Seven common mistakes crypto investors and traders make?


Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.

Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.

Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.

Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.

Losing your keys

Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.

On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.

Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.

Storing coins in online wallets

Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.

There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.

Not keeping a hard copy of your seed phrase

To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.

Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.

Fat-finger error

A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.

One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.

Sending to the wrong address

Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.

This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.

Over diversification

Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.

Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.

Not setting up a stop-loss arrangement

A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.

In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.

That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.

Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.

Source: https://bitcointalk.org/





Seven common mistakes crypto investors and traders make?


Cryptocurrency markets are volatile enough without making simple, easily avoidable mistakes.

Investing in cryptocurrencies and digital assets is now easier than ever before. Online brokers, centralized exchanges and even decentralized exchanges give investors the flexibility to buy and sell tokens without going through a traditional financial institution and the hefty fees and commissions that come along with them.

Cryptocurrencies were designed to operate in a decentralized manner. This means that while they’re an innovative avenue for global peer-to-peer value transfers, there are no trusted authorities involved that can guarantee the security of your assets. Your losses are your responsibility once you take your digital assets into custody.

Here we’ll explore some of the more common mistakes that cryptocurrency investors and traders make and how you can protect yourself from unnecessary losses.

Losing your keys

Cryptocurrencies are built on blockchain technology, a form of distributed ledger technology that offers high levels of security for digital assets without the need for a centralized custodian. However, this puts the onus of protection on asset holders, and storing the cryptographic keys to your digital asset wallet safely is an integral part of this.

On the blockchain, digital transactions are created and signed using private keys, which act as a unique identifier to prevent unauthorized access to your cryptocurrency wallet. Unlike a password or a PIN, you cannot reset or recover your keys if you lose them. This makes it extremely important to keep your keys safe and secure, as losing them would mean losing access to all digital assets stored in that wallet.

Lost keys are among the most common mistakes that crypto investors make. According to a report from Chainalysis, of the 18.5 million Bitcoin (BTC) mined so far, over 20% has been lost to forgotten or misplaced keys.

Storing coins in online wallets

Centralized cryptocurrency exchanges are probably the easiest way for investors to get their hands on some cryptocurrencies. However, these exchanges do not give you access to the wallets holding the tokens, instead offering you a service similar to banks. While the user technically owns the coins stored on the platform, they are still held by the exchange, leaving them vulnerable to attacks on the platform and putting them at risk.

There have been many documented attacks on high-profile cryptocurrency exchanges that have led to millions of dollars worth of cryptocurrency stolen from these platforms. The most secure option to protect your assets against such risk is to store your cryptocurrencies offline, withdrawing assets to either a software or hardware wallet after purchase.

Not keeping a hard copy of your seed phrase

To generate a private key for your crypto wallet, you will be prompted to write down a seed phrase consisting of up to 24 randomly generated words in a specific order. If you ever lose access to your wallet, this seed phrase can be used to generate your private keys and access your cryptocurrencies.

Keeping a hard copy record, such as a printed document or a piece of paper with the seed phrase written on it, can help prevent needless losses from damaged hardware wallets, faulty digital storage systems, and more. Just like losing your private keys, traders have lost many a coin to crashed computers and corrupted hard drives.

Fat-finger error

A fat-finger error is when an investor accidentally enters a trade order that isn’t what they intended. One misplaced zero can lead to significant losses, and mistyping even a single decimal place can have considerable ramifications.

One instance of this fat-finger error was when the DeversiFi platform erroneously paid out a $24-million fee. Another unforgettable tale was when a highly sought-after Bored Ape nonfungible token was accidentally sold for $3,000 instead of $300,000.

Sending to the wrong address

Investors should take extreme care while sending digital assets to another person or wallet, as there is no way to retrieve them if they are sent to the wrong address. This mistake often happens when the sender isn’t paying attention while entering the wallet address. Transactions on the blockchain are irreversible, and unlike a bank, there are no customer support lines to help with the situation.

This kind of error can be fatal to an investment portfolio. Still, in a positive turn of events, Tether, the firm behind the world’s most popular stablecoin, recovered and returned $1 million worth of Tether (USDT) to a group of crypto traders who sent the funds to the wrong decentralized finance platform in 2020. However, this story is a drop in the ocean of examples where things don’t work out so well. Hodlers should be careful while dealing with digital asset transactions and take time to enter the details. Once you make a mistake, there’s no going back.

Over diversification

Diversification is crucial to building a resilient cryptocurrency portfolio, especially with the high volatility levels in the space. However, with the sheer number of options out there and the predominant thirst for outsized gains, cryptocurrency investors often end up over-diversifying their portfolios, which can have immense consequences.

Over-diversification can lead to an investor holding a large number of heavily underperforming assets, leading to significant losses. It’s vital to only diversify into cryptocurrencies where the fundamental value is clear and to have a strong understanding of the different types of assets and how they will likely perform in various market conditions.

Not setting up a stop-loss arrangement

A stop-loss is an order type that enables investors to sell a security only when the market reaches a specific price. Investors use this to prevent losing more money than they are willing to, ensuring they at least make back their initial investment.

In several cases, investors have experienced huge losses because of incorrectly setting up their stop losses before asset prices dropped. However, it’s also important to remember that stop-loss orders aren’t perfect and can sometimes fail to trigger a sale in the event of a large, sudden crash.

That being said, the importance of setting up stop losses to protect investments cannot be understated and can significantly help mitigate losses during a market downturn.

Crypto investing and trading is a risky business with no guarantees of success. Like any other form of trading, patience, caution and understanding can go a long way. Blockchain places the responsibility on the investor, so it’s crucial to take the time to figure out the various aspects of the market and learn from past mistakes before putting your money at risk.

Source: https://bitcointalk.org/





Knowledge is…


Knowledge is Power !!!


WRONG !!!

Knowledge is Power
When Applied !!!


Apollo BTC – A Bitcoin ASIC Miner and Desktop Class Computer running a Full Node

Introducing the FutureBit Apollo BTC

Six CPU Cores. 44 ASIC Cores. 1TB NVMe Based SSD Drive. Quiet. Less than 200 Watts of Power. Made in the USA. This is what the Future of Bitcoin looks like. 

FutureBit Apollo BTC is the world’s first vertically integrated platform bringing the full power of Bitcoin and it’s mining infrastructure in a small, quiet, easy to use desktop device designed for everyday people. 

We have iterated and learned much from our first Apollo product. We realized early on that we focused too much on the mining aspect, and not enough on the software, applications, and services that run Bitcoin. Too many of these services have moved to online centralized websites, and many users have given up on running the core software that powers Bitcoin. 

This must change, as Bitcoin will not continue to be the free, un-censorable, decentralized system it is today if only a few control the mining that powers it, and the nodes that control it. 

At the heart of the new Apollo BTC product is a revamped SBC (Single Board Computer), that is as powerful as any consumer grade desktop system and can run almost any Bitcoin Application natively on the device 24/7. Take it out of the Box, plug it in, power it on, and you are already running a full Bitcoin node without needing to do anything.

Install a wallet of your choice, use any hardware wallet, run BTCPayServer, run a block explorer, run a Lightning Node. All of this is possible with our six core ARM based CPU with 4GB of RAM, and a 1TB NVMe drive that can easily store a FULL non pruned Bitcoin Node. It can power through a Full Node Sync in under 48 hours, which is a record for a device of its class! This is almost an order of magnitude faster than any Raspberry Pi 4 based Node. 

On top of this we have taken our 6 years of experience building ASIC mining devices, and engineered the only American Made TeraHash range Bitcoin mining device that can be silent on your desk, mine Bitcoin in the background 24/7, and only use the power of one light bulb to do it. 

We did this with our optimized PCB design that has carefully placed all 44 hash cores underneath our custom cold-forged aluminum induction heatsink, which draws up to 200 Watts of heat away from the device with our new nearly silent 25mm fan. This results in the Apollo BTC in Turbo Mode being just as quiet as the Apollo LTC in Eco Mode!

Like our previous products, we are super proud that we can continue manufacturing the Apollo BTC in the USA, and are now the only USA based company that delivers Bitcoin ASIC products with a supply chain whole owned in the western hemisphere (no more reliance on Chinese based ASICS, and their willingness to only sell to large farms and the highest bidder). 

