Just as the crypto industry is expanding and getting local adoption from individuals, co-operations, organisations and few countries the same rate at which we have crypto enthusiast increasing in number which i see so worrisome and also a call for major concern.
Reason been that as more people get involved in the crypto business the more scammers are likely to increase their technique and the more scammers get recruited.
To avoid walking on scammers path, requires to be well informed of every new technique they can ever deploy against their potential victim.
To stay off scammers path users must:
Avoid phishing links.
Make sure to pay attention to the spelling of the website, as well as their URL as this can reveal whether it is a phishing site or not.
Never invest in a project without a well structured community
Pay close attention to the engagement within the community for suspicious activities
Ensure you assets are off CEX
Be more smart and less greedy
Don’t jump into a project/coin only based on the hype from advertisers (especially twitter)
Avoid any “too good to be true” investment
Avoid send me 1$ and I’ll send back 2$ scams, no matter how reputable is the account calling for that
Protect your coins (keep your coins on your wallet, use hardware wallet where possible, never give out wallet’s seed, keep backup seed offline)
Don’t be greedy and/or illiterate.
Be sure to feed yourself with necessary knowledge, if you want to invest.
Knowledge from experience is good but you can also take legitimate one from other people.
Not everything that is being offered to you is true. Do not be deceived.
Be careful who you are trusting.
Always be skeptical !!!
Enable Two-factor authentication for all your accounts.
Using of firewalls.
Installing an up to date anti virus software.
Use strong passwords and yet easily accessible ones for your convenience.
Stay away from malicious links or attachments you come across on the web.
Make sure your private keys are well stored and in hard wallet
Make sure your passwords are not vulnerable online to attacks i.e don’t store passwords online or any website
Whenever a stranger message you first for a business or an investment, it is a Red flag.
Someone who doesn’t know you would want you to make big money, another Red flag.
Whenever they introduce a” business opportunity” to you and then hasten you in order make you take a hasty decision it’s not genuine, they are trying their best to make you take a fast decision without telling your loved ones and friends who will discourage you.
It is safer to assume anyone you don’t know, communicating with you is a scammer until it is proven otherwise.
Read the whitepaper and research well of the company where you are going to invest because many scams are done by this method.
Check whether it is genuine or fake.
Scammers are constantly upgrading their scam methods and anyone can be the next target.
Loss doesn’t just happen due to an internal or intentional mistake, and when it does happen everyone has a similar sense of remorse and risks that are absolute consequences.
You’ll be fooled many times by those scammers that have maintained a well structured fake community.
They can hire those PRs and people talking inside their community to make it look like they’re a legit community.
As for their workers, they’ll just tell that they need engagement but the purpose of it, they’re not talking about it because that’s what the main purpose it.
And that’s to make it look genuine that they have real people inside the community. But in reality, it’s all fake people that they’ve hired just to make discussions all over their place.
It’s safe to say as well that it’s not just the crypto industry that is not safe for newbies, everything that talks about money is not safe for everyone.
Crypto is the latest thing and in the last 5 years it become so successful that scammers make this as their paradise as there are a lot of naive investors in the market.
Do your investigations, and don’t listen to influencers and believe them.
Think that this is your hard earn money so you need to be careful where you are going to invest it.
Don’t be Greedy.
Don’t jump on it like a hungry cow.
Don’t trust the sweet words they offer you. Most of them are too good to be true but they will always sound inviting to invest with.
Make a wall to not fully support them unless they have proven themselves worthy of that kind of respect.
Always be in doubt. That will be the shield that will protect you from being scammed.
Must simply assume that our coins are never really safe despite our best efforts, so it is important to always be on alert and protect our coins to the best of our ability.
Improve the security of your coins by an important margin by buying a hardware wallet, since they are very secure devices and they are relatively cheap, instead of risking storing our coins in our computers or at an exchange.
Always good to know how to make technical and fundamental analysis so that you can get specific information what is the situation of the projects you want to invest
Many projects are delivering a good testament, but they always ended into a scam , so we need to be smart enough and have a lot of preparation before investing or trading
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.
Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.
Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.
Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.
Losing your keys
Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.
On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.
Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.
Storing coins in online wallets
Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.
There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.
Not keeping a hard copy of your seed phrase
To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.
Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.
Fat-finger error
A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.
One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.
Sending to the wrong address
Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.
This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.
Over diversification
Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.
Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.
Not setting up a stop-loss arrangement
A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.
In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.
That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.
Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.
Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.
Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.
Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.
Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.
Losing your keys
Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.
On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.
Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.
Storing coins in online wallets
Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.
There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.
Not keeping a hard copy of your seed phrase
To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.
Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.
Fat-finger error
A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.
One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.
Sending to the wrong address
Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.
This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.
Over diversification
Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.
Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.
Not setting up a stop-loss arrangement
A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.
In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.
That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.
Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.
Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.
Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.
Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.
Losing your keys
Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.
On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.
Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.
Storing coins in online wallets
Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.
There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.
Not keeping a hard copy of your seed phrase
To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.
Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.
Fat-finger error
A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.
One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.
Sending to the wrong address
Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.
This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.
Over diversification
Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.
Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.
Not setting up a stop-loss arrangement
A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.
In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.
That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.
Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.
Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.
Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.
Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.
Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.
Losing your keys
Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.
On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.
Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.
Storing coins in online wallets
Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.
There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.
Not keeping a hard copy of your seed phrase
To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.
Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.
Fat-finger error
A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.
One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.
