Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.
Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.
Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.
Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.
Losing your keys
Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.
On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.
Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.
Storing coins in online wallets
Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.
There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.
Not keeping a hard copy of your seed phrase
To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.
Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.
Fat-finger error
A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.
One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.
Sending to the wrong address
Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.
This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.
Over diversification
Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.
Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.
Not setting up a stop-loss arrangement
A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.
In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.
That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.
Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.
Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.
Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.
Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.
Losing your keys
Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.
On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.
Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.
Storing coins in online wallets
Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.
There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.
Not keeping a hard copy of your seed phrase
To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.
Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.
Fat-finger error
A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.
One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.
Sending to the wrong address
Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.
This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.
Over diversification
Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.
Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.
Not setting up a stop-loss arrangement
A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.
In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.
That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.
Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.
Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.
Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.
Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.
Losing your keys
Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.
On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.
Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.
Storing coins in online wallets
Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.
There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.
Not keeping a hard copy of your seed phrase
To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.
Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.
Fat-finger error
A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.
One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.
Sending to the wrong address
Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.
This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.
Over diversification
Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.
Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.
Not setting up a stop-loss arrangement
A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.
In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.
That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.
Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.
Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.
Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.
Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.
Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.
Losing your keys
Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.
On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.
Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.
Storing coins in online wallets
Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.
There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.
Not keeping a hard copy of your seed phrase
To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.
Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.
Fat-finger error
A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.
One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.
Sending to the wrong address
Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.
This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.
Over diversification
Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.
Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.
Not setting up a stop-loss arrangement
A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.
In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.
That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.
Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.
Now, even if someone does not have the drawbacks of decades-long experience and mental models with a specific asset class, it is still very hard to understand Bitcoin.
Why? Because Bitcoin is the intersection of many, many different fields.
To truly understand Bitcoin, there is no other way than being a polymath.
Even if one has made it as far to (a) realize Bitcoin is something completely new and solely using existing heuristics and mental models will not work and (b) with Bitcoin, more than anything else, we do not know what we do not know — understanding still requires a very broad set of competences.
The correct approach to understand when one starts going down the Bitcoin rabbit hole is therefore to assume one knows nothing and any experience and insight one has from previous aspects of life brings very little to the table.
First principles thinking is required. We can, however, try to define a little deeper what Bitcoin is. Below is listed some different ways of wrapping one’s head around Bitcoin.
Not an exhaustive list.
A living organism
Bitcoin is Free and Open Source software. It is not a piece of IP owned by a centralized joint-stock company that needs to optimize for the bottom line of the next quarter and is incapable of cannibalizing itself. Since the Bitcoin whitepaper was released and the genesis block was mined, we have seen an explosion of experiments, ideas and creative geniuses get involved in Bitcoin and crypto as a whole. To think of Bitcoin as a living, technological organism that adjusts, develops and constantly changes to survive can be useful.
A religion
Money, as many have learned and realized in recent decade, is just a social construction we are all part of. The value therefore comes from the amount of true believers.
Continuing this line of thinking, one could describe the religion as consisting of:
Prophet: Satoshi. No longer present. Impossible to ask questions.
Convictions: Decentralization.
Rituals: Running nodes. Mining. Hodling.
Holy scriptures: Bitcoin whitepaper. As with all holy scriptures, people interpret them in their own way.
Sacred objects: Genesis block, lowercase bitcoin
Sects: Different interpretations resulting in different factions/sects: small blockers, big blockers, etc.
An emerging economy
The consensus protocol can be thought of as the constitution
The society as the constituency (users on the demand-side; miners on the supply-side)
Core developers as the executive department who write the code and execute on the strategy, but amendments to the protocol (i.e., constitution) require approval from the constituency)
The native token is the internal currency
The investors underwrite the currency
Additionally, many one-liners and memes exist to describe Bitcoin. Not an exhaustive list.
Sound money
Digital gold
“An insurance policy against an Orwellian future”
“A tool for freeing humanity from oligarchs and tyrants, dressed up as a get-rich-quick scheme”
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
It is from the epithet of a parable, explaining that a fool waits for the stream to stop before crossing, while a wise man forgoes comfort and crosses anyway.
It is a frequently used motto for academic institutions.
Kant answers the question in the first sentence of the essay: “Enlightenment is man’s emergence from his self-incurred immaturity (Unmündigkeit).”
He argues that the immaturity is self-inflicted not from a lack of understanding, but from the lack of courage to use one’s reason, intellect, and wisdom without the guidance of another.
Kant argued that using one’s reason is considered dangerous by most men and all women.
He exclaims that the motto of the Enlightenment is “Sapere aude“! – Dare to be wise!
“Enlightenment is man’s release from his self-incurred tutelage.
Tutelage is man’s inability to make use of his understanding without direction from another.
Self-incurred is this tutelage when its cause lies not in lack of reason but in lack of resolution and courage to use it without direction from another.
Sapere Aude!
‘Have courage to use your own reason!’- that is the motto of enlightenment.”
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Gold is a chemical element with the symbol Au (from Latin: aurum) and atomic number 79, making it one of the higher atomic number elements that occur naturally.
It is a bright, slightly orange-yellow, dense, soft, malleable, and ductile metal in a pure form.
Chemically, gold is a transition metal and a group 11 element. It is one of the least reactive chemical elements and is solid under standard conditions.