OPTIONS

Full Apollo Package: This is our Full Package option that comes with everything you need in the box. The Apollo BTC Unit with our latest controller built in, and our 200W Power supply with power cable. 

Full Apollo Package NO Power Supply: We are also offering the Full Package with no power supply for people that want the plug-n-play experience but have spare 12v ATX power supply. 

Standard: This option is ONLY the Apollo ASIC Miner, with no controller or power supply. Our new hashboard has a micro USB port, and can be used as a USB device. The Full Apollo Node can control multiple standard units through its USB ports. We wanted to give our customers an option to expand their hash power in a cost effective way. If you already have a Raspberry Pi, or Linux/Windows Desktop Computer and a power supply with two PCIE power ports you can also control our Standard unit in this way with our stand alone miner software (please note this setup will be for more advanced users, and the software will be command line based on launch). 

Standard + Power Supply: Same as our Standard unit above, but comes with our 200W Power supply. This is a plug and play solution if you already have a Full Apollo Package. Take it out of the box, plug in the power supply, plug in the micro USB cable to the back of your Full Apollo BTC and it will automatically recognize the second hashboard and start mining! 

  • Compact All-In-One Desktop Bitcoin System (4x6x4in) that mines Bitcoin and any SHA256 based crypto (Bitcoin Cash etc). 
  • Powerful 6 ARM Core CPU with 4GB of LPDDR4 RAM and 1TB NVMe SSD (NOT included in the Standard or Standard + package). 
  • Comes Pre-Installed with a Bitcoin node, and you can install almost any Bitcoin Application
  • Very wide range of operation modes with preset ECO (quiet) mode, BALANCED, and TURBO mode. 
  • 2-3.8 TH/s of SHA256 performance per miner (+/- 5%)
  • 125 Watts in ECO mode, and 200 Watts in TURBO * +/- 10%
  • Can be used as a full Desktop computer with a monitor keyboard and mouse (not included), or through our Web UI
  • Connect almost any peripheral with our USB 3.0 ports, USB C port, HDMI, AC Wifi, and Bluetooth 
  • Clocks and Power is fully customizable by user with easy to use interface
  • Hashboard now monitors both voltage and power draw for accurate measurements*
  • Custom designed cold forged hexagonal pin heatsink with leading thermal performance for the quietest ASIC miner in operation!
  • 1k-5k RPM Quiet Dual Ball Bearing Fan with automatic thermal management with onboard temperature sensor
  • Controlled via local connection on a web browser similar to antminers. You can simply set it up via smartphone browser. No crazy driver installs, hard to use miner software or scripts needed.
  • Two Six Pin PCIE power connectors for wide-range of power draw
  • Custom Designed all Aluminum case
  • Ships with our own custom built 200W 94% efficient PSU and is ready to run out of the box! (Does NOT come with Standard package). 

 Requirements:

  • Router with an Ethernet cable for initial setup OR Monitor with keyboard and mouse
  • At least a 250 watt 12v power supply with two 6 Pin PCIE connector is required (unless you order our packages that come with our power supply). This is the same connector used by all modern GPUs. Please note even standard units NEED a power supply, they cant be powered through the USB port on the full package unit. 

As I am the owner of two of these beauties, that I have on my office as you saw in the photo above, I took the liberty to make Free-Publicity for the FutureBit Apollo Btc Miner.


Kudos to jstefanop


Source:

https://www.futurebit.io/





With 💚

Bitcoin surges after accidentally released Treasury statement


Bitcoin surges after accidentally released Treasury statement



Prices of Bitcoin and other cryptocurrencies have soared following the apparent accidental release of a U.S. Treasury statement on Biden’s expected executive order on digital assets.

The premature statement by Treasury Secretary Yellen, which was dated March 9, has since been removed.

“President Biden’s historic executive order calls for a coordinated and comprehensive approach to digital asset policy.  This approach will support responsible innovation that could result in substantial benefits for the nation, consumers, and businesses. 

It will also address risks related to illicit finance, protecting consumers and investors, and preventing threats to the financial system and broader economy.”

Quote from the now deleted statement

At the time of writing, Bitcoin is up nearly 8% in the last 24 hours.

Biden’s executive order aims to regulate the crypto market while also reaping the benefits of digital currencies.

So far, like most countries in the world, the US has tended to react to developments and has limited itself to pointing to a political-economic approach that is yet to be developed.


Statement by Secretary of the Treasury Janet L. Yellen on President Biden’s Executive Order on Digital Assets


March 9, 2022

WASHINGTON –  U.S. Secretary of the Treasury Janet L. Yellen released the following statement on President Biden’s executive order on digital assets. 

“President Biden’s historic executive order calls for a coordinated and comprehensive approach to digital asset policy.  This approach will support responsible innovation that could result in substantial benefits for the nation, consumers, and businesses.  It will also address risks related to illicit finance, protecting consumers and investors, and preventing threats to the financial system and broader economy.

Under the executive order, Treasury will partner with interagency colleagues to produce a report on the future of money and payment systems. We’ll also convene the Financial Stability Oversight Council to evaluate the potential financial stability risks of digital assets and assess whether appropriate safeguards are in place. And, because the questions raised by digital assets often have important cross-border dimensions, we’ll work with our international partners to promote robust standards and a level playing field.

This work will complement ongoing efforts by Treasury. Already, the Department has worked with the President’s Working Group on Financial Markets, the FDIC, and OCC to study one particular kind of digital asset – stablecoins– and to make recommendations. Under the executive order, Treasury and interagency partners will build upon the recently published National Risk Assessments, which identify key illicit financing risks associated with digital assets. 

As we take on this important work, we’ll be guided by consumer and investor protection groups, market participants, and other leading experts.  Treasury will work to promote a fairer, more inclusive, and more efficient financial system, while building on our ongoing work to counter illicit finance, and prevent risks to financial stability and national security.”


Sources:

https://forbes.com/

https://disclose.tv/

https://bloomberg.com/

https://web.archive.org/web/20220309014601/https://home.treasury.gov/news/press-releases/jy0643




With 💚

ASICs vs. SuperComputers

Asics
SuperComputers

ASICs vs Supercomputers


Assigning the most powerful supercomputer to mine bitcoin would be comparable to hiring a grandmaster chess player to move a pile of bricks by hand.

The job would get done eventually but the chess player is much better at thinking and playing chess than exerting energy to repetitively move bricks. 

Likewise, combining the computing power of the most powerful supercomputers in the world and using them to mine bitcoin would essentially be pointless when compared to the ASIC machines used today.

ASICs are designed to do one thing as quickly and efficiently as possible, whereas a supercomputer is designed to do complicated tasks or math problems.

Since Bitcoin mining is a lottery based on random trial and error rather than complex math, specialization (ASICs) beats general excellence (supercomputers) everytime.


End of Lesson !!!



Made with 💚 by Free Spirit

✌ & 💚



With 💚

Welcome…

To the rabbit hole…



Why this crazyness with rabbits ?!? And their holes, you would ask ?!? Why is the rabbit hole so deep ?¿

And what does the rabbit hole has to do with that BitCorn thing  I keep hearing about all over the place ?¿

I like to start from the begining, as I think so I am 😋😂


Rabbit Hole is a play written by David Lindsay-Abaire. It was the recipient of the 2007 Pulitzer Prize for Drama. The play premiered on Broadway in 2006, and it has also been produced by regional theatres in cities such as Los Angeles, Philadelphia and Pittsburgh. The play had its Spanish language premiere in San Juan, Puerto Rico in Autumn of 2010.

The play deals with the ways family members survive a major loss, and includes comedy as well as tragedy. Cynthia Nixon won the 2006 Tony Award for Best Performance by a Leading Actress in a Play for her performance as Becca in the New York production, and the play was nominated for several other Tony awards.


Rabbit Hole


A situation, journey, or process that is particularly strange, problematic, difficult, complex, or chaotic, especially one that becomes increasingly so as it develops or unfolds.

An allusion to “Alice’s Adventures in Wonderland” by Lewis Carroll, it is used especially in the phrase “(go) down the rabbit hole.”