Sending to the wrong address
Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.
This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.
Over diversification
Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.
Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.
Not setting up a stop-loss arrangement
A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.
In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.
That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.
Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.
Now, even if someone does not have the drawbacks of decades-long experience and mental models with a specific asset class, it is still very hard to understand Bitcoin.
Why? Because Bitcoin is the intersection of many, many different fields.
To truly understand Bitcoin, there is no other way than being a polymath.
Even if one has made it as far to (a) realize Bitcoin is something completely new and solely using existing heuristics and mental models will not work and (b) with Bitcoin, more than anything else, we do not know what we do not know — understanding still requires a very broad set of competences.
The correct approach to understand when one starts going down the Bitcoin rabbit hole is therefore to assume one knows nothing and any experience and insight one has from previous aspects of life brings very little to the table.
First principles thinking is required. We can, however, try to define a little deeper what Bitcoin is. Below is listed some different ways of wrapping one’s head around Bitcoin.
Not an exhaustive list.
A living organism
Bitcoin is Free and Open Source software. It is not a piece of IP owned by a centralized joint-stock company that needs to optimize for the bottom line of the next quarter and is incapable of cannibalizing itself. Since the Bitcoin whitepaper was released and the genesis block was mined, we have seen an explosion of experiments, ideas and creative geniuses get involved in Bitcoin and crypto as a whole. To think of Bitcoin as a living, technological organism that adjusts, develops and constantly changes to survive can be useful.
A religion
Money, as many have learned and realized in recent decade, is just a social construction we are all part of. The value therefore comes from the amount of true believers.
Continuing this line of thinking, one could describe the religion as consisting of:
Prophet: Satoshi. No longer present. Impossible to ask questions.
Convictions: Decentralization.
Rituals: Running nodes. Mining. Hodling.
Holy scriptures: Bitcoin whitepaper. As with all holy scriptures, people interpret them in their own way.
Sacred objects: Genesis block, lowercase bitcoin
Sects: Different interpretations resulting in different factions/sects: small blockers, big blockers, etc.
An emerging economy
The consensus protocol can be thought of as the constitution
The society as the constituency (users on the demand-side; miners on the supply-side)
Core developers as the executive department who write the code and execute on the strategy, but amendments to the protocol (i.e., constitution) require approval from the constituency)
The native token is the internal currency
The investors underwrite the currency
Additionally, many one-liners and memes exist to describe Bitcoin. Not an exhaustive list.
Sound money
Digital gold
“An insurance policy against an Orwellian future”
“A tool for freeing humanity from oligarchs and tyrants, dressed up as a get-rich-quick scheme”
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Bitcoin is a monetary good — a new form of money. As Bitcoin is a money, it must be compared to other monies to consider the comparative advantages of Bitcoin and from that consider further the probabilities of Bitcoin winning ground or not in the competition between monies.
Brief summarization of the monetary properties
Summarization of the monetary properties of Bitcoin compared to precious metals and fiat currencies
As the exhibit above showcases, Bitcoin offers many different distinct and compelling competitive advantages to the alternatives.
These include, but are not limited to:
1. Bitcoin is the first asset in the human history to provide any holder a very sure case of unseizability and censorship- and judgment-resistance for their funds.
◦ Unseizability: With precious metals and fiat currencies, the custodianship is mostly in the hands of trusted custodians that is subject to any intervention by a government or authority.
Bitcoin, with self-custody being orders of magnitude easier than with precious metals and fiat currencies, and access to the corresponding private key of funds being the sole way to access and move funds, no one can seize your bitcoins.
◦ Censorship- and judgment resistance: With precious metals and fiat currencies, the payment clearing for small value transactions can with not much hassle be somewhat censorship resistant if the involved parties are willing to transact in the physical units of precious metals and fiat currencies and to self-custody the funds going forward.
However, with non-small value transactions it is exceedingly inconvenient and costly for transactions of precious metals and fiat currencies to happen in the offline, with physical units and self-custody going forward, leaving the centralized intermediaries as the only option and these are subject to any intervention by a government or authority.
Bitcoin, with the payment clearing involving no centralized intermediaries but instead a decentralized and distributed setup requiring no AML/KYC, the result is that of a the payment clearing process being permissionless, allowing anyone with cryptographic access to funds to move them at their will.
2. Bitcoin provides an inherently apolitical global monetary unit. It is truly border-less, with no recognition of any jurisdictional rules and laws, allowing the jurisdiction of a counterpart in any transaction to be of no relevance.
◦ Fiat currencies are highly political and precious metals are less political than fiat currencies, but still much more political than Bitcoin.
◦ Bitcoin is truly border-less: any bitcoin funds can be accessed anywhere on the planet by having access to information that can even be stored inside a human brain and reliably retrieved at small effort — and, crucially, with no intermediary and no permission required the bitcoin funds can be moved to anywhere in the world with final settlement in the next block.
3. Bitcoin provides scarcity and salability through time characteristics vastly superior to any other monetary options, including fiat currencies and precious metals.
◦ The non-discretionary monetary policy of the bitcoin networking allowing for the asymptotic money supply* of 21 million BTC is built into the literal definition of the protocol. This is a drastic contrast to the arbitrary scarcity of fiat currencies governed by politics.
The scarcity of precious metals is much better than fiat currencies, but Bitcoin with the strictly fixed money supply outperforms any precious metal.