Gold often occurs in free elemental (native) form, as nuggets or grains, in rocks, veins, and alluvial deposits. It occurs in a solid solution series with the native element silver (as electrum), naturally alloyed with other metals like copper and palladium, and mineral inclusions such as within pyrite.
Less commonly, it occurs in minerals as gold compounds, often with tellurium (gold tellurides).
A relatively rare element, gold is a precious metal that has been used for coinage, jewelry, and other arts throughout recorded history.
Still, gold coins ceased to be minted as a circulating currency in the 1930s, and the world gold standard was abandoned for a fiat currency system after 1971.
As of 2017, the world’s largest gold producer by far was China, with 440 tonnes per year.
A total of around 201,296 tonnes of gold exists above ground, as of 2020. This is equal to a cube with each side measuring roughly 21.7 meters (71 ft).
Gold’s high malleability, ductility, resistance to corrosion and most other chemical reactions, and conductivity of electricity have led to its continued use in corrosion-resistant electrical connectors in all types of computerized devices (its chief industrial use).
The world consumption of new gold produced is about 50% in jewelry, 40% in investments and 10% in industry.
Gold is also used in infrared shielding, colored-glass production, gold leafing, and tooth restoration. Certain gold salts are still used as anti-inflammatories in medicine.
F I A T
Fiat money (from Latin: fiat, “let it be done”) is a type of money that is not backed by any commodity such as gold or silver, and typically declared by a decree from the government to be legal tender.
Throughout history, fiat money was sometimes issued by local banks and other institutions. In modern times, fiat money is generally established by government regulation.
Yuan dynasty banknotes are a medieval form of fiat money
Fiat money does not have intrinsic value and does not have use value. It has value only because the people who use it as a medium of exchange agree on its value. They trust that it will be accepted by merchants and other people.
Fiat money is an alternative to commodity money, which is a currency that has intrinsic value because it contains a precious metal such as gold or silver which is embedded in the coin.
Fiat also differs from representative money, which is money that has intrinsic value because it is backed by and can be converted into a precious metal or another commodity.
Fiat money can look similar to representative money (such as paper bills), but the former has no backing, while the latter represents a claim on a commodity (which can be redeemed to a greater or lesser extent).
Government-issued fiat money banknotes were used first during the 11th century in China.
Fiat money started to predominate during the 20th century.
Money declared by a person, institution or government to be legal tender, meaning that it must be accepted in payment of a debt in specific circumstances.
State-issued money which is neither convertible through a central bank to anything else nor fixed in value in terms of any objective standard.
Money used because of government decree.
An otherwise non-valuable object that serves as a medium of exchange (also known as fiduciary money.)
The term fiat derives from the Latin word fiat, meaning “let it be done” used in the sense of an order, decree or resolution.
Bitcoin – Digital Gold
The most common, and best, ways to think about bitcoin is as “digital gold”.
Like gold, bitcoin doesn’t rely on a central issuer, can’t have its supply manipulated by any authority, and has fundamental properties long considered important for a monetary good and store of value.
Unlike gold, bitcoin is extremely easy and cheap to “transport”, and trivial to verify its authenticity.
Bitcoin is also “programmable”. This means custody of bitcoin can be extremely flexible. It can be split amongst a set of people (“key holders”), backed up and encrypted, or even frozen-in-place until a certain date in the future. This is all done without a central authority managing the process.
You can walk across a national border with bitcoin “stored” in your head by memorizing a key.
The similarities to gold, plus the unique features possible because bitcoin is purely digital, give it the “digital gold” moniker.
Sharing fundamental properties with gold means it shares use-cases with gold, such as hedging inflation and political uncertainty.
But being digital, bitcoin adds capabilities that are especially relevant in our modern electronic times.
The world does indeed need a digital version of gold.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Bitcoin surges after accidentally released Treasury statement
Prices of Bitcoin and other cryptocurrencies have soared following the apparent accidental release of a U.S. Treasury statement on Biden’s expected executive order on digital assets.
The premature statement by Treasury Secretary Yellen, which was dated March 9, has since been removed.
“President Biden’s historic executive order calls for a coordinated and comprehensive approach to digital asset policy. This approach will support responsible innovation that could result in substantial benefits for the nation, consumers, and businesses.
It will also address risks related to illicit finance, protecting consumers and investors, and preventing threats to the financial system and broader economy.”
Quote from the now deleted statement
At the time of writing, Bitcoin is up nearly 8% in the last 24 hours.
Biden’s executive order aims to regulate the crypto market while also reaping the benefits of digital currencies.
So far, like most countries in the world, the US has tended to react to developments and has limited itself to pointing to a political-economic approach that is yet to be developed.
Statement by Secretary of the Treasury Janet L. Yellen on President Biden’s Executive Order on Digital Assets
March 9, 2022
WASHINGTON – U.S. Secretary of the Treasury Janet L. Yellen released the following statement on President Biden’s executive order on digital assets.
“President Biden’s historic executive order calls for a coordinated and comprehensive approach to digital asset policy. This approach will support responsible innovation that could result in substantial benefits for the nation, consumers, and businesses. It will also address risks related to illicit finance, protecting consumers and investors, and preventing threats to the financial system and broader economy.