Overhauling the current tax legislation is a rabbit hole I don’t think this administration should go down at this point.I’ve stayed away from drugs and alcohol since coming to college. I have an addictive personality, so I decided to just avoid that rabbit hole altogether.


What does rabbit hole mean?

Used especially in the phrase going down the rabbit hole or falling down the rabbit hole, a rabbit hole is a metaphor for something that transports someone into a wonderfully (or troublingly) surreal state or situation.

On the internet, a rabbit hole frequently refers to an extremely engrossing and time-consuming topic.


Where does rabbit hole come from?


Alice falling down a hole with a jar in hand
Alice’s Adventures in WonderLand

Literally, a rabbit hole is what the animal digs for its home. The earliest written record of the phrase dates back to the 17th century. But the figurative rabbit hole begins with Lewis Carroll’s 1865 classic, Alice’s Adventures in Wonderland.

In its opening chapter, “Down the Rabbit-Hole,” Alice follows the White Rabbit into his burrow, which transports her to the strange, surreal, and nonsensical world of Wonderland.

Since then, Carroll’s rabbit hole has proved a popular and useful reference. The Oxford English Dictionary finds the first allusive rabbit hole in a 1938 edition of The Yale Law Journal: “It is the Rabbit-Hole down which we fell into the Law, and to him who has gone down it, no queer performance is strange.”

Over much of the 20th century, rabbit hole has been used to characterize bizarre and irrational experiences. It’s especially used to reference magical, challenging, and even dangerous places or positions, similar to Carroll’s topsy-turvy Wonderland.

Rabbit hole has many metaphorical applications—from frustrating red tape to the mind-bending complexity of science to hallucinations during altered states—all united by a common sense of passing into some labyrinthine, logic-defying realm that, once entered, is hard to get out of.

One can fall down the rabbit hole of government bureaucracy, healthcare, obtaining a green card, tax law, the political economy of modern Japan, puberty, college admissions, or quantum mechanics.

If you’re Neo in the hit film The Matrix, you can take the red pill—a pill that shows you the truth, as opposed to the blue pill, which keeps you in ignorance—and “see how deep the rabbit hole goes.”

In a related note, some people literally take pills and go down the rabbit hole of a psychedelic drug trip.

But as Kathryn Schulz observed for The New Yorker in 2015, rabbit hole has further evolved in the information age: “These days…when we say that we fell down the rabbit hole, we seldom mean that we wound up somewhere psychedelically strange. We mean that we got interested in something to the point of distraction—usually by accident, and usually to a degree that the subject in question might not seem to merit.”

Thanks to the abundance, variety, and instant access of content online, many fall down internet rabbit holes which are often spectacularly, and addictively, niche: scary stories, obscure conspiracy theories, or famous last meals, for instance.

Other rabbit holes tend to be opened up by specific services or social media, which serve users item after item, link after link: Wikipedia, Netflix, Amazon, Facebook, YouTube, and so forth.

These rabbit holes have become so common that people sometimes swap out rabbit for the name of the particular site, e.g. “I’ve fallen down an Instragram hole or “I’m falling down a wikihole.”


Who uses rabbit hole?


From formal documents to internet status updates, rabbit hole is a very popular and widespread expression. Unlike earlier iterations of the metaphor, internet rabbit holes convey less a sense of weirdness, disorientation, or difficulty than they do of an intensely captivating diversion.

Rabbit hole is also showing increasing use as a modifier, e.g. a rabbit-hole question or phenomenon.


Now… that we have a basic and broader understanding about this Hole and it’s rabbit that digged it 😋😂

Let me show you a journey that I took to get to know, understand, admire, be amazed and support the BitCorn everybody is so crazy about …


Bitcoin Glossary


Block

Blocks are found in the Bitcoin blockchain. Blocks connect all transactions together. Transactions are combined into single blocks and are verified every ten minutes through mining. Each subsequent block strengthens the verification of the previous blocks, making it impossible to double spend bitcoin transactions (see double spend below).

BIP

Bitcoin Improvement Proposal or BIP, is a technical design document providing information to the bitcoin community, or describing a new feature for bitcoin or its processes or environment which affect the Bitcoin protocol. New features, suggestions, and design changes to the protocol should be submitted as a BIP. The BIP author is responsible for building consensus within the community and documenting dissenting opinions.

Blockchain

The Bitcoin blockchain is a public record of all Bitcoin transactions. You might also hear the term used as a “public ledger.” The blockchain shows every single record of bitcoin transactions in order, dating back to the very first one. The entire blockchain can be downloaded and openly reviewed by anyone, or you can use a block explorer to review the blockchain online.

Block Height

The block height is just the number of blocks connected together in the block chain. Height 0 for example refers to the very first block, called the “genesis block.”

Block Reward

When a block is successfully mined on the bitcoin network, there is a block reward that helps incentivize miners to secure the network. The block reward is part of a “coinbase” transaction which may also include transaction fees. The block rewards halves roughly every four years; see also “halving.”

Change

Let’s say you are spending $1.90 in your local supermarket, and you give the cashier $2.00. You will get back .10 cents in change. The same logic applies to bitcoin transactions. Bitcoin transactions are made up of inputs and outputs. When you send bitcoins, you can only send them in a whole “output.” The change is then sent back to the sender.

Cold Storage

The term cold storage is a general term for different ways of securing your bitcoins offline (disconnected from the internet). This would be the opposite of a hot wallet or hosted wallet, which is connected to the web for day-to-day transactions. The purpose of using cold storage is to minimize the chances of your bitcoins being stolen from a malicious hacker and is commonly used for larger sums of bitcoins.

Confirmation

A confirmation means that the bitcoin transaction has been verified by the network, through the process known as mining. Once a transaction is confirmed, it cannot be reversed or double spent. Transactions are included in blocks.

Cryptography

Cryptography is used in multiple places to provide security for the Bitcoin network. Cryptography, which is essentially mathematical and computer science algorithms used to encrypt and decrypt information, is used in bitcoin addresses, hash functions, and the blockchain.

Decentralized

Having a decentralized bitcoin network is a critical aspect. The network is “decentralized,” meaning that it’s void of a centralized company or entity that governs the network. Bitcoin is a peer-to-peer protocol, where all users within the network work and communicate directly with each other, instead of having their funds handled by a middleman, such as a bank or credit card company.

Difficulty

Difficulty is directly related to Bitcoin mining (see mining below), and how hard it is to verify blocks in the Bitcoin network. Bitcoin adjusts the mining difficulty of verifying blocks every 2016 blocks. Difficulty is automatically adjusted to keep block verification times at ten minutes.

Double Spend

If someone tries to send a bitcoin transaction to two different recipients at the same time, this is double spending. Once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. The more confirmations that a transaction has, the harder it is to double spend the bitcoins.

Full Node

A full node is when you download the entire blockchain using a bitcoin client, and you relay, validate, and secure the data within the blockchain. The data is bitcoin transactions and blocks, which is validated across the entire network of users.

Halving

Bitcoins have a finite supply, which makes them scarce. The total amount that will ever be issued is 21 million. The number of bitcoins generated per block is decreased 50% every four years. This is called “halving.” The final halving will take place in the year 2140.

Hash Rate

The hash rate is how the Bitcoin mining network processing power is measured. In order for miners to confirm transactions and secure the blockchain, the hardware they use must perform intensive computational operations which is output in hashes per second.

Hash (txid)

A transaction hash (sometimes referred to as a transaction ID or txid) is a unique identifier that can be used on any block explorer to look up all of the public details of a particular transaction. Every on-chain transaction has a unique hash made up of a long string of alphanumeric characters.

Mining

Bitcoin mining is the process of using computer hardware to do mathematical calculations for the Bitcoin network in order to confirm transactions. Miners collect transaction fees for the transactions they confirm and are awarded bitcoins for each block they verify.

Pool

As part of bitcoin mining, mining “pools” are a network of miners that work together to mine a block, then split the block reward among the pool miners. Mining pools are a good way for miners to combine their resources to increase the probability of mining a block, and also contribute to the overall health and decentralization of the bitcoin network.

Private Key

A private key is a string of data that shows you have access to bitcoins in a specific wallet. Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.