Bitcoin provides any holder a reassurance stronger than any other asset in the world that their ownership stake in the total quantity of Bitcoin on the market will never diluted.
One BTC of 21 million will always be one BTC of 21 million.
◦ Bitcoins are infinitely durable, impossible to counterfeit or dilute, can be stored at no cost and at no degradation.
* By inventing Bitcoin, Satoshi Nakamoto created the first example of a digital good (in this case, monetary good) that is impossible to reproduce ad infinitum, thereby creating the first instance of human history of digital scarcity.
Less talked about it, but perhaps more important, Satoshi Nakamoto with Bitcoin also created the first example of a good being absolute scarce.
Previously, any consideration of scarcity of a good was relative. Any physical good is never absolutely scarce, onlyrelatively scarce when compared to other goods — simply because any limit on a physical goods is a function of the time and human effort put towards producing the good.
Bitcoin, with the asymptotic monetary supply built into the protocol, is therefore the first example of absolute scarcity in a liquid commodity and good that cannot have its fixed quantity of supply increased.
People’s MoneyPower to the PeopleThe seed has been planted… Make it Thrive !!!ChooseVeritas non Auctoritas …Choose Wisely
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
The relative value of any two curren- cies—the exchange rate—is determined through their sale and purchase on the global foreign exchange market. If government policy interferes with this market by changing the relative supply or demand of currencies, the exchange rate is managed.
The trilemma of international finance, is a restriction on government policy that follows immediately from the interaction of exchange rates, monetary policy and international capital flows.
Trilemma of International Finance
The trilemma states that any country can have only two of the following:
(1) Unrestricted international capital markets.
(2) A managed exchange rate.
(3) An independent monetary policy.
If the government wants a managed exchange rate but does not want to interfere with international capital flows, it must use monetary policy to accommodate changes in the demand for its currency in order to stabilize the exchange rate.
In the extreme, this would take the form of a currency board arrangement, where the domestic currency is fully backed by a foreign currency (as in the case of Hong Kong).
In such a situation, monetary policy can no longer be used for domestic purposes (it is no longer independent).
If a country wishes to maintain control over monetary policy to reduce domestic unemployment or inflation, for example, it must limit trades of its currency in the international capital market (it no longer has free international capital markets).
A country that chooses to have both unrestricted inter-national capital flows and an independent monetary policy can no longer influence its exchange rate and, therefore, cannot have a managed exchange rate.
Pieters and Vivanco (2016), government attempts to regulate the globally accessible bitcoin markets are generally unsuccessful, and, as shown in Pieters (2016), bitcoin exchange rates tend to reflect the market, not official exchange rates.
Should the flows allowed by bitcoin become big enough, all countries will have, by default, unrestricted international capital markets.
Thus, with bitcoin, (1)unrestricted international capital markets is chosen by default.
Therefore, the only remaining policy choice is between (2)managed exchange rates or (3)independent monetary policy.
If the country chooses (1) and (2), it must use reactive monetary policy to achieve the managed exchange rate.
If the country chooses (1) and (3), it must have a floating exchange rate because it has no remaining tools with which to maintain a managed exchange rate.
Ali et al. (2014), the European Central Bank (2015) and the Bank for International Settlements (2015) all concur that cryptocur- rencies may eventually undermine monetary policy.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Gold is a chemical element with the symbol Au (from Latin: aurum) and atomic number 79, making it one of the higher atomic number elements that occur naturally.
It is a bright, slightly orange-yellow, dense, soft, malleable, and ductile metal in a pure form.
Chemically, gold is a transition metal and a group 11 element. It is one of the least reactive chemical elements and is solid under standard conditions.
Gold often occurs in free elemental (native) form, as nuggets or grains, in rocks, veins, and alluvial deposits. It occurs in a solid solution series with the native element silver (as electrum), naturally alloyed with other metals like copper and palladium, and mineral inclusions such as within pyrite.
Less commonly, it occurs in minerals as gold compounds, often with tellurium (gold tellurides).
A relatively rare element, gold is a precious metal that has been used for coinage, jewelry, and other arts throughout recorded history.
Still, gold coins ceased to be minted as a circulating currency in the 1930s, and the world gold standard was abandoned for a fiat currency system after 1971.
As of 2017, the world’s largest gold producer by far was China, with 440 tonnes per year.
A total of around 201,296 tonnes of gold exists above ground, as of 2020. This is equal to a cube with each side measuring roughly 21.7 meters (71 ft).
Gold’s high malleability, ductility, resistance to corrosion and most other chemical reactions, and conductivity of electricity have led to its continued use in corrosion-resistant electrical connectors in all types of computerized devices (its chief industrial use).
The world consumption of new gold produced is about 50% in jewelry, 40% in investments and 10% in industry.
Gold is also used in infrared shielding, colored-glass production, gold leafing, and tooth restoration. Certain gold salts are still used as anti-inflammatories in medicine.
F I A T
Fiat money (from Latin: fiat, “let it be done”) is a type of money that is not backed by any commodity such as gold or silver, and typically declared by a decree from the government to be legal tender.
Throughout history, fiat money was sometimes issued by local banks and other institutions. In modern times, fiat money is generally established by government regulation.
Yuan dynasty banknotes are a medieval form of fiat money
Fiat money does not have intrinsic value and does not have use value. It has value only because the people who use it as a medium of exchange agree on its value. They trust that it will be accepted by merchants and other people.