Under the executive order, Treasury will partner with interagency colleagues to produce a report on the future of money and payment systems. We’ll also convene the Financial Stability Oversight Council to evaluate the potential financial stability risks of digital assets and assess whether appropriate safeguards are in place. And, because the questions raised by digital assets often have important cross-border dimensions, we’ll work with our international partners to promote robust standards and a level playing field.
This work will complement ongoing efforts by Treasury. Already, the Department has worked with the President’s Working Group on Financial Markets, the FDIC, and OCC to study one particular kind of digital asset – stablecoins– and to make recommendations. Under the executive order, Treasury and interagency partners will build upon the recently published National Risk Assessments, which identify key illicit financing risks associated with digital assets.
As we take on this important work, we’ll be guided by consumer and investor protection groups, market participants, and other leading experts. Treasury will work to promote a fairer, more inclusive, and more efficient financial system, while building on our ongoing work to counter illicit finance, and prevent risks to financial stability and national security.”
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Assigning the most powerful supercomputer to mine bitcoin would be comparable to hiring a grandmaster chess player to move a pile of bricks by hand.
The job would get done eventually but the chess player is much better at thinking and playing chess than exerting energy to repetitively move bricks.
Likewise, combining the computing power of the most powerful supercomputers in the world and using them to mine bitcoin would essentially be pointless when compared to the ASIC machines used today.
ASICs are designed to do one thing as quickly and efficiently as possible, whereas a supercomputer is designed to do complicated tasks or math problems.
Since Bitcoin mining is a lottery based on random trial and error rather than complex math, specialization (ASICs)beatsgeneral excellence (supercomputers) everytime.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Why this crazyness with rabbits ?!? And their holes, you would ask ?!? Why is the rabbit hole so deep ?¿
And what does the rabbit hole has to do with that BitCorn thing I keep hearing about all over the place ?¿
I like to start from the begining, as I think so I am 😋😂
Rabbit Hole is a play written by David Lindsay-Abaire. It was the recipient of the 2007 Pulitzer Prize for Drama. The play premiered on Broadway in 2006, and it has also been produced by regional theatres in cities such as Los Angeles, Philadelphia and Pittsburgh. The play had its Spanish language premiere in San Juan, Puerto Rico in Autumn of 2010.
The play deals with the ways family members survive a major loss, and includes comedy as well as tragedy. Cynthia Nixon won the 2006 Tony Award for Best Performance by a Leading Actress in a Play for her performance as Becca in the New York production, and the play was nominated for several other Tony awards.
Rabbit Hole
A situation, journey, or process that is particularly strange, problematic, difficult, complex, or chaotic, especially one that becomes increasingly so as it develops or unfolds.
An allusion to “Alice’s Adventures in Wonderland” by Lewis Carroll, it is used especially in the phrase “(go) down the rabbit hole.”
Overhauling the current tax legislation is a rabbit hole I don’t think this administration should go down at this point.I’ve stayed away from drugs and alcohol since coming to college. I have an addictive personality, so I decided to just avoid that rabbit hole altogether.
What does rabbit hole mean?
Used especially in the phrase going down the rabbit hole or fallingdown the rabbit hole, a rabbit hole is a metaphor for something that transports someone into a wonderfully (or troublingly) surreal state or situation.
On the internet, a rabbit holefrequently refers to an extremely engrossing and time-consuming topic.
Where does rabbit hole come from?
Alice’s Adventures in WonderLand
Literally, a rabbit hole is what the animal digs for its home. The earliest written record of the phrase dates back to the 17th century. But the figurative rabbit hole begins with Lewis Carroll’s 1865 classic, Alice’s Adventures in Wonderland.
In its opening chapter, “Down the Rabbit-Hole,” Alice follows the White Rabbit into his burrow, which transports her to the strange, surreal, and nonsensical world of Wonderland.
Since then, Carroll’s rabbit hole has proved a popular and useful reference. The Oxford English Dictionary finds the first allusive rabbit hole in a 1938 edition of TheYale Law Journal: “It is the Rabbit-Hole down which we fell into the Law, and to him who has gone down it, no queer performance is strange.”
Over much of the 20th century, rabbit hole has been used to characterize bizarre and irrational experiences. It’s especially used to reference magical, challenging, and even dangerous places or positions, similar to Carroll’s topsy-turvy Wonderland.
Rabbit holehas many metaphorical applications—from frustrating red tape to the mind-bending complexity of science to hallucinations during altered states—all united by a common sense of passing into some labyrinthine, logic-defying realm that, once entered, is hard to get out of.
One can fall down the rabbit hole of government bureaucracy, healthcare, obtaining a green card, tax law, the political economy of modern Japan, puberty, college admissions, or quantum mechanics.
If you’re Neo in the hit film The Matrix, you can take the red pill—a pill that shows you the truth, as opposed to the blue pill, which keeps you in ignorance—and “see how deep the rabbit hole goes.”
In a related note, some people literally take pills and go down the rabbit hole of a psychedelic drug trip.
But as Kathryn Schulz observed for The New Yorker in 2015, rabbit hole has further evolved in the information age: “These days…when we say that we fell down the rabbit hole, we seldom mean that we wound up somewhere psychedelically strange. We mean that we got interested in something to the point of distraction—usually by accident, and usually to a degree that the subject in question might not seem to merit.”