Proof of Work

Proof of work refers to the hash of a block header (blocks of bitcoin transactions). A block is considered valid only if its hash is lower than the current target. Each block refers to a previous block adding to previous proofs of work, which forms a chain of blocks, known as a blockchain. Once a chain is formed, it confirms all previous Bitcoin transactions and secures the network.

Public Address

A public bitcoin address is cryptographic hash of a public key. A public address typically starts with the number “1.” Think of a public address like an email address. It can be published anywhere and bitcoins can be sent to it, just like an email can be sent to an email address.

RBF

RBF stands for Replace By Fee, and refers to a method that allows a sender to replace a “stuck” or unconfirmed transaction with a new one that uses a higher fee. This is done to make sure a transaction confirms as quickly as possible. The “replacement” transaction uses the same inputs as the original one. This is not considered a double spend, as the receiving address(es) typically remain the same.

Satoshi Nakamoto

Bitcoin’s existence began with an academic paper written in 2008 by a developer under the name of Satoshi Nakamoto. Satoshi is the name used as the original inventor of Bitcoin.

Transaction

A transaction is when data is sent to and from one bitcoin address to another. Just like financial transactions where you send money from one person to another, in bitcoin you do the same thing by sending data (bitcoins) to each other. Bitcoins have value because it’s based on the properties of mathematics, rather than relying on physical properties (like gold and silver) or trust in central authorities, like fiat currencies. 

Wallet

Just like with paper dollars you hold in your physical wallet, a bitcoin wallet is a digital wallet where you can store, send, and receive bitcoins securely. There are many varieties of wallets available, whether you’re looking for a web or mobile solution. Ideally, a bitcoin wallet will give you access to your public and private keys. This means that only you have rightful access to spend these bitcoins, whenever you choose to.


Sources:

https://dictionary.com/

https://wikipedia.com/

https://blockchain.com/

Digital Art by Free Spirit

Made with 💚 by Free Spirit

✌ & 💚



With 💚

P.O.W In Human History


Proof Of Work

in the

History of Humankind


Great Pyramid of Giza (a.k.a)
Pyramid of Khu
Egypt

The Great Pyramid of Giza (also known as the Pyramid of Khufu or the Pyramid of Cheops) is the oldest and largest of the  pyramids in the Giza pyramid complex  bordering present-day Giza  in Greater Cairo, Egypt.

It is the oldest of the Seven Wonders of the Ancient World, and the only one to remain largely intact.

Egyptologists conclude that the pyramid was built as a tomb for the Fourth Dynasty  Egyptian pharaoh Khufu and estimate that it was built in the 26th century BC during a period of around 27 years.

Initially standing at 146.5 metres (481 feet), the Great Pyramid was the tallest man-made structure in the world for more than 3,800 years.

Over time, most of the smooth white limestone casing was removed, which lowered the pyramid’s height to the present 138.5 metres (454.4 ft).

What is seen today is the underlying core structure. The base was measured to be about 230.3 metres (755.6 ft) square, giving a volume of roughly 2.6 million cubic metres (92 million cubic feet), which includes an internal hillock.

The dimensions of the pyramid were 280 royal cubits (146.7 m; 481.4 ft) high, a base length of 440 cubits (230.6 m; 756.4 ft), with a seked of 5+1/2 palms (a slope of 51°50’40”).

The Great Pyramid was built by quarrying an estimated 2.3 million large blocks weighing 6 million tonnes total.

The majority of stones are not uniform in size or shape and are only roughly dressed.The outside layers were bound together by mortar.

Primarily local limestone from the Giza Plateau was used. Other blocks were imported by boat down the Nile: White limestone from Tura for the casing, and granite blocks from Aswan, weighing up to 80 tonnes, for the King’s Chamber structure.

There are three known chambers inside the Great Pyramid. The lowest was cut into the bedrock, upon which the pyramid was built, but remained unfinished. The so-called Queen’s Chamber and King’s Chamber, that contains a granite sarcophagus, are higher up, within the pyramid structure. Khufu’s vizier, Hemiunu (also called Hemon), is believed by some to be the architect of the Great Pyramid.

Many varying scientific and alternative hypotheses attempt to explain the exact construction techniques.

The funerary complex around the pyramid consisted of two mortuary temples  connected by a causeway (one close to the pyramid and one near the Nile), tombs for the immediate family and court of Khufu, including three smaller pyramids for Khufu’s wives, an even smaller “satellite pyramid” and five buried solar barges.


Flavian Amphitheatre
a.k.a Colloseum
Rome – Italy

The Colosseum (Colosseo[kolosˈsɛːo]) is an oval amphitheatre in the centre of the city of Rome, Italy, just east of the Roman Forum.

It is the largest ancient amphitheatre ever built, and is still the largest standing amphitheatre in the world today, despite its age.

Construction began under the emperor Vespasian (r. 69–79 AD) in 72 and was completed in 80 AD under his successor and heir, Titus (r. 79–81).

Further modifications were made during the reign of Domitian (r. 81–96).

The three emperors that were patrons of the work are known as the Flavian dynasty, and the amphitheatre was named the Flavian Amphitheatre (Latin: Amphitheatrum Flavium; Italian: Anfiteatro Flavio[aɱfiteˈaːtro ˈflaːvjo]) by later classicists and  archaeologists for its association with their family name (Flavius).

The Colosseum is built of travertine limestone, tuff (volcanic rock), and brick-faced concrete.

The Colosseum could hold an estimated 50,000 to 80,000 spectators at various points in its history  having an average audience of some 65,000; it was used for gladiatorial  contests and  public spectacles including  animal hunts, executions, re-enactments of famous battles, and dramas based on Roman mythology, and briefly mock sea battles.

The building ceased to be used for entertainment in the early medieval era.

It was later reused for such purposes as housing, workshops, quarters for a religious order, a fortress, a quarry, and a Christian shrine.

Although substantially ruined because of earthquakes and stone-robbers (for spolia), the Colosseum is still an iconic symbol of Imperial Rome and was listed as one of the New 7 Wonders of the World.

It is one of Rome’s most popular tourist attractions and also has links to the Roman Catholic Church, as each Good Friday  the Pope leads a torchlit “Way of the Cross” procession that starts in the area around the Colosseum.

The Colosseum is also depicted on the Italian version of the five-cent euro coin.


The Ming dynasty
Great Wall
at Jinshanling

The Great Wall of China (traditional Chinese: 萬里長城; simplified Chinese: 万里长城; pinyinWànlǐ Chángchéng) is a series of fortifications that were built across the historical northern borders of ancient Chinese states and Imperial China as protection against various nomadic groups from the Eurasian Steppe.

Several walls were built from as early as the 7th century BC,with selective stretches later joined together by Qin Shi Huang  (220–206 BC), the first emperor of China.

Little of the Qin wall remains. Later on, many successive dynasties built and maintained multiple stretches of border walls. The best-known sections of the wall were built by the Ming dynasty (1368–1644).

Apart from defense, other purposes of the Great Wall have included border controls, allowing the imposition of duties on goods transported along the Silk Road, regulation or encouragement of trade and the control of immigration and emigration.

Furthermore, the defensive characteristics of the Great Wall were enhanced by the construction of watchtowers, troop barracks, garrison stations, signaling capabilities through the means of smoke or fire, and the fact that the path of the Great Wall also served as a transportation corridor.

The frontier walls built by different dynasties have multiple courses. Collectively, they stretch from Liaodong in the east to Lop Lake in the west, from the present-day Sino–Russian border in the north to Tao River (Taohe) in the south; along an arc that roughly delineates the edge of the Mongolian steppe; spanning 21,196.18 km (13,170.70 mi) in total.

Today, the defensive system of the Great Wall is generally recognized as one of the most impressive architectural feats in history.


As history has left behind, monumental architectural constructions that we can admire and reamain in awe as we look at them, after thousands of years since the first stone was put, in today’s world our digital PoW can be seen and admired the same as the Great Wall of China or the Piramid of Giza !!!

Wich brings us to the question, what is Free talking about ?!?


Long Live the CypherPunks

CypherPunks Write Code

Genesis

Bitcoin Genesis Block
Mined 03 January 2009

The Times
January 3, 2009

Bitcoin – Proof Of Work


Bitcoin-type Proof Of Work


In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work digital currency that, like Finney’s RPoW, is also based on the Hashcash PoW.