Fiat money is an alternative to commodity money, which is a currency that has intrinsic value because it contains a precious metal such as gold or silver which is embedded in the coin.
Fiat also differs from representative money, which is money that has intrinsic value because it is backed by and can be converted into a precious metal or another commodity.
Fiat money can look similar to representative money (such as paper bills), but the former has no backing, while the latter represents a claim on a commodity (which can be redeemed to a greater or lesser extent).
Government-issued fiat money banknotes were used first during the 11th century in China.
Fiat money started to predominate during the 20th century.
Money declared by a person, institution or government to be legal tender, meaning that it must be accepted in payment of a debt in specific circumstances.
State-issued money which is neither convertible through a central bank to anything else nor fixed in value in terms of any objective standard.
Money used because of government decree.
An otherwise non-valuable object that serves as a medium of exchange (also known as fiduciary money.)
The term fiat derives from the Latin word fiat, meaning “let it be done” used in the sense of an order, decree or resolution.
Bitcoin – Digital Gold
The most common, and best, ways to think about bitcoin is as “digital gold”.
Like gold, bitcoin doesn’t rely on a central issuer, can’t have its supply manipulated by any authority, and has fundamental properties long considered important for a monetary good and store of value.
Unlike gold, bitcoin is extremely easy and cheap to “transport”, and trivial to verify its authenticity.
Bitcoin is also “programmable”. This means custody of bitcoin can be extremely flexible. It can be split amongst a set of people (“key holders”), backed up and encrypted, or even frozen-in-place until a certain date in the future. This is all done without a central authority managing the process.
You can walk across a national border with bitcoin “stored” in your head by memorizing a key.
The similarities to gold, plus the unique features possible because bitcoin is purely digital, give it the “digital gold” moniker.
Sharing fundamental properties with gold means it shares use-cases with gold, such as hedging inflation and political uncertainty.
But being digital, bitcoin adds capabilities that are especially relevant in our modern electronic times.
The world does indeed need a digital version of gold.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Why this crazyness with rabbits ?!? And their holes, you would ask ?!? Why is the rabbit hole so deep ?¿
And what does the rabbit hole has to do with that BitCorn thing I keep hearing about all over the place ?¿
I like to start from the begining, as I think so I am 😋😂
Rabbit Hole is a play written by David Lindsay-Abaire. It was the recipient of the 2007 Pulitzer Prize for Drama. The play premiered on Broadway in 2006, and it has also been produced by regional theatres in cities such as Los Angeles, Philadelphia and Pittsburgh. The play had its Spanish language premiere in San Juan, Puerto Rico in Autumn of 2010.
The play deals with the ways family members survive a major loss, and includes comedy as well as tragedy. Cynthia Nixon won the 2006 Tony Award for Best Performance by a Leading Actress in a Play for her performance as Becca in the New York production, and the play was nominated for several other Tony awards.
Rabbit Hole
A situation, journey, or process that is particularly strange, problematic, difficult, complex, or chaotic, especially one that becomes increasingly so as it develops or unfolds.
An allusion to “Alice’s Adventures in Wonderland” by Lewis Carroll, it is used especially in the phrase “(go) down the rabbit hole.”
Overhauling the current tax legislation is a rabbit hole I don’t think this administration should go down at this point.I’ve stayed away from drugs and alcohol since coming to college. I have an addictive personality, so I decided to just avoid that rabbit hole altogether.
What does rabbit hole mean?
Used especially in the phrase going down the rabbit hole or fallingdown the rabbit hole, a rabbit hole is a metaphor for something that transports someone into a wonderfully (or troublingly) surreal state or situation.
On the internet, a rabbit holefrequently refers to an extremely engrossing and time-consuming topic.
Where does rabbit hole come from?
Alice’s Adventures in WonderLand
Literally, a rabbit hole is what the animal digs for its home. The earliest written record of the phrase dates back to the 17th century. But the figurative rabbit hole begins with Lewis Carroll’s 1865 classic, Alice’s Adventures in Wonderland.
In its opening chapter, “Down the Rabbit-Hole,” Alice follows the White Rabbit into his burrow, which transports her to the strange, surreal, and nonsensical world of Wonderland.
Since then, Carroll’s rabbit hole has proved a popular and useful reference. The Oxford English Dictionary finds the first allusive rabbit hole in a 1938 edition of TheYale Law Journal: “It is the Rabbit-Hole down which we fell into the Law, and to him who has gone down it, no queer performance is strange.”
Over much of the 20th century, rabbit hole has been used to characterize bizarre and irrational experiences. It’s especially used to reference magical, challenging, and even dangerous places or positions, similar to Carroll’s topsy-turvy Wonderland.
Rabbit holehas many metaphorical applications—from frustrating red tape to the mind-bending complexity of science to hallucinations during altered states—all united by a common sense of passing into some labyrinthine, logic-defying realm that, once entered, is hard to get out of.
One can fall down the rabbit hole of government bureaucracy, healthcare, obtaining a green card, tax law, the political economy of modern Japan, puberty, college admissions, or quantum mechanics.
If you’re Neo in the hit film The Matrix, you can take the red pill—a pill that shows you the truth, as opposed to the blue pill, which keeps you in ignorance—and “see how deep the rabbit hole goes.”
In a related note, some people literally take pills and go down the rabbit hole of a psychedelic drug trip.