Thanks to the abundance, variety, and instant access of content online, many fall down internet rabbit holes which are often spectacularly, and addictively, niche: scary stories, obscure conspiracy theories, or famous last meals, for instance.
Other rabbit holes tend to be opened up by specific services or social media, which serve users item after item, link after link: Wikipedia, Netflix, Amazon, Facebook, YouTube, and so forth.
These rabbit holes have become so common that people sometimes swap out rabbit for the name of the particular site, e.g. “I’ve fallen down an Instragram hole” or “I’m falling down a wikihole.”
Who uses rabbit hole?
From formal documents to internet status updates, rabbit hole is a very popular and widespread expression. Unlike earlier iterations of the metaphor, internet rabbit holes convey less a sense of weirdness, disorientation, or difficulty than they do of an intensely captivating diversion.
Rabbit hole is also showing increasing use as a modifier, e.g. a rabbit-hole question or phenomenon.
Now… that we have a basic and broader understanding about this Hole and it’s rabbit that digged it 😋😂
Let me show you a journey that I took to get to know, understand, admire, be amazed and support the BitCorn everybody is so crazy about …
Bitcoin Glossary
Block
Blocks are found in the Bitcoin blockchain. Blocks connect all transactions together. Transactions are combined into single blocks and are verified every ten minutes through mining. Each subsequent block strengthens the verification of the previous blocks, making it impossible to double spend bitcoin transactions (see double spend below).
BIP
Bitcoin Improvement Proposal or BIP, is a technical design document providing information to the bitcoin community, or describing a new feature for bitcoin or its processes or environment which affect the Bitcoin protocol. New features, suggestions, and design changes to the protocol should be submitted as a BIP. The BIP author is responsible for building consensus within the community and documenting dissenting opinions.
Blockchain
The Bitcoin blockchain is a public record of all Bitcoin transactions. You might also hear the term used as a “public ledger.” The blockchain shows every single record of bitcoin transactions in order, dating back to the very first one. The entire blockchain can be downloaded and openly reviewed by anyone, or you can use a block explorer to review the blockchain online.
Block Height
The block height is just the number of blocks connected together in the block chain. Height 0 for example refers to the very first block, called the “genesis block.”
Block Reward
When a block is successfully mined on the bitcoin network, there is a block reward that helps incentivize miners to secure the network. The block reward is part of a “coinbase” transaction which may also include transaction fees. The block rewards halves roughly every four years; see also “halving.”
Change
Let’s say you are spending $1.90 in your local supermarket, and you give the cashier $2.00. You will get back .10 cents in change. The same logic applies to bitcoin transactions. Bitcoin transactions are made up of inputs and outputs. When you send bitcoins, you can only send them in a whole “output.” The change is then sent back to the sender.
Cold Storage
The term cold storage is a general term for different ways of securing your bitcoins offline (disconnected from the internet). This would be the opposite of a hot wallet or hosted wallet, which is connected to the web for day-to-day transactions. The purpose of using cold storage is to minimize the chances of your bitcoins being stolen from a malicious hacker and is commonly used for larger sums of bitcoins.
Confirmation
A confirmation means that the bitcoin transaction has been verified by the network, through the process known as mining. Once a transaction is confirmed, it cannot be reversed or double spent. Transactions are included in blocks.
Cryptography
Cryptography is used in multiple places to provide security for the Bitcoin network. Cryptography, which is essentially mathematical and computer science algorithms used to encrypt and decrypt information, is used in bitcoin addresses, hash functions, and the blockchain.
Decentralized
Having a decentralized bitcoin network is a critical aspect. The network is “decentralized,” meaning that it’s void of a centralized company or entity that governs the network. Bitcoin is a peer-to-peer protocol, where all users within the network work and communicate directly with each other, instead of having their funds handled by a middleman, such as a bank or credit card company.
Difficulty
Difficulty is directly related to Bitcoin mining (see mining below), and how hard it is to verify blocks in the Bitcoin network. Bitcoin adjusts the mining difficulty of verifying blocks every 2016 blocks. Difficulty is automatically adjusted to keep block verification times at ten minutes.
Double Spend
If someone tries to send a bitcoin transaction to two different recipients at the same time, this is double spending. Once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. The more confirmations that a transaction has, the harder it is to double spend the bitcoins.
Full Node
A full node is when you download the entire blockchain using a bitcoin client, and you relay, validate, and secure the data within the blockchain. The data is bitcoin transactions and blocks, which is validated across the entire network of users.
Halving
Bitcoins have a finite supply, which makes them scarce. The total amount that will ever be issued is 21 million. The number of bitcoins generated per block is decreased 50% every four years. This is called “halving.” The final halving will take place in the year 2140.
Hash Rate
The hash rate is how the Bitcoin mining network processing power is measured. In order for miners to confirm transactions and secure the blockchain, the hardware they use must perform intensive computational operations which is output in hashes per second.
Hash (txid)
A transaction hash (sometimes referred to as a transaction ID or txid) is a unique identifier that can be used on any block explorer to look up all of the public details of a particular transaction. Every on-chain transaction has a unique hash made up of a long string of alphanumeric characters.