But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW.

Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are “mined” using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network.

The difficulty is periodically adjusted to keep the block time around a target time.

Since the creation of Bitcoin, proof-of-work has been the predominant design of peer-to-peer cryptocurrency. Studies have estimated the total energy consumption of cryptocurrency mining.

The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. Recent estimates from the University of Cambridge put Bitcoin’s energy consumption as equal to that of Switzerland.

History modification

Each block that is added to the blockchain, starting with the block containing a given transaction, is called a confirmation of that transaction.

Ideally, merchants and services that receive payment in the cryptocurrency should wait for at least one confirmation to be distributed over the network, before assuming that the payment was done.

The more confirmations that the merchant waits for, the more difficult it is for an attacker to successfully reverse the transaction in a blockchain—unless the attacker controls more than half the total network power, in which case it is called a 51% attack.

2ASICs and mining pools

Within the Bitcoin community there are groups working together in mining pools.

Some miners use application-specific integrated circuits (ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.

Some PoWs claim to be ASIC-resistant,  i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude.

ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a 51% attack against a cryptocurrency.


Plant the Seed
The choice is Yours

Choose Wisely
The Choice is Yours




With 💚


Bitcoin Mining – Where the Profitable Future Lies



The Times – January 3, 2009

Bitcoin Genesis Block
Mined 03 January 2009

Cypherpunks Write Code

CODE IS LAW
THE SOONER HUMANKIND ACCEPTS IT,
THE SOONER IT CAN BUILD AROUND IT

Yeah.. I wonder Why 😂


Bitcoin made easy

How a Bitcoin transaction works

A humble Miner


How Bitcoin Mining Works

Mining Difficulty

Bitcoin Halving

Bitcoin Previous Halvings

Pools

Bitcoin Wallets

Bitcoin Stakeholders

Bitcoin Facts

Power to the People

Totalitarian Governments can kiss my 256-bit key

Bitcoin – People’s Money

Bitcoin cannot be Shut Down


The power of the long tail…



Central Bank’s 3 Strategies

F**k them, Enough !!!



Upcoming Smart Contracts Networks

Bitcoin Yearly Candles

Bitcoin Price History – Log Scale

Bitcoin Mining Ecosystem Map

Defi Ecosystem in Ethereum

DeFi Stack: Product& Application View

Syscoin Ecosystem


Syscoin

BSC Ecosystem

Popular Cryptocurrency

Crpto Ecosystem

Public Companies that own Bitcoin

Top Banks investing in Crypto

Bitcoin Inflation vs. Time

When you’re Ready…



Choose Wisely

Make bitcoin thrive, let fiat become humus…



Veritas non Auctoritas
Facit Legem

Most people misunderstand what bitcoin miners actually do, and as a result they don’t fully grasp the level of security provided by bitcoin’s hashrate.

In this article, we’ll explain proof of work in a non-technical way so that you’ll be able to counter the misinformation about supercomputers and quantum computers attacking the Bitcoin network in the future. 

Simply put, mining is a lottery to create new blocks in the Bitcoin blockchain. There are two main purposes for mining:

  1. To permanently add transactions to the blockchain without the permission of any entity.
  2. To fairly distribute the 21 million bitcoin supply by rewarding new coins to miners who spend real world resources (i.e. electricity) to secure the network.

To understand what is actually happening in this lottery system, let’s look at a simple analogy where every Bitcoin hash is equivalent to a dice roll.


Luck, Gambling, and SHA-256


Imagine that miners in the Bitcoin Network are all individuals gambling at a casino. In this example, each of these gamblers have a 1000 sided dice. They roll their die as quickly as possible, trying to get a number less than 10. Statistically, this may take a very long time, but as more gamblers join the game, the time it takes to hit a number less than 10 gets reduced. In short, more gamblers equals quicker rounds.

Once somebody successfully rolls a number less than 10, all gamblers at the table can look down and verify the number. This lucky gambler takes the prize money and the next round begins.

Ultimately, the process of mining bitcoin is very similar. All miners on the network are using Application Specific Integrated Circuits (ASICs), which are specialized computers designed to compute hashes as quickly as possible.

To “compute a hash” simply means plugging any random input into a mathematical function and producing an output.

More hashes per second (i.e. higher hashrate) is equivalent to more dice rolls per second, and thus a greater probability of success.

Miners propose a potential Bitcoin block of transactions, and use this for an input. The block is plugged into the SHA256 hash function which yields a fixed-sized output, known as a hash. A single hash can be computed in less than a millisecond, as it involves no complex math.

If the hash value is lower than the Bitcoin Network difficulty, then the miner who proposed the block wins. If not, then the miner continues trying by computing more hashes.

The successful miner’s block is then added to the blockchain, the miner is rewarded with newly issued bitcoin for their work, and the “next round” begins.


Sources :

https://wikipedia.com/

https://braiins.com/

https://blockdata.com/

https://coin98analytics.com/

https://scoopwhoop.com/

https://stakingrewards.com/

https://syscoin.org/

https://galaxydigitalresearch.com/

https://surveycrest.com/

The Times

The Economist

"Internet of Money" - Andreas Antonopoulus

Hal Finney Quotes

Timothy C. May Quote

Free Spirit Digital Art

!°! If I forgot someone, sorry ! Do tell and I'll add you as a source of inspiration on the list !!! Thanks for understanding !!!


Questions, opinions, critics and requests always welcomed and as time allows will be accomodated !!! 🤓 🙂 😉


Did you find this article helpful?

If so, please consider a donation to help the evolution and development of more helpful articles in the future, and show your support for alternative articles.

Your generosity is 💚 ly appreciated

You can donate in any crypto your 💚 desires 😊

Thank you all for your time !!!

✌ & 💚


Bitcoin (BTC) :

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


LiteCoin(LTC) :

LYAdiSpsTJ36EWCJ5HF9EGy9iWGCwoLhed


Ethereum(ETH) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


EthereumClassic(ETC) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


Cardano(ADA) :

addr1q88c5cccnrqy6xesszzvf7rd4tcz87klt0m0h6uvltywqe8txwmsrrqdnpq27594tyn9vz59zv0n8367lvyc2atvrzvqlvdm9d


BinanceCoin(BNB) :

bnb1wwfnkzs34knsrv2g026t458l0mwp5a3tykeylx


BitcoinCash (BCH)

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


Bitcoin SV (BSV)

1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ


ZCash(ZEC) :

t1fSSQX4gEhove9ngcvFafQaMPq5dtNNsNF


Dash(DASH) :

XcWmbFw1VmxEPxvF9CWdjzKXwPyDTrbMwj


Shiba(SHIB) :

0x602e8Ca3984943cef57850BBD58b5D0A6677D856


Tron(TRX) :

TCsJJkqt9xk1QZWQ8HqZHnqexR15TEowk8


Stellar(XLM) :

GBL4UKPHP2SXZ6Y3PRF3VRI5TLBL6XFUABZCZC7S7KWNSBKCIBGQ2Y54


A world where anything is possible…
The choice is yours People !!!


With 💚

The other 6 Billion

Bitcoin – Power to the People by BitHouse-Co

Redbubble Shop BitHouse

For the first time in human history there is at the disposal of the masses a tool that eliminates the middlemen and takes trust from the hands of humans and beautifully makes it a mathematics code that cannot be breaken, hacked or tricked…

https://www.redbubble.com/shop/ap/99847715?asc=u

Made with 💚 by Free Spirit

✌ & 💚

BitHouse with 💚

Crypto Terminology

Crypto Terminology


Glossary of Terms


Bags

Cryptoassets being held, generally as longer-term plays; sometimes used self-deprecatingly for soft or losing positions one should close, but can’t for whatever reason. “Too bad none of my alt bags saw the moon that I did today. #cryptoeclipse”

Bitcoin Maximalists

The truest believers in bitcoin’s original mission and design, often paired with a disdain for altcoins.

Block

Blocks are found in the Bitcoin block chain. Blocks connect all transactions together.

Transactions are combined into single blocks and are verified every ten minutes through mining.

Each subsequent block strengthens the verification of the previous blocks, making it impossible to double spend bitcoin transactions (see double spend below).

