance of the Snowden leaks to the aforementioned Australian anti-encryption bill, but looking at the grand scheme of our daily lives, these tools and their functions have helped to create a much better day than May could have imagined in 1988.

He was a proponent for the industriousness of human nature to outpace the slow moving regulation that would try to bog down any progress.

You can listen here to what he thought people/creators should do when they develop ground breaking technology.

Arise, you have nothing to lose but your barbed wire fences!

Timothy C. May – “The Crypto Anarchist Manifesto”

Shared with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š

BitHouse RedBubble Shop

Visit BitHouse-Co’s shop, for cool artwork on awesome products!

https://www.redbubble.com/people/BitHouse-Co/shop?asc=u

Made with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š

Arise…

Timothy C. May

Arise, you have nothing to lose but your barbed wired fences!

Timothy C. May

Wonder In Peace bright mind!

Thanks for the guidance and wisdom!

The world will never know how much they owe you!

โœŒ & ๐Ÿ’š


Shared with ๐Ÿ’š by Free Spirit
โœŒ & ๐Ÿ’š



B-Money

Web Dai – B-Money

I am fascinated by Tim May's crypto-anarchy. 

Unlike the communities
traditionally associated with the word "anarchy", in a crypto-anarchy the
government is not temporarily destroyed but permanently forbidden and
permanently unnecessary.

It's a community where the threat of violence is
impotent because violence is impossible, and violence is impossible because its participants cannot be linked to their true names or physical locations.
ย 
Until now it's not clear, even theoretically, how such a community could operate.

A community is defined by the cooperation of its participants, and efficient cooperation requires a medium of exchange (money) and a way to enforce contracts.

Traditionally these services have been provided by the government or government sponsored institutions and only to legal entities.

In this article I describe a protocol by which these services can be provided to and by untraceable entities.
ย 
I will actually describe two protocols. The first one is impractical,because it makes heavy use of a synchronous and unjammable anonymous
broadcast channel. However it will motivate the second, more practical protocol.

In both cases I will assume the existence of an untraceable network, where senders and receivers are identified only by digital
pseudonyms (i.e. public keys) and every messages is signed by its sender
and encrypted to its receiver.
ย 
In the first protocol, every participant maintains a (seperate) database of how much money belongs to each pseudonym. These accounts collectively define the ownership of money, and how these accounts are updated is the subject of this protocol.
ย 
1. The creation of money. Anyone can create money by broadcasting the
solution to a previously unsolved computational problem. The only
conditions are that it must be easy to determine how much computing effort
it took to solve the problem and the solution must otherwise have no
value, either practical or intellectual. The number of monetary units
created is equal to the cost of the computing effort in terms of a
standard basket of commodities. For example if a problem takes 100 hours
to solve on the computer that solves it most economically, and it takes 3
standard baskets to purchase 100 hours of computing time on that computer
on the open market, then upon the broadcast of the solution to that
problem everyone credits the broadcaster's account by 3 units.
ย 
2. The transfer of money. If Alice (owner of pseudonym K_A) wishes to
transfer X units of money to Bob (owner of pseudonym K_B), she broadcasts
the message "I give X units of money to K_B" signed by K_A.
ย 
Upon the broadcast of this message, everyone debits K_A's account by X units and
credits K_B's account by X units, unless this would create a negative
balance in K_A's account in which case the message is ignored.
ย 
3. The effecting of contracts. A valid contract must include a maximum
reparation in case of default for each participant party to it. It should
also include a party who will perform arbitration should there be a
dispute. All parties to a contract including the arbitrator must broadcast
their signatures of it before it becomes effective. Upon the broadcast of
the contract and all signatures, every participant debits the account of
each party by the amount of his maximum reparation and credits a special
account identified by a secure hash of the contract by the sum the maximum
reparations. The contract becomes effective if the debits succeed for
every party without producing a negative balance, otherwise the contract
is ignored and the accounts are rolled back. A sample contract might look
like this:
ย 
K_A agrees to send K_B the solution to problem P before 0:0:0 1/1/2000.
K_B agrees to pay K_A 100 MU (monetary units) before 0:0:0 1/1/2000. K_C
agrees to perform arbitration in case of dispute. K_A agrees to pay a
maximum of 1000 MU in case of default. K_B agrees to pay a maximum of 200
MU in case of default. K_C agrees to pay a maximum of 500 MU in case of
default.
ย 
4. The conclusion of contracts. If a contract concludes without dispute,
each party broadcasts a signed message "The contract with SHA-1 hash H
concludes without reparations." or possibly "The contract with SHA-1 hash
H concludes with the following reparations: ..." Upon the broadcast of all
signatures, every participant credits the account of each party by the
amount of his maximum reparation, removes the contract account, then
credits or debits the account of each party according to the reparation
schedule if there is one.
ย 
5. The enforcement of contracts. If the parties to a contract cannot agree
on an appropriate conclusion even with the help of the arbitrator, each
party broadcasts a suggested reparation/fine schedule and any arguments or
evidence in his favor. Each participant makes a determination as to the
actual reparations and/or fines, and modifies his accounts accordingly.
ย 
In the second protocol, the accounts of who has how much money are kept by
a subset of the participants (called servers from now on) instead of
everyone. These servers are linked by a Usenet-style broadcast channel.