But as Kathryn Schulz observed for The New Yorker in 2015, rabbit hole has further evolved in the information age: “These days…when we say that we fell down the rabbit hole, we seldom mean that we wound up somewhere psychedelically strange. We mean that we got interested in something to the point of distraction—usually by accident, and usually to a degree that the subject in question might not seem to merit.”
Thanks to the abundance, variety, and instant access of content online, many fall down internet rabbit holes which are often spectacularly, and addictively, niche: scary stories, obscure conspiracy theories, or famous last meals, for instance.
Other rabbit holes tend to be opened up by specific services or social media, which serve users item after item, link after link: Wikipedia, Netflix, Amazon, Facebook, YouTube, and so forth.
These rabbit holes have become so common that people sometimes swap out rabbit for the name of the particular site, e.g. “I’ve fallen down an Instragram hole” or “I’m falling down a wikihole.”
Who uses rabbit hole?
From formal documents to internet status updates, rabbit hole is a very popular and widespread expression. Unlike earlier iterations of the metaphor, internet rabbit holes convey less a sense of weirdness, disorientation, or difficulty than they do of an intensely captivating diversion.
Rabbit hole is also showing increasing use as a modifier, e.g. a rabbit-hole question or phenomenon.
Now… that we have a basic and broader understanding about this Hole and it’s rabbit that digged it 😋😂
Let me show you a journey that I took to get to know, understand, admire, be amazed and support the BitCorn everybody is so crazy about …
Bitcoin Glossary
Block
Blocks are found in the Bitcoin blockchain. Blocks connect all transactions together. Transactions are combined into single blocks and are verified every ten minutes through mining. Each subsequent block strengthens the verification of the previous blocks, making it impossible to double spend bitcoin transactions (see double spend below).
BIP
Bitcoin Improvement Proposal or BIP, is a technical design document providing information to the bitcoin community, or describing a new feature for bitcoin or its processes or environment which affect the Bitcoin protocol. New features, suggestions, and design changes to the protocol should be submitted as a BIP. The BIP author is responsible for building consensus within the community and documenting dissenting opinions.
Blockchain
The Bitcoin blockchain is a public record of all Bitcoin transactions. You might also hear the term used as a “public ledger.” The blockchain shows every single record of bitcoin transactions in order, dating back to the very first one. The entire blockchain can be downloaded and openly reviewed by anyone, or you can use a block explorer to review the blockchain online.
Block Height
The block height is just the number of blocks connected together in the block chain. Height 0 for example refers to the very first block, called the “genesis block.”
Block Reward
When a block is successfully mined on the bitcoin network, there is a block reward that helps incentivize miners to secure the network. The block reward is part of a “coinbase” transaction which may also include transaction fees. The block rewards halves roughly every four years; see also “halving.”
Change
Let’s say you are spending $1.90 in your local supermarket, and you give the cashier $2.00. You will get back .10 cents in change. The same logic applies to bitcoin transactions. Bitcoin transactions are made up of inputs and outputs. When you send bitcoins, you can only send them in a whole “output.” The change is then sent back to the sender.
Cold Storage
The term cold storage is a general term for different ways of securing your bitcoins offline (disconnected from the internet). This would be the opposite of a hot wallet or hosted wallet, which is connected to the web for day-to-day transactions. The purpose of using cold storage is to minimize the chances of your bitcoins being stolen from a malicious hacker and is commonly used for larger sums of bitcoins.
Confirmation
A confirmation means that the bitcoin transaction has been verified by the network, through the process known as mining. Once a transaction is confirmed, it cannot be reversed or double spent. Transactions are included in blocks.
Cryptography
Cryptography is used in multiple places to provide security for the Bitcoin network. Cryptography, which is essentially mathematical and computer science algorithms used to encrypt and decrypt information, is used in bitcoin addresses, hash functions, and the blockchain.
Decentralized
Having a decentralized bitcoin network is a critical aspect. The network is “decentralized,” meaning that it’s void of a centralized company or entity that governs the network. Bitcoin is a peer-to-peer protocol, where all users within the network work and communicate directly with each other, instead of having their funds handled by a middleman, such as a bank or credit card company.
Difficulty
Difficulty is directly related to Bitcoin mining (see mining below), and how hard it is to verify blocks in the Bitcoin network. Bitcoin adjusts the mining difficulty of verifying blocks every 2016 blocks. Difficulty is automatically adjusted to keep block verification times at ten minutes.
Double Spend
If someone tries to send a bitcoin transaction to two different recipients at the same time, this is double spending. Once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. The more confirmations that a transaction has, the harder it is to double spend the bitcoins.
Full Node
A full node is when you download the entire blockchain using a bitcoin client, and you relay, validate, and secure the data within the blockchain. The data is bitcoin transactions and blocks, which is validated across the entire network of users.
Halving
Bitcoins have a finite supply, which makes them scarce. The total amount that will ever be issued is 21 million. The number of bitcoins generated per block is decreased 50% every four years. This is called “halving.” The final halving will take place in the year 2140.
Hash Rate
The hash rate is how the Bitcoin mining network processing power is measured. In order for miners to confirm transactions and secure the blockchain, the hardware they use must perform intensive computational operations which is output in hashes per second.
Hash (txid)
A transaction hash (sometimes referred to as a transaction ID or txid) is a unique identifier that can be used on any block explorer to look up all of the public details of a particular transaction. Every on-chain transaction has a unique hash made up of a long string of alphanumeric characters.