BIP

Bitcoin Improvement Proposal or BIP, is a technical design document providing information to the bitcoin community, or describing a new feature for bitcoin or its processes or environment which affect the Bitcoin protocol.

New features, suggestions, and design changes to the protocol should be submitted as a BIP.

The BIP author is responsible for building consensus within the community and documenting dissenting opinions.

Black Swans

A black swan is an event or occurrence that deviates beyond what is normally expected of a situation and is extremely difficult to predict.

Black swan events are typically random and unexpected.

The term was popularized by Nassim Nicholas Taleb, a finance professor, writer, and former Wall Street trader.

Block Chain

The Bitcoin block chain is a public record of all Bitcoin transactions. You might also hear the term used as a “public ledger”.

The block chain shows every single record of bitcoin transactions in order, dating back to the very first one.

The entire block chain can be downloaded and openly reviewed by anyone, or you can use a block explorer to review the block chain online.

Block Height

The block height is just the number of blocks connected together in the block chain. Height 0 for example refers to the very first block, called the “genesis block”.

Block Reward

When a block is successfully mined on the bitcoin network, there is a block reward that helps incentivize miners to secure the network.

The block reward is part of a “coinbase” transaction which may also include transaction fees.

The block rewards halves roughly every four years; see also “halving”.

BTFD | #BTFD

“Buy the Fucking Dip” Advice to other traders to pick up a coin that’s presumably hit its bottom.

“$GNT Golem making moves. Underpriced @ 7.5K If U are buying GNT under 10K still a good price 3 X LETS GO $ETH #CRYPTO #trading #BTFD”

Change

Let’s say you are spending $9.90 in your local supermarket, and you give the cashier $10.00. You will get back .10 cents in change.

The same logic applies to bitcoin transactions.

Bitcoin transactions are made up of inputs and outputs.

When you send bitcoins, you can only send them in a whole “output”.

The change is then sent back to the sender.

Cold Storage

The term cold storage is a general term for different ways of securing cryptocurrency offline (disconnected from the internet).

This would be the opposite of a hot wallet or hosted wallet, which is connected to the web for day-to-day transactions.

The purpose of using cold storage is to minimize the chances of your bitcoins being stolen from a malicious hacker and is commonly used for larger sums of bitcoins.

Cold Wallet and Hot Wallet

Cold storage is an offline wallet provided for storing cryptocurrency.

With cold storage, the digital wallet is stored on a platform that is not connected to the internet, thereby, protecting the wallet from unauthorized access, cyber hacks, and other vulnerabilities that a system connected to the internet is susceptible to.

Confirmation

A confirmation means that the bitcoin transaction has been verified by the network, through the process known as mining.

Once a transaction is confirmed, it cannot be reversed or double spent.

Transactions are included in blocks.

Cryptocurrency

Cryptocurrency is the broad name for digital currencies that use blockchain technology to work on a peer-to-peer basis.

Cryptocurrencies don’t need a bank to carry out transactions between individuals.

The nature of the blockchain means that individuals can transact with each other, even if they don’t trust each other.

The cryptocurrency network keeps track of all the transactions and ensures that no one tries to renege on a transaction.

Cryptocurrency 2.0

Also known as a decentralized app,(Dapp) a cryptocurrency 2.0 project uses the blockchain for something other than simply creating and sending money.

They typically involve decentralized versions of online services that were previously operated by a trusted third party.

Cryptography

Cryptography is used in multiple places to provide security for the Bitcoin network.

Cryptography, which is essentially mathematical and computer science algorithms used to encrypt and decrypt information, is used in bitcoin addresses, hash functions, and the block chain.

Cypherpunk

1. A person with an interest in encryption and privacy, especially one who uses encrypted email.

2. Cypherpunk, a term that appeared in Eric Hughes’ “A Cypherpunk’s Manifesto” in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong  encryption ( ciphertext is encrypted text) to preserve privacy.

Cypherpunk advocates believe that the use of strong encryption algorithms will enable individuals to have safely private transactions.

They oppose any kind of government regulation of cryptography.

They admit the likelihood that criminals and terrorists will exploit the use of strong encryption systems, but accept the risk as the price to be paid for the individual’s right to privacy.

Dark Web

The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.

The Dark Web poses new and formidable challenges for law enforcement agencies around the world.

Decentralized

Having a decentralized bitcoin network is a critical aspect.

The network is “decentralized”, meaning that it’s void of a centralized company or entity that governs the network.

Bitcoin is a peer-to-peer protocol, where all users within the network work and communicate directly with each other, instead of having their funds handled by a middleman, such as a bank or credit card company.

Difficulty

Difficulty is directly related to Bitcoin mining (see mining below), and how hard it is to verify blocks in the Bitcoin network.

Bitcoin adjusts the mining difficulty of verifying blocks every 2016 blocks.

Difficulty is automatically adjusted to keep block verification times at ten minutes.

Dogecoin

Dogecoin is an altcoin that first started as a joke in late 2013. Dogecoin, which features a Japanese fighting dog as its mascot, gained a broad international following and quickly grew to have a multi-million dollar market capitalization.

Double Spend

If someone tries to send a bitcoin transaction to two different recipients at the same time, this is double spending. Once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. The more confirmations that a transaction has, the harder it is to double spend the bitcoins.

DYOR | #DYOR

“Do Your Own Research.” The trader’s caveat that advice shouldn’t be taken at face value.

“$BCY has an appealing risk/reward here. Could take a few months to play out, however, and will require patience. #DYOR”

Exit Scam

Traditionally a term for darknet markets and vendors that, after building up a good reputation, accumulate bitcoins and disappear; exit scams are also feared by ICO participants who worry that, once they’ve raised hundreds of millions in hard-to-trace money, the developers will take the money and run.

Fiat

Government-issued money.

Full Node

A full node is when you download the entire block chain using a bitcoin client, and you relay, validate, and secure the data within the block chain.

The data is bitcoin transactions and blocks, which is validated across the entire network of users.

FOMO | #FOMO

“Fear of Missing Out.” When a coin starts to moon, dumb money rushes in. “$LGD on a TEAR right now!!! It has major highs right now! Some major #FOMO going on!!! Sell while it’s high. It WILL drop before fight!!!”

FUD

“Fear, Uncertainty, and Doubt.”

Another non-crypto term that describes attempts to scare weak-handed coin-holders into selling their positions, often with rumors of exit scams or hacks; the cheap, dumped coins are then picked up by the FUD-ers.

Fungibility

Fungibility is a good or asset’s interchangeability with other individual goods or assets of the same type.

Assets possessing this fungibility property simplify the exchange and trade processes, as interchangeability assumes everyone values all goods of that class the same.

HODL

HOLD ON FOR DEAR LIFE!

The intentionally misspelled word hodl has its roots in a December 2013 post on the Bitcoin Talk forum, “I AM HODLING”; when the author, GameKyuubi, couldn’t be bothered to fix his typo, the community instantly turned it into a verb: to hodl.


Along with other terms, hodl is an effective litmus test for sussing out newcomers, carpetbaggers, and tourists.

Halving

Bitcoins have a finite supply, which makes them scarce.

The total amount that will ever be issued is 21 million.

The number of bitcoins generated per block is decreased 50% every 210,000 blocks,roughtly four years.

This is called “halving.”

The final halving will take place in the year 2140.

Hash

A cryptographic hash is a mathematical function that takes a file and produces a relative shortcode that can be used to identify that file.

A hash has a couple of key properties:

• It is unique. 

Only a particular file can produce a particular hash, and two different files will never produce the same hash.

It cannot be reversed.

You can’t work out what a file was by looking at its hash.

Hashing is used to prove that a set of data has not been tampered with.

It is what makes bitcoin mining possible.

Hash Rate

The hash rate is how the Bitcoin mining network processing power is measured.

In order for miners to confirm transactions and secure the block chain, the hardware they use must perform intensive computational operations which is output in hashes per second.

Hash Converter

Use an online hash converter, such as https://hash.online-convert.com and enter the text you want to convert.

Then, try changing just a letter in the input text to see how the resulting hash varies significantly

Hard Fork

A hard fork is when a single cryptocurrency splits in two.