Mining
Bitcoin mining is the process of using computer hardware to do mathematical calculations for the Bitcoin network in order to confirm transactions. Miners collect transaction fees for the transactions they confirm and are awarded bitcoins for each block they verify.
Pool
As part of bitcoin mining, mining “pools” are a network of miners that work together to mine a block, then split the block reward among the pool miners. Mining pools are a good way for miners to combine their resources to increase the probability of mining a block, and also contribute to the overall health and decentralization of the bitcoin network.
Private Key
A private key is a string of data that shows you have access to bitcoins in a specific wallet. Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.
Proof of Work
Proof of work refers to the hash of a block header (blocks of bitcoin transactions). A block is considered valid only if its hash is lower than the current target. Each block refers to a previous block adding to previous proofs of work, which forms a chain of blocks, known as a blockchain. Once a chain is formed, it confirms all previous Bitcoin transactions and secures the network.
Public Address
A public bitcoin address is cryptographic hash of a public key. A public address typically starts with the number “1.” Think of a public address like an email address. It can be published anywhere and bitcoins can be sent to it, just like an email can be sent to an email address.
RBF
RBF stands for Replace By Fee, and refers to a method that allows a sender to replace a “stuck” or unconfirmed transaction with a new one that uses a higher fee. This is done to make sure a transaction confirms as quickly as possible. The “replacement” transaction uses the same inputs as the original one. This is not considered a double spend, as the receiving address(es) typically remain the same.
Satoshi Nakamoto
Bitcoin’s existence began with an academic paper written in 2008 by a developer under the name of Satoshi Nakamoto. Satoshi is the name used as the original inventor of Bitcoin.
Transaction
A transaction is when data is sent to and from one bitcoin address to another. Just like financial transactions where you send money from one person to another, in bitcoin you do the same thing by sending data (bitcoins) to each other. Bitcoins have value because it’s based on the properties of mathematics, rather than relying on physical properties (like gold and silver) or trust in central authorities, like fiat currencies.
Wallet
Just like with paper dollars you hold in your physical wallet, a bitcoin wallet is a digital wallet where you can store, send, and receive bitcoins securely. There are many varieties of wallets available, whether you’re looking for a web or mobile solution. Ideally, a bitcoin wallet will give you access to your public and private keys. This means that only you have rightful access to spend these bitcoins, whenever you choose to.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
The Times – January 3, 2009Bitcoin Genesis Block Mined 03 January 2009Cypherpunks Write CodeCODE IS LAW THE SOONER HUMANKIND ACCEPTS IT, THE SOONER IT CAN BUILD AROUND ITYeah.. I wonder Why 😂Bitcoin made easyHow a Bitcoin transaction worksA humble MinerHow Bitcoin Mining WorksMining DifficultyBitcoin HalvingBitcoin Previous HalvingsPoolsBitcoin WalletsBitcoin StakeholdersBitcoin FactsPower to the PeopleTotalitarian Governments can kiss my 256-bit keyBitcoin – People’s MoneyBitcoin cannot be Shut DownThe power of the long tail…Central Bank’s 3 StrategiesF**k them, Enough !!!Upcoming Smart Contracts NetworksBitcoin Yearly CandlesBitcoin Price History – Log ScaleBitcoin Mining Ecosystem MapDefi Ecosystem in EthereumDeFi Stack: Product& Application ViewSyscoin EcosystemSyscoinBSC EcosystemPopular CryptocurrencyCrpto EcosystemPublic Companies that own BitcoinTop Banks investing in CryptoBitcoin Inflation vs. TimeWhen you’re Ready…Choose WiselyMake bitcoin thrive, let fiat become humus…Veritas non Auctoritas Facit Legem
Most people misunderstand what bitcoin miners actually do, and as a result they don’t fully grasp the level of security provided by bitcoin’s hashrate.
In this article, we’ll explain proof of work in a non-technical way so that you’ll be able to counter the misinformation about supercomputers and quantum computers attacking the Bitcoin network in the future.
Simply put, mining is a lottery to create new blocks in the Bitcoin blockchain. There are two main purposes for mining:
To permanently add transactions to the blockchain without the permission of any entity.
To fairly distribute the 21 million bitcoin supply by rewarding new coins to miners who spend real world resources (i.e. electricity) to secure the network.
To understand what is actually happening in this lottery system, let’s look at a simple analogy where every Bitcoin hash is equivalent to a dice roll.
Luck, Gambling, and SHA-256
Imagine that miners in the Bitcoin Network are all individuals gambling at a casino. In this example, each of these gamblers have a 1000 sided dice. They roll their die as quickly as possible, trying to get a number less than 10. Statistically, this may take a very long time, but as more gamblers join the game, the time it takes to hit a number less than 10 gets reduced. In short, more gamblers equals quicker rounds.
Once somebody successfully rolls a number less than 10, all gamblers at the table can look down and verify the number. This lucky gambler takes the prize money and the next round begins.
Ultimately, the process of mining bitcoin is very similar. All miners on the network are using Application Specific Integrated Circuits (ASICs), which are specialized computers designed to compute hashes as quickly as possible.
To “compute a hash” simply means plugging any random input into a mathematical function and producing an output.