Mining
Bitcoin mining is the process of using computer hardware to do mathematical calculations for the Bitcoin network in order to confirm transactions. Miners collect transaction fees for the transactions they confirm and are awarded bitcoins for each block they verify.
Pool
As part of bitcoin mining, mining “pools” are a network of miners that work together to mine a block, then split the block reward among the pool miners. Mining pools are a good way for miners to combine their resources to increase the probability of mining a block, and also contribute to the overall health and decentralization of the bitcoin network.
Private Key
A private key is a string of data that shows you have access to bitcoins in a specific wallet. Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.
Proof of Work
Proof of work refers to the hash of a block header (blocks of bitcoin transactions). A block is considered valid only if its hash is lower than the current target. Each block refers to a previous block adding to previous proofs of work, which forms a chain of blocks, known as a blockchain. Once a chain is formed, it confirms all previous Bitcoin transactions and secures the network.
Public Address
A public bitcoin address is cryptographic hash of a public key. A public address typically starts with the number “1.” Think of a public address like an email address. It can be published anywhere and bitcoins can be sent to it, just like an email can be sent to an email address.
RBF
RBF stands for Replace By Fee, and refers to a method that allows a sender to replace a “stuck” or unconfirmed transaction with a new one that uses a higher fee. This is done to make sure a transaction confirms as quickly as possible. The “replacement” transaction uses the same inputs as the original one. This is not considered a double spend, as the receiving address(es) typically remain the same.
Satoshi Nakamoto
Bitcoin’s existence began with an academic paper written in 2008 by a developer under the name of Satoshi Nakamoto. Satoshi is the name used as the original inventor of Bitcoin.
Transaction
A transaction is when data is sent to and from one bitcoin address to another. Just like financial transactions where you send money from one person to another, in bitcoin you do the same thing by sending data (bitcoins) to each other. Bitcoins have value because it’s based on the properties of mathematics, rather than relying on physical properties (like gold and silver) or trust in central authorities, like fiat currencies.
Wallet
Just like with paper dollars you hold in your physical wallet, a bitcoin wallet is a digital wallet where you can store, send, and receive bitcoins securely. There are many varieties of wallets available, whether you’re looking for a web or mobile solution. Ideally, a bitcoin wallet will give you access to your public and private keys. This means that only you have rightful access to spend these bitcoins, whenever you choose to.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
The Great Pyramid of Giza (also known as the Pyramid of Khufu or the Pyramid of Cheops) is the oldest and largest of the pyramids in the Giza pyramid complex bordering present-day Giza in Greater Cairo, Egypt.
Egyptologists conclude that the pyramid was built as a tomb for the Fourth Dynasty Egyptian pharaoh Khufu and estimate that it was built in the 26th century BC during a period of around 27 years.
Initially standing at 146.5 metres (481 feet), the Great Pyramid was the tallest man-made structure in the world for more than 3,800 years.
Over time, most of the smooth white limestone casing was removed, which lowered the pyramid’s height to the present 138.5 metres (454.4 ft).
What is seen today is the underlying core structure. The base was measured to be about 230.3 metres (755.6 ft) square, giving a volume of roughly 2.6 million cubic metres (92 million cubic feet), which includes an internal hillock.
The dimensions of the pyramid were 280 royal cubits (146.7 m; 481.4 ft) high, a base length of 440 cubits (230.6 m; 756.4 ft), with a seked of 5+1/2 palms (a slope of 51°50’40”).
The Great Pyramid was built by quarrying an estimated 2.3 million large blocks weighing 6 million tonnes total.
The majority of stones are not uniform in size or shape and are only roughly dressed.The outside layers were bound together by mortar.
Primarily local limestone from the Giza Plateau was used. Other blocks were imported by boat down the Nile: White limestone from Tura for the casing, and granite blocks from Aswan, weighing up to 80 tonnes, for the King’s Chamber structure.
There are three known chambers inside the Great Pyramid. The lowest was cut into the bedrock, upon which the pyramid was built, but remained unfinished. The so-called Queen’s Chamber and King’s Chamber, that contains a granite sarcophagus, are higher up, within the pyramid structure. Khufu’s vizier, Hemiunu (also called Hemon), is believed by some to be the architect of the Great Pyramid.
Many varying scientific and alternative hypotheses attempt to explain the exact construction techniques.
The funerary complex around the pyramid consisted of two mortuary temples connected by a causeway (one close to the pyramid and one near the Nile), tombs for the immediate family and court of Khufu, including three smaller pyramids for Khufu’s wives, an even smaller “satellite pyramid” and five buried solar barges.
Flavian Amphitheatre a.k.a Colloseum Rome – Italy
The Colosseum (Colosseo[kolosˈsɛːo]) is an oval amphitheatre in the centre of the city of Rome, Italy, just east of the Roman Forum.
It is the largest ancient amphitheatre ever built, and is still the largest standing amphitheatre in the world today, despite its age.
Construction began under the emperor Vespasian (r. 69–79 AD) in 72 and was completed in 80 AD under his successor and heir, Titus (r. 79–81).
Further modifications were made during the reign of Domitian (r. 81–96).
The three emperors that were patrons of the work are known as the Flavian dynasty, and the amphitheatre was named the Flavian Amphitheatre (Latin: Amphitheatrum Flavium; Italian: Anfiteatro Flavio[aɱfiteˈaːtro ˈflaːvjo]) by later classicists and archaeologists for its association with their family name (Flavius).