It occurs when a cryptocurrency’s existing code is changed, resulting in both an old and new version.

Meanwhile a soft fork is essentially the same thing, but the idea is that only one blockchain (and thus one coin) will remain valid as users adopt the update.

So both fork types create a split, but a hard fork is meant to create two blockchain/coins and a soft fork is meant to result in one.

Segwit was a soft fork, Bitcoin Cash, Bitcoin Gold, and Segwit2x are all hard forks.

Immutability

In object-oriented and functional programming, an immutable object (unchangeable object) is an object whose state cannot be modified after it is created.

This is in contrast to a mutable object (changeable object), which can be modified after it is created.

Lambo | #Lambo

A running joke among traders, you’re cryptorich when you can buy a Lamborghini; though absurd, it’s not unheard of — when Alexandre Cazes, the suspected founder of a major darknet marketplace, was found hanged in his Bangkok jail cell, Thai media reported that he owned four Lamborghinis.

Mining

Bitcoin mining is the process of using computer hardware to do mathematical calculations for the Bitcoin network in order to confirm transactions.

Miners collect transaction fees for the transactions they confirm and are awarded bitcoins for each block they verify.

Moon | #Moon

A rapid price increase.

Peer-to-Peer

Typically, online applications are provided by a central party that organizes all the transactions.

Your bank runs its own computers, and all the customers log into the bank’s computer to handle their transactions.

If Bob wants to send money to Alice, he asks the bank to do it, and the bank controls everything.

In a peer-to-peer arrangement, technology cuts out the middleman, meaning that people deal directly with each other.

Bob would send the money directly to Alice, and there wouldn’t be any bank involved at all.

Pool

As part of bitcoin mining, mining “pools” are a network of miners that work together to mine a block, then split the block reward among the pool miners.

Mining pools are a good way for miners to combine their resources to increase the probability of mining a block, and also contribute to the overall health and decentralization of the bitcoin network.

Private Key

A private key is a string of data that shows you have access to bitcoins in a specific wallet.

Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.

Proof of Work

Proof of work refers to the hash of a block header (blocks of bitcoin transactions).

A block is considered valid only if its hash is lower than the current target.

Each block refers to a previous block adding to previous proofs of work, which forms a chain of blocks, known as a block chain.

Once a chain is formed, it confirms all previous Bitcoin transactions and secures the network.

Pump

A rapid price increase believed to be the result of market manipulation, a.k.a. pump and dump.

Public Address

A public bitcoin address is cryptographic hash of a public key.

A public address typically starts with the number “1.”

Think of a public address like an email address.

It can be published anywhere and bitcoins can be sent to it, just like an email can be sent to an email address.

Private Key

A private key is a string of data that shows you have access to bitcoins in a specific wallet.

Think of a private key like a password; private keys must never be revealed to anyone but you, as they allow you to spend the bitcoins from your bitcoin wallet through a cryptographic signature.

Rekt | #Rekt

Meaning “wrecked”.

“I never sell because of #FUD, and I never buy because of #FOMO.

That’s the easiest way to get #Rekt

Sats

Satoshis, currently the smallest unit of a single bitcoin, useful for tracking coin prices. “At the rate $XRP’s moving, I wouldn’t be surprised if it hits 10K sats by the end of the day.”

Security Tokens

A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.

The device may be in the form of a smart card or may be embedded in a commonly used object such as a key fob.

Shitcoins

Pejorative term for altcoins, especially low-cap coins, often affectionately used by shitcoin hodlers.

SEGWIT

SegWit is the process by which the block size limit on a blockchain is increased by removing signature data from Bitcoin transactions.

When certain parts of a transaction are removed, this frees up space or capacity to add more transactions to the chain.

Transaction

A transaction is when data is sent to and from one bitcoin address to another.

Just like financial transactions where you send money from one person to another, in bitcoin you do the same thing by sending data (bitcoins) to each other.

Bitcoins have value because it’s based on the properties of mathematics, rather than relying on physical properties (like gold and silver) or trust in central authorities, like fiat currencies.

Wallet

Just like with paper dollars you hold in your physical wallet, a bitcoin wallet is a digital wallet where you can store, send, and receive bitcoins securely.

There are many varieties of wallets available, whether you’re looking for a web or mobile solution.

Ideally, a bitcoin wallet will give you access to your public and private keys.

This means that only you have rightful access to spend these bitcoins, whenever you choose to.

Whale

Anyone who owns 5 percent of any given coin, often used as a boogeyman to explain unwanted price movements.

“Nice support $NEO. Clear whale manipulation.”


Blue Pill vs. Red Pill
Choose wisely

When You’re ready …



BitHouse with 💚


What bitcoin is … NOT

Bitcoin is not Abracadabra…
but Bitcoin can be Avada Kedavra for the current Banking system!

Bitcoin is not Magic…
but it can be for Muggles!

Bitcoin is not an “Investment” …
but educating yourself about bitcoin can be!

Bitcoin is not an “Investment”…
but knowing  the basics and being educated about it, lowers the chances of loosing your hard earned money!

Bitcoin is not an “Investment”…
but staking Sats proved to be a preety good Strategy in the Long Term!

Bitcoin is not digital money…
but it’s ons of it’s first applications!

Bitcoin is not money…
but is Money for the Internet!

Bitcoin is not PRICE !!!

Bitcoin is not PRICE…
but the market is driven mostly by FUD & FOMO people

Fear
Uncertainty
Doubt

bring the market Down


Fear
Of
Missing
Out

bring the market Up

Bitcoin is not a “Get Rich Quick Scheme” and the one’s that got rich were the one’s that were there from the begining…

Bitcoin is not voodoo people, magic people…
but a bunch of smart geeks & nerds that support the bitcoin’s philosophy and what it stands for…

Bitcoin is not under no juridstiction…
but it is a global p2p network of like-minded people that with the power of their equipment sustain, mantain and make the bitcoin network stronger and more decentralized!

Bitcoin is not a Coin…
but an entry in a digital ledger!

Bitcoin is not illegal activity money…
but bitcoin can be used in such activity…
Reports show that FIAT is still the No. #1 choice for “Evil Doers” as it doens’t have an public, open and visible ledger …
Duh…

Bitcoin is not evil…
but bitcoin can be used to do evil!
As does a Pen!
It can be used to do evil!
How, you would ask?
If  I take this ✏ and stick it up your a… who is Evil ?!?
The One who invented the pen?
The Pen?
Me?
Your a.. cause it was in the way 🤣
Perspective is a matter of opinion…

Bitcoin is not News…
but instead read pools, github, exchanges, wallets…
They are the ones that pave the way where bitcoin could, should or would go!

Bitcoin is not DEAD…
It was already declared Dead 441 times!

see :

https://99bitcoins.com/bitcoin-obituaries/

Bitcoin is not …
Yapidi Yapidi Yap people…

If someone says :

1 – Bitcoin consumes too much electricity, they don’t understand POW!

2 – Bitcoin isn’t a government backed currency, you should ask who backs their government…
If the answer is the Army…

3 – Bitcoin isn’t backed by gold like the the US$…
Neither is the $ since ’71

4 – Bitcoin isn’t real because I can’t see it…
80% of world’s money is Digital…

5 – Bitcoin isn’t a store of value as good as Gold is…
Gold had thousands of years to prove that, bitcoin only 13… give it time!
It already proved a lot !!!

6 – Bitcoin’s inventor is annonymous and can’t be trusted…
Who invented money then? How do money come up into existance?

7 – Bitcoin will never be largely accepted because it isn’t issued by a government…
You know what else wasn’t issued by no government ? Cars, Electricity, Steam Engine, Facebook, Uber, Google, Amazon, etc bla bla bla

8 – Bitcoin can’t be a currency cause I can’t buy anything with it…
I think I have shared a list with places that you can buy things with bitcoin…Quite a few!!!

9 – Whales… Beware of yapidi yap of whales cause they say one and do the opposite 🙂 😉 !!!

9 – Bitcoin is not this, bitcoin is not that but they all swarm around the bee’s honeypot as if it were honey 🤣🤣🤣

I forgot…In the meantime, little unsignificant countries like El Salvador, mine bitcoin with 🌋 !!!