More hashes per second (i.e. higher hashrate) is equivalent to more dice rolls per second, and thus a greater probability of success.
Miners propose a potential Bitcoin block of transactions, and use this for an input. The block is plugged into the SHA256 hash function which yields a fixed-sized output, known as a hash. A single hash can be computed in less than a millisecond, as it involves no complex math.
If the hash value is lower than the Bitcoin Network difficulty, then the miner who proposed the block wins. If not, then the miner continues trying by computing more hashes.
The successful miner’s block is then added to the blockchain, the miner is rewarded with newly issued bitcoin for their work, and the “next round” begins.
Sources :
https://wikipedia.com/
https://braiins.com/
https://blockdata.com/
https://coin98analytics.com/
https://scoopwhoop.com/
https://stakingrewards.com/
https://syscoin.org/
https://galaxydigitalresearch.com/
https://surveycrest.com/
The Times
The Economist
"Internet of Money" - Andreas Antonopoulus
Hal Finney Quotes
Timothy C. May Quote
Free Spirit Digital Art
!°! If I forgot someone, sorry ! Do tell and I'll add you as a source of inspiration on the list !!! Thanks for understanding !!!
Questions, opinions, critics and requests always welcomed and as time allows will be accomodated !!! 🤓 🙂 😉
Did you find this article helpful?
If so, please consider a donation to help the evolution and development of more helpful articles in the future, and show your support for alternative articles.
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→
Cryptoassets being held, generally as longer-term plays; sometimes used self-deprecatingly for soft or losing positions one should close, but can’t for whatever reason. “Too bad none of my alt bags saw the moon that I did today. #cryptoeclipse”
Bitcoin Maximalists
The truest believers in bitcoin’s original mission and design, often paired with a disdain for altcoins.
Block
Blocks are found in the Bitcoin block chain. Blocks connect all transactions together.
Transactions are combined into single blocks and are verified every ten minutes through mining.
Each subsequent block strengthens the verification of the previous blocks, making it impossible to double spend bitcoin transactions (see double spend below).
BIP
Bitcoin Improvement Proposal or BIP, is a technical design document providing information to the bitcoin community, or describing a new feature for bitcoin or its processes or environment which affect the Bitcoin protocol.
New features, suggestions, and design changes to the protocol should be submitted as a BIP.
The BIP author is responsible for building consensus within the community and documenting dissenting opinions.
Black Swans
A black swan is an event or occurrence that deviates beyond what is normally expected of a situation and is extremely difficult to predict.
Black swan events are typically random and unexpected.
The term was popularized by Nassim Nicholas Taleb, a finance professor, writer, and former Wall Street trader.
Block Chain
The Bitcoin block chain is a public record of all Bitcoin transactions. You might also hear the term used as a “public ledger”.
The block chain shows every single record of bitcoin transactions in order, dating back to the very first one.
The entire block chain can be downloaded and openly reviewed by anyone, or you can use a block explorer to review the block chain online.
Block Height
The block height is just the number of blocks connected together in the block chain. Height 0 for example refers to the very first block, called the “genesis block”.
Block Reward
When a block is successfully mined on the bitcoin network, there is a block reward that helps incentivize miners to secure the network.
The block reward is part of a “coinbase” transaction which may also include transaction fees.
The block rewards halves roughly every four years; see also “halving”.
BTFD | #BTFD
“Buy the Fucking Dip” Advice to other traders to pick up a coin that’s presumably hit its bottom.
“$GNT Golem making moves. Underpriced @ 7.5K If U are buying GNT under 10K still a good price 3 X LETS GO $ETH #CRYPTO #trading #BTFD”
Change
Let’s say you are spending $9.90 in your local supermarket, and you give the cashier $10.00. You will get back .10 cents in change.
The same logic applies to bitcoin transactions.
Bitcoin transactions are made up of inputs and outputs.
When you send bitcoins, you can only send them in a whole “output”.
The change is then sent back to the sender.
Cold Storage
The term cold storage is a general term for different ways of securing cryptocurrency offline (disconnected from the internet).
This would be the opposite of a hot wallet or hosted wallet, which is connected to the web for day-to-day transactions.
The purpose of using cold storage is to minimize the chances of your bitcoins being stolen from a malicious hacker and is commonly used for larger sums of bitcoins.
Cold Wallet and Hot Wallet
Cold storage is an offline wallet provided for storing cryptocurrency.
With cold storage, the digital wallet is stored on a platform that is not connected to the internet, thereby, protecting the wallet from unauthorized access, cyber hacks, and other vulnerabilities that a system connected to the internet is susceptible to.
Confirmation
A confirmation means that the bitcoin transaction has been verified by the network, through the process known as mining.
Once a transaction is confirmed, it cannot be reversed or double spent.
Transactions are included in blocks.
Cryptocurrency
Cryptocurrency is the broad name for digital currencies that use blockchain technology to work on a peer-to-peer basis.
Cryptocurrencies don’t need a bank to carry out transactions between individuals.
The nature of the blockchain means that individuals can transact with each other, even if they don’t trust each other.
The cryptocurrency network keeps track of all the transactions and ensures that no one tries to renege on a transaction.
Cryptocurrency 2.0
Also known as a decentralized app,(Dapp) a cryptocurrency 2.0 project uses the blockchain for something other than simply creating and sending money.