The Colosseum is built of travertine limestone, tuff (volcanic rock), and brick-faced concrete.
The Colosseum could hold an estimated 50,000 to 80,000 spectators at various points in its history having an average audience of some 65,000; it was used for gladiatorial contests and public spectacles including animal hunts, executions, re-enactments of famous battles, and dramas based on Roman mythology, and briefly mock sea battles.
The building ceased to be used for entertainment in the early medieval era.
It was later reused for such purposes as housing, workshops, quarters for a religious order, a fortress, a quarry, and a Christian shrine.
Although substantially ruined because of earthquakes and stone-robbers (for spolia), the Colosseum is still an iconic symbol of Imperial Rome and was listed as one of the New 7 Wonders of the World.
It is one of Rome’s most popular tourist attractions and also has links to the Roman Catholic Church, as each Good Friday the Pope leads a torchlit “Way of the Cross” procession that starts in the area around the Colosseum.
The Colosseum is also depicted on the Italian version of the five-cent euro coin.
Several walls were built from as early as the 7th century BC,with selective stretches later joined together by Qin Shi Huang (220–206 BC), the first emperor of China.
Little of the Qin wall remains. Later on, many successive dynasties built and maintained multiple stretches of border walls. The best-known sections of the wall were built by the Ming dynasty (1368–1644).
Apart from defense, other purposes of the Great Wall have included border controls, allowing the imposition of duties on goods transported along the Silk Road, regulation or encouragement of trade and the control of immigration and emigration.
Furthermore, the defensive characteristics of the Great Wall were enhanced by the construction of watchtowers, troop barracks, garrison stations, signaling capabilities through the means of smoke or fire, and the fact that the path of the Great Wall also served as a transportation corridor.
The frontier walls built by different dynasties have multiple courses. Collectively, they stretch from Liaodong in the east to Lop Lake in the west, from the present-day Sino–Russian border in the north to Tao River (Taohe) in the south; along an arc that roughly delineates the edge of the Mongolian steppe; spanning 21,196.18 km (13,170.70 mi) in total.
Today, the defensive system of the Great Wall is generally recognized as one of the most impressive architectural feats in history.
As history has left behind, monumental architectural constructions that we can admire and reamain in awe as we look at them, after thousands of years since the first stone was put, in today’s world our digital PoW can be seen and admired the same as the Great Wall of China or the Piramid of Giza !!!
Wich brings us to the question, what is Free talking about ?!?
Long Live the CypherPunksCypherPunks Write CodeGenesisBitcoin Genesis Block Mined 03 January 2009The Times January 3, 2009Bitcoin – Proof Of Work
Bitcoin-type Proof Of Work
In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work digital currency that, like Finney’s RPoW, is also based on the Hashcash PoW.
But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW.
Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are “mined” using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network.
The difficulty is periodically adjusted to keep the block time around a target time.
Since the creation of Bitcoin, proof-of-work has been the predominant design of peer-to-peer cryptocurrency. Studies have estimated the total energy consumption of cryptocurrency mining.
The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. Recent estimates from the University of Cambridge put Bitcoin’s energy consumption as equal to that of Switzerland.
History modification
Each block that is added to the blockchain, starting with the block containing a given transaction, is called a confirmation of that transaction.
Ideally, merchants and services that receive payment in the cryptocurrency should wait for at least one confirmation to be distributed over the network, before assuming that the payment was done.
The more confirmations that the merchant waits for, the more difficult it is for an attacker to successfully reverse the transaction in a blockchain—unless the attacker controls more than half the total network power, in which case it is called a 51% attack.
2ASICs and mining pools
Within the Bitcoin community there are groups working together in mining pools.
Some miners use application-specific integrated circuits (ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.
Some PoWs claim to be ASIC-resistant, i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude.
ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a 51% attack against a cryptocurrency.
Plant the Seed The choice is YoursChoose Wisely The Choice is Yours
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
The Times – January 3, 2009Bitcoin Genesis Block Mined 03 January 2009Cypherpunks Write CodeCODE IS LAW THE SOONER HUMANKIND ACCEPTS IT, THE SOONER IT CAN BUILD AROUND ITYeah.. I wonder Why 😂Bitcoin made easyHow a Bitcoin transaction worksA humble MinerHow Bitcoin Mining WorksMining DifficultyBitcoin HalvingBitcoin Previous HalvingsPoolsBitcoin WalletsBitcoin StakeholdersBitcoin FactsPower to the PeopleTotalitarian Governments can kiss my 256-bit keyBitcoin – People’s MoneyBitcoin cannot be Shut DownThe power of the long tail…Central Bank’s 3 StrategiesF**k them, Enough !!!Upcoming Smart Contracts NetworksBitcoin Yearly CandlesBitcoin Price History – Log ScaleBitcoin Mining Ecosystem MapDefi Ecosystem in EthereumDeFi Stack: Product& Application ViewSyscoin EcosystemSyscoinBSC EcosystemPopular CryptocurrencyCrpto EcosystemPublic Companies that own BitcoinTop Banks investing in CryptoBitcoin Inflation vs. TimeWhen you’re Ready…Choose WiselyMake bitcoin thrive, let fiat become humus…Veritas non Auctoritas Facit Legem
Most people misunderstand what bitcoin miners actually do, and as a result they don’t fully grasp the level of security provided by bitcoin’s hashrate.