The format of transaction messages broadcasted on this channel remain the
same as in the first protocol, but the affected participants of each
transaction should verify that the message has been received and
successfully processed by a randomly selected subset of the servers.
ย 
Since the servers must be trusted to a degree, some mechanism is needed to
keep them honest. Each server is required to deposit a certain amount of
money in a special account to be used as potential fines or rewards for
proof of misconduct. Also, each server must periodically publish and
commit to its current money creation and money ownership databases. Each
participant should verify that his own account balances are correct and
that the sum of the account balances is not greater than the total amount
of money created. This prevents the servers, even in total collusion, from
permanently and costlessly expanding the money supply. New servers can
also use the published databases to synchronize with existing servers.
ย 
The protocol proposed in this article allows untraceable pseudonymous
entities to cooperate with each other more efficiently, by providing them
with a medium of exchange and a method of enforcing contracts. The
protocol can probably be made more efficient and secure, but I hope this
is a step toward making crypto-anarchy a practical as well as theoretical
possibility.
ย 
-------
ย 
Appendix A: alternative b-money creation
ย 
One of the more problematic parts in the b-money protocol is money
creation. This part of the protocol requires that all of the account
keepers decide and agree on the cost of particular computations.
Unfortunately because computing technology tends to advance rapidly and
not always publicly, this information may be unavailable, inaccurate, or
outdated, all of which would cause serious problems for the protocol.
ย 
So I propose an alternative money creation subprotocol, in which account
keepers (everyone in the first protocol, or the servers in the second
protocol) instead decide and agree on the amount of b-money to be created
each period, with the cost of creating that money determined by an
auction. Each money creation period is divided up into four phases, as
follows:
ย 
1. Planning. The account keepers compute and negotiate with each other to
determine an optimal increase in the money supply for the next period.

Whether or not the account keepers can reach a consensus, they each
broadcast their money creation quota and any macroeconomic calculations
done to support the figures.
ย 
2. Bidding. Anyone who wants to create b-money broadcasts a bid in the
form of <x, y> where x is the amount of b-money he wants to create, and y
is an unsolved problem from a predetermined problem class. Each problem in
this class should have a nominal cost (in MIPS-years say) which is
publicly agreed on.
ย 
3. Computation. After seeing the bids, the ones who placed bids in the
bidding phase may now solve the problems in their bids and broadcast the
solutions.
ย 
4. Money creation. Each account keeper accepts the highest bids (among
those who actually broadcasted solutions) in terms of nominal cost per
unit of b-money created and credits the bidders' accounts accordingly

http://www.weidai.com/bmoney.txt

Shared with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š

BitAddress

Open Source JavaScript Client-Side Bitcoin Wallet Generator

A Bitcoin wallet is as simple as a single pairing of a Bitcoin address with its corresponding Bitcoin private key. Such a wallet has been generated for you in your web browser and is displayed above.

To safeguard this wallet you must print or otherwise record the Bitcoin address and private key. It is important to make a backup copy of the private key and store it in a safe location. This site does not have knowledge of your private key. If you are familiar with PGP you can download this all-in-one HTML page and check that you have an authentic version from the author of this site by matching the SHA256 hash of this HTML with the SHA256 hash available in the signed version history document linked on the footer of this site. If you leave/refresh the site or press the “Generate New Address” button then a new private key will be generated and the previously displayed private key will not be retrievable. Your Bitcoin private key should be kept a secret. Whomever you share the private key with has access to spend all the bitcoins associated with that address. If you print your wallet then store it in a zip lock bag to keep it safe from water. Treat a paper wallet like cash.