They typically involve decentralized versions of online services that were previously operated by a trusted third party.
Cryptography
Cryptography is used in multiple places to provide security for the Bitcoin network.
Cryptography, which is essentially mathematical and computer science algorithms used to encrypt and decrypt information, is used in bitcoin addresses, hash functions, and the block chain.
Cypherpunk
1. A person with an interest in encryption and privacy, especially one who uses encrypted email.
2. Cypherpunk, a term that appeared in Eric Hughes’ “A Cypherpunk’s Manifesto” in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong encryption ( ciphertext is encrypted text) to preserve privacy.
Cypherpunk advocates believe that the use of strong encryption algorithms will enable individuals to have safely private transactions.
They oppose any kind of government regulation of cryptography.
They admit the likelihood that criminals and terrorists will exploit the use of strong encryption systems, but accept the risk as the price to be paid for the individual’s right to privacy.
Dark Web
The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.
The Dark Web poses new and formidable challenges for law enforcement agencies around the world.
Decentralized
Having a decentralized bitcoin network is a critical aspect.
The network is “decentralized”, meaning that it’s void of a centralized company or entity that governs the network.
Bitcoin is a peer-to-peer protocol, where all users within the network work and communicate directly with each other, instead of having their funds handled by a middleman, such as a bank or credit card company.
Difficulty
Difficulty is directly related to Bitcoin mining (see mining below), and how hard it is to verify blocks in the Bitcoin network.
Bitcoin adjusts the mining difficulty of verifying blocks every 2016 blocks.
Difficulty is automatically adjusted to keep block verification times at ten minutes.
Dogecoin
Dogecoin is an altcoin that first started as a joke in late 2013. Dogecoin, which features a Japanese fighting dog as its mascot, gained a broad international following and quickly grew to have a multi-million dollar market capitalization.
Double Spend
If someone tries to send a bitcoin transaction to two different recipients at the same time, this is double spending. Once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. The more confirmations that a transaction has, the harder it is to double spend the bitcoins.
DYOR | #DYOR
“Do Your Own Research.” The trader’s caveat that advice shouldn’t be taken at face value.
“$BCY has an appealing risk/reward here. Could take a few months to play out, however, and will require patience. #DYOR”
Exit Scam
Traditionally a term for darknet markets and vendors that, after building up a good reputation, accumulate bitcoins and disappear; exit scams are also feared by ICO participants who worry that, once they’ve raised hundreds of millions in hard-to-trace money, the developers will take the money and run.
Fiat
Government-issued money.
Full Node
A full node is when you download the entire block chain using a bitcoin client, and you relay, validate, and secure the data within the block chain.
The data is bitcoin transactions and blocks, which is validated across the entire network of users.
FOMO | #FOMO
“Fear of Missing Out.” When a coin starts to moon, dumb money rushes in. “$LGD on a TEAR right now!!! It has major highs right now! Some major #FOMO going on!!! Sell while it’s high. It WILL drop before fight!!!”
FUD
“Fear, Uncertainty, and Doubt.”
Another non-crypto term that describes attempts to scare weak-handed coin-holders into selling their positions, often with rumors of exit scams or hacks; the cheap, dumped coins are then picked up by the FUD-ers.
Fungibility
Fungibility is a good or asset’s interchangeability with other individual goods or assets of the same type.
Assets possessing this fungibility property simplify the exchange and trade processes, as interchangeability assumes everyone values all goods of that class the same.
HODL
HOLD ON FOR DEAR LIFE!
The intentionally misspelled word hodl has its roots in a December 2013 post on the Bitcoin Talk forum, “I AM HODLING”; when the author, GameKyuubi, couldn’t be bothered to fix his typo, the community instantly turned it into a verb: to hodl.
Along with other terms, hodl is an effective litmus test for sussing out newcomers, carpetbaggers, and tourists.
Halving
Bitcoins have a finite supply, which makes them scarce.
The total amount that will ever be issued is 21 million.
The number of bitcoins generated per block is decreased 50% every 210,000 blocks,roughtly four years.
This is called “halving.”
The final halving will take place in the year 2140.
Hash
A cryptographic hash is a mathematical function that takes a file and produces a relative shortcode that can be used to identify that file.
A hash has a couple of key properties:
• It is unique.
Only a particular file can produce a particular hash, and two different files will never produce the same hash.
• It cannot be reversed.
You can’t work out what a file was by looking at its hash.
Hashing is used to prove that a set of data has not been tampered with.
It is what makes bitcoin mining possible.
Hash Rate
The hash rate is how the Bitcoin mining network processing power is measured.
In order for miners to confirm transactions and secure the block chain, the hardware they use must perform intensive computational operations which is output in hashes per second.
Then, try changing just a letter in the input text to see how the resulting hash varies significantly
Hard Fork
A hard fork is when a single cryptocurrency splits in two.
It occurs when a cryptocurrency’s existing code is changed, resulting in both an old and new version.
Meanwhile a soft fork is essentially the same thing, but the idea is that only one blockchain (and thus one coin) will remain valid as users adopt the update.
So both fork types create a split, but a hard fork is meant to create two blockchain/coins and a soft fork is meant to result in one.