In this article, we’ll explain proof of work in a non-technical way so that you’ll be able to counter the misinformation about supercomputers and quantum computers attacking the Bitcoin network in the future.
Simply put, mining is a lottery to create new blocks in the Bitcoin blockchain. There are two main purposes for mining:
To permanently add transactions to the blockchain without the permission of any entity.
To fairly distribute the 21 million bitcoin supply by rewarding new coins to miners who spend real world resources (i.e. electricity) to secure the network.
To understand what is actually happening in this lottery system, let’s look at a simple analogy where every Bitcoin hash is equivalent to a dice roll.
Luck, Gambling, and SHA-256
Imagine that miners in the Bitcoin Network are all individuals gambling at a casino. In this example, each of these gamblers have a 1000 sided dice. They roll their die as quickly as possible, trying to get a number less than 10. Statistically, this may take a very long time, but as more gamblers join the game, the time it takes to hit a number less than 10 gets reduced. In short, more gamblers equals quicker rounds.
Once somebody successfully rolls a number less than 10, all gamblers at the table can look down and verify the number. This lucky gambler takes the prize money and the next round begins.
Ultimately, the process of mining bitcoin is very similar. All miners on the network are using Application Specific Integrated Circuits (ASICs), which are specialized computers designed to compute hashes as quickly as possible.
To “compute a hash” simply means plugging any random input into a mathematical function and producing an output.
More hashes per second (i.e. higher hashrate) is equivalent to more dice rolls per second, and thus a greater probability of success.
Miners propose a potential Bitcoin block of transactions, and use this for an input. The block is plugged into the SHA256 hash function which yields a fixed-sized output, known as a hash. A single hash can be computed in less than a millisecond, as it involves no complex math.
If the hash value is lower than the Bitcoin Network difficulty, then the miner who proposed the block wins. If not, then the miner continues trying by computing more hashes.
The successful miner’s block is then added to the blockchain, the miner is rewarded with newly issued bitcoin for their work, and the “next round” begins.
Sources :
https://wikipedia.com/
https://braiins.com/
https://blockdata.com/
https://coin98analytics.com/
https://scoopwhoop.com/
https://stakingrewards.com/
https://syscoin.org/
https://galaxydigitalresearch.com/
https://surveycrest.com/
The Times
The Economist
"Internet of Money" - Andreas Antonopoulus
Hal Finney Quotes
Timothy C. May Quote
Free Spirit Digital Art
!°! If I forgot someone, sorry ! Do tell and I'll add you as a source of inspiration on the list !!! Thanks for understanding !!!
Questions, opinions, critics and requests always welcomed and as time allows will be accomodated !!! 🤓 🙂 😉
Did you find this article helpful?
If so, please consider a donation to help the evolution and development of more helpful articles in the future, and show your support for alternative articles.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
R&D, wisdom, knowledge, curiosities, answers and many more questions 🙂🤣🙃
You have a Choice !!!Power to the People !!! Wake the F… Up !!! No more excuses, you have a choice now !!!WHO as in WORLD HEALTH ORGANISATIONP F I Z E R InsiderPoem of the LegacyBeing Curious…Of course it doesn’t comply…The Problem with centralized Social-Media10 Principles of Strategic LeadershipGlobal Reserve CurrencyPsychology of a Market CycleSuccessSuccessTriangle of SuccessDon’t plan for travelling when old…😋😳😋Be like a Tree…If anyone understands this please enlighten me too 😊🤭🤗http://www.revelationtimelinedecoded.comESGFor those that think WE are the Center of the Universe 🤣😅😂Confident vs. Insecure PeopleDay by day…Managing Complex ChangeThe Cone of LearningThe Hero’s JourneyElectromagnetic Field of the HeartI-ChingLanguage creates RealitySex Organs of the Machine WorldPhilosopher’s StoneIsaac NewtonAbracadabraSingularityMulti-Mind Thought Control Process APPLE INC.RetrocausalityCERNEGOSYSCOIN ECOSYSTEMJagSteinSysCoinBitcoin might bury FIAT 🙂 🤭 🙃DEFI Ecosystem on EthereumDeFi StackBitcoin Mining Ecosystem Map…the other 6 BillionbitcoinThis is about the other 6 Billion…Top NFT ProjectsBusiness CyclesCentral’s Bank’s 3 StrategiesGlobal DebtDefender of the FlowerFlower of LifeSacred GeometrySeed & Flower of LifeKnowledge – An Antidote to FearJOIN THE REVOLUTION 😋 🤣 😋Emotion – Judgement – Action…violent recolution inevitable.E S B IEvery generation…LOVE YOUR RAGE NOT YOUR CAGERevolutionThe Times – January 3, 2009REVOLUTIONBitcoin Genesis Block – 03 January 2009Introduction to BitcoinIntroduction to Decentralized FinanceIntroduction to Digital CurrenciesAll Metals We MinedMap to Multiplication Nikola TeslaTop VC’s Investing in BlockChain CompaniesAthmospheres of the Solar SystemGlobal GDP 2021Map of CyberSecurity Domains21 QuestionsSix Innovation ModelsWhat May Happen in the next 100 YearsAbstract – “…to pull the body out of dimension so that the person can walk through solid objects such as wooden doors.” Okay 🤯 😳 🤯 ?¿?China’s Social Credit SystemBlockchain Platforms Comparison (BCP)ARISE
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→