Add funds to this wallet by instructing others to send bitcoins to your Bitcoin address.

Check your balance by going to blockchain.info or blockexplorer.com and entering your Bitcoin address.

Spend your bitcoinsย by going to blockchain.info and sweep the full balance of your private key into your account at their website. You can also spend your funds by downloading one of the popular bitcoin p2p clients and importing your private key to the p2p client wallet. Keep in mind when you import your single key to a bitcoin p2p client and spend funds your key will be bundled with other private keys in the p2p client wallet. When you perform a transaction your change will be sent to another bitcoin address within the p2p client wallet. You must then backup the p2p client wallet and keep it safe as your remaining bitcoins will be stored there. Satoshi advised that one should never delete a wallet.

Source:

https://www.bitaddress.org/

โœŒ & ๐Ÿ’š

Mining Calculators

How to Calculate Mining Profitability: Top 6 Mining Calculators

Before we can even start mining, we should use one of the many profitability calculators online, that should give us beforehand a better understanding if the GPU, FPGA, ASIC we choose to mine with, will be profitable or not!


๐Ÿ”น๏ธ Online Calculators ๐Ÿ”น๏ธ


๐Ÿ”ธ๏ธ WhatToMine

๐Ÿ”ธ๏ธ Rubin Mining Calculator

๐Ÿ”ธ๏ธ CoinWarz

๐Ÿ”ธ๏ธ CryptoCompare

๐Ÿ”ธ๏ธ Minerstat

๐Ÿ”ธ๏ธ Crypto-Coinz

Before even entering sites to buy hardware, Do GOOD…

Do VERY GOOD your R&D

If you think reading is for dorks,nerds, geeks and boring people … Well…

WELCOME TO THE REALM OF THOSE WHO โค TO READ !!!


Made with ๐Ÿ’š by Free Spirit

โœŒ & ๐Ÿ’š




With ๐Ÿ’š

Bitcoin is independent from “crypto”

Bitcoin vs “Crypto

@bithouseco

ย ย  The quality of Bitcoin’s monetary policy and the public’s confidence that the policy will be respected in the long-run is all what really matters.

For all of you out there, who believe that Bitcoin falls under the “crypto” umbrella, you could not be further from the truth.

“Crypto” is designated for the affinity scams that launched in Bitcoin’s shadow and attempted to leverage its pedigree and latch on to its narrative to sell useless tokens to unwitting noobs.

The scammers believe they can “beat” Bitcoin by providing a feature set and a “culture” more appealing to the masses and make individuals more likely to pick their favorite “crypto” over the best money humans have ever come in contact with.

As most people, these people couldn’t be more delusional.

The success of Bitcoin doesn’t depend on the “culture” of bitcoiners.

Bitcoin is a protocol that has no way of knowing the “culture” of its users.

If it is successful it will be used by many different people from many worldwideย  lands with very different cultures.

A cultural hold on a particular competitive landscape of social media doesn’t really impress no one at the end of the day.

What really matters is the quality of Bitcoin’s monetary policy and the public’s confidence that the policy will be respected in the long-run.

The best way to build confidence in that policy is to make the cost of attempting to change that policy, or falling out of line with the consensus rules of the network as high as possible.

Nothing in “crypto” comes close to Bitcoin in these regards, and that is because the Bitcoin network is slowly but surely integrating itself into the energy sector of the globe.

The execution risks associated with mining Bitcoin have become very high.

If a miner fucks up and falls out of consensus, they are punished materially by missing out on precious block reward payouts.

As the network becomes more integrated with the energy sector, these costs will rise and abiding by the monetary policy put forth by the network of full nodes will be paramount.

It happend in 2017 when the biggest corporate players and miners attempted to hard fork a block space increase that fell out of consensus with the full nodes on the network.

The unwillingness to follow consensus ruined reputations and lost a lot of miners a lot of money over the four years that have followed the hard fork.

This is the certainty for the people, that bitcoin is a suitable monetary good in the digital age.

All of “crypto” pretenters focused on speed, app building, and being less “energy intensive” have completely missed the plot and have relegated themselves to a hedonistic odd sand box filled with degenerate gamblers and low energy thinkers.

Bitcoin has already won because it has won the energy game.

This energy game is what will protect Bitcoin’s monetary policy in the long-run, being strongly incentivized by full nodes to do so.

Very few understand this and very few will ever understand that !!!