Segwit was a soft fork, Bitcoin Cash, Bitcoin Gold, and Segwit2x are all hard forks.
Immutability
In object-oriented and functional programming, an immutable object (unchangeable object) is an object whose state cannot be modified after it is created.
This is in contrast to a mutable object (changeable object), which can be modified after it is created.
Lambo | #Lambo
A running joke among traders, you’re cryptorich when you can buy a Lamborghini; though absurd, it’s not unheard of — when Alexandre Cazes, the suspected founder of a major darknet marketplace, was found hanged in his Bangkok jail cell, Thai media reported that he owned four Lamborghinis.
Mining
Bitcoin mining is the process of using computer hardware to do mathematical calculations for the Bitcoin network in order to confirm transactions.
Miners collect transaction fees for the transactions they confirm and are awarded bitcoins for each block they verify.
Moon | #Moon
A rapid price increase.
Peer-to-Peer
Typically, online applications are provided by a central party that organizes all the transactions.
Your bank runs its own computers, and all the customers log into the bank’s computer to handle their transactions.
If Bob wants to send money to Alice, he asks the bank to do it, and the bank controls everything.
In a peer-to-peer arrangement, technology cuts out the middleman, meaning that people deal directly with each other.
Bob would send the money directly to Alice, and there wouldn’t be any bank involved at all.
Pool
As part of bitcoin mining, mining “pools” are a network of miners that work together to mine a block, then split the block reward among the pool miners.
Mining pools are a good way for miners to combine their resources to increase the probability of mining a block, and also contribute to the overall health and decentralization of the bitcoin network.
Private Key
A private key is a string of data that shows you have access to bitcoins in a specific wallet.
Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.
Proof of Work
Proof of work refers to the hash of a block header (blocks of bitcoin transactions).
A block is considered valid only if its hash is lower than the current target.
Each block refers to a previous block adding to previous proofs of work, which forms a chain of blocks, known as a block chain.
Once a chain is formed, it confirms all previous Bitcoin transactions and secures the network.
Pump
A rapid price increase believed to be the result of market manipulation, a.k.a. pump and dump.
Public Address
A public bitcoin address is cryptographic hash of a public key.
A public address typically starts with the number “1.”
Think of a public address like an email address.
It can be published anywhere and bitcoins can be sent to it, just like an email can be sent to an email address.
Private Key
A private key is a string of data that shows you have access to bitcoins in a specific wallet.
Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.
Rekt | #Rekt
Meaning “wrecked”.
“I never sell because of #FUD, and I never buy because of #FOMO.
That’s the easiest way to get #Rekt”
Sats
Satoshis, currently the smallest unit of a single bitcoin, useful for tracking coin prices. “At the rate $XRP’s moving, I wouldn’t be surprised if it hits 10K sats by the end of the day.”
Security Tokens
A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.
The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob.
Shitcoins
Pejorative term for altcoins, especially low-cap coins, often affectionately used by shitcoin hodlers.
SEGWIT
SegWit is the process by which the block size limit on a blockchain is increased by removing signature data from Bitcoin transactions.
When certain parts of a transaction are removed, this frees up space or capacity to add more transactions to the chain.
Transaction
A transaction is when data is sent to and from one bitcoin address to another.
Just like financial transactions where you send money from one person to another, in bitcoin you do the same thing by sending data (bitcoins) to each other.
Bitcoins have value because it’s based on the properties of mathematics, rather than relying on physical properties (like gold and silver) or trust in central authorities, like fiat currencies.
Wallet
Just like with paper dollars you hold in your physical wallet, a bitcoin wallet is a digital wallet where you can store, send, and receive bitcoins securely.
There are many varieties of wallets available, whether you’re looking for a web or mobile solution.
Ideally, a bitcoin wallet will give you access to your public and private keys.
This means that only you have rightful access to spend these bitcoins, whenever you choose to.
Whale
Anyone who owns 5 percent of any given coin, often used as a boogeyman to explain unwanted price movements.
“Nice support $NEO. Clear whale manipulation.”
Blue Pill vs. Red PillChoose wiselyWhen You’re ready …
How & Why You should Prepare Here are just a few examples of what that sort of total control may look like: Government in total control The government could not only withhold money … Continue reading CBDC’s Tyranny Is Coming→
Here is a list of 100 of the best based things: Trust is not based, and relying on trust is unbased. It is foolish to ever trust someone, because the only way to … Continue reading 100 Based things→
THE CYPHERPUNK MOVEMENT Let’s make a journey back in time to see where blockchain technology and cryptocurrencies came from. It will take us back to the CypherPunk Movement starting in the 1970’s. Cryptography … Continue reading CypherPunk Movement→
The first ever bitcoin transaction from one person to another, on 2009-01-12 at 04:30 used Pay-to-Public-Key (P2PK), when Satoshi Nakamoto sent coins to Hal Finney in Block 170. P2PK is no longer used … Continue reading Block 170 – First ever bitcoin transaction→
The Art of War (Chinese: 孫子兵法; lit. ‘Sun Tzu’s Military Method’, pinyin: Sūnzi bīngfǎ) is an ancient Chinese military treatise dating from the Late Spring and Autumn Period (roughly 5th century BC). The … Continue reading The Art of War Quotes→