And still newspapers, investors that bite their whatever not having invested when it was under $1, and a hole portion of the world are all saying…

Etc bla bla bla Yapidi Yapidi Yap


Never Forget The Golden Rules:

Not Your Keys, Not Your Crypto!!!

Don’t Trust, Verify!!!

Don’t Believe, Do your own Resesearch and due diligence!!!

Save your Wallet’s Mnemonic Phrase in at least 3 places for safe-keeping!!!


WE ARE SATOSHI


When you’re ready…

Timothy C. May

Hal Finney

Poem of the Legacy

From the ashes of the long forgotten past,
A bright mind wrote a code that would for ever last…
A code so powerful and strong,
That would change the world for oh so long…

The code he wrote and set it free,
For the humankind legacy to be…
To change the lives of future generations to come,
He wrote the code and he was gone…

Oh, bright mind your legacy will last,
For generations to come and be thankful about the past…
Nobody knows who you might be,
Some do and say Kudos to You for Ethernity!


Made with 💚  by Free Spirit

✌ & 💚




BitHouse with 💚

Calculate Hashes/s

How can I calculate how many hashes I generate per second?

I have a function which generates hashes from a string:

string GenerateHash(string plainText);

I generate as many hashes as possible with 4 threads.

How do I calculate how many hashes (or megahashes) I generate per second?

Your problem breaks down nicely into 3 separate tasks

  1. Sharing a single count variable across threads
  2. Benchmarking thread completion time
  3. Calculating hashes per/second

Sharing a single count variable across threads

public static class GlobalCounter
{ public static int Value { get;
private set;
} public static void Increment()
{ Value =GetNextValue(Value);
} private static int GetNextValue(int curValue) { returnInterlocked.Increment(ref curValue);
} public static void Reset() { Value = 0; } }

Before you spin off the threads call GlobalCounter.Reset and then in each thread (after each successful hash) you would call GlobalCounter.Increment – using Interlocked.X performs atomic operations of Value in a thread-safe manner, it’s also much faster than lock.

Benchmarking thread completion time

var sw = Stopwatch.StartNew(); Parallel.ForEach(someCollection, someValue => 
{ // generate hash GlobalCounter.Increment();
}); sw.Stop();

Parallel.ForEach will block until all threads have finished

Calculating hashes per second

... sw.Stop(); var hashesPerSecond = GlobalCounter.Value / sw.Elapsed.Seconds;

Did you find this article helpful?

If so, please consider a donation to help the evolution and development of more helpful articles in the future, and show your support for alternative articles.

Your generosity is 💚 ly appreciated

You can donate in any crypto your 💚 desires 😊

Thank you all for your time !!!

✌ & 💚

Bitcoin (BTC) :
1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ

LiteCoin(LTC) :
LYAdiSpsTJ36EWCJ5HF9EGy9iWGCwoLhed

Ethereum(ETH) :
0x602e8Ca3984943cef57850BBD58b5D0A6677D856

EthereumClassic(ETC) :
0x602e8Ca3984943cef57850BBD58b5D0A6677D856

Cardano(ADA)
addr1q88c5cccnrqy6xesszzvf7rd4tcz87klt0m0h6uvltywqe8txwmsrrqdnpq27594tyn9vz59zv0n8367lvyc2atvrzvqlvdm9d

BinanceCoin(BNB)
bnb1wwfnkzs34knsrv2g026t458l0mwp5a3tykeylx

BitcoinCash (BCH)
1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ

BitcoinSV(BSV)
1P1tTNFGRZabK65RhqQxVmcMDHQeRX9dJJ

ZCash(ZEC)
t1fSSQX4gEhove9ngcvFafQaMPq5dtNNsNF

Dash(DASH)
XcWmbFw1VmxEPxvF9CWdjzKXwPyDTrbMwj

Shiba(SHIB)
0x602e8Ca3984943cef57850BBD58b5D0A6677D856

Tron(TRX)
TCsJJkqt9xk1QZWQ8HqZHnqexR15TEowk8

Stellar(XLM)
GBL4UKPHP2SXZ6Y3PRF3VRI5TLBL6XFUABZCZC7S7KWNSBKCIBGQ2Y54

Made with 💚 by Free Spirit

✌ & 💚

Anarchy Legacy

A Crypto Anarchist’s Legacy

Airfoil Dec 20, 2018

Timothy May on the cover of the second issue of Wired magazine with 2 fellow cypherpunks

Sadly, this past week we lost an icon that helped to spur the cypherpunk movement. Timothy May, who wrote The Crypto Anarchist Manifesto in 1988, lauched a movement that is still very prominent today.

For the uninitiated, a Crypto-Anarchist focuses on subverting the current laws and using new technologies to the benefit of the common man.

In the original manifesto, May says crypto-anarchy focuses on “encryption, digital money, anonymous networks, digital pseudonyms, zero-knowledge, reputations, information markets, black markets, collapse of governments”.

The manifesto was written just before the first crypto wars began during the early 1990’s.

The governments of the world fiercely opposed the general public using cryptographic encryption protocols.

The idea that a normal citizen could completely hide what they say in an electronic message was their biggest concern.

The governments cited national security as a concern (We’ve heard this excuse used many times before).

Tim May was embroiled in the center of this alongside his group of fellow cypherpunks.

RSA Security, a leading computer securty company founded by world-renowned cryptologists, created this poster against a hardware chip that used a US-government supplied encryption standard

The legislation of the anti-encryption laws would also affect payment processing technology. There was a large push back from tech companies that would have to deal with these issues first-hand.

The crypto wars of the 1990’s ended with the concession from the government that encryption was readily available around the world.

The public had won their first bout against the government surveillance state. Alongside the public, you had the cypherpunks and large tech companies that were all fighting a common threat.

There was not much of an issue in terms of encryption for quite a few more years.

Every few years afterward, the idea of backdoors into encryption schemes were brought up but nothing ever came about these new ideations.

The Crypto Wars Redux

The expansion of computational power and development of more efficient processing equipment closed the gap as to who can gain access to encryption software.

The widespread availabilty of software/hardware that can perform these cryptographic calculations involved in encryption and the ease of use has made it possible for the layman to encrypt their own personal messages, video calls,emails, and notes.

Encrypting an email with someone who has never imported a key to their keyring, or generated their own PGP public/private key pair is a thing of the past.

Many of the services that exist today offer these solutions out of the box. The process has become much easier for all parties involved.

Anyone that is now using this technology benefits from this on a privacy and security level.

With all parties benefitting, the leviathan rears its head once more. Australia has passed an anti-encryption bill that will force large tech companies to allow the Australian government to obtain hardware access(citing national security as a major reason).

Outrage has spilled out of the larger tech companies. The end-to-end zero knowledge messaging/calling app, Signal, has taken a stand against this bill.

This sounds very similar to the issues Tim May was battling with during the early days of the First Crypto War.

The cypherpunks came out on top and I’m sure this legislation will face a similar fate.

May’s Impact on the World

The imprint that Timothy May left on the world is profound. The mass adoption of encryption as well as cryptocurrencies shows just how far ahead of the times he was.

May urged the importance of privacy.

He insisted on the use of encryption to keep your communications private.

Currently on a majority of mobile phones there are applications that provide encrypted communications. Whatsapp uses the Signal protocol which was developed by cypherpunk Moxie Marlinspike.

The rise of cryptocurrencies is an ideal that May was very hopeful for.

May did come out against the anti-privacy issues of bitcoin.

There are projects that offer solutions for this privacy debate.

Much of the developer-base of these certain cryptocurrencies have their foundation based in the cypherpunk tradition.

The Cryptocurrencies that aim for a privacy by default mechanism are monero and the soon to launch GRIN which uses the Mimblewimble Protocol (To see an extremely entertaining introduction to the GRIN project via talk-to-text chat for privacy preservation, listen to the creator of Grin).

Zcash is moving in the direction of private by default and the superior cryptography of the ZK range proofs will help to create a very private cryptocurrency.

Cody WIlson and Amir Taaki who worked on projects focused on the crypto-anarchic tradition including Dark Wallet and Defense Distributed

The impact Tim May made on the world by helping to create a social movement shows the importance and strength of his ideals.

He has impacted a generation of people that are growing up in the digital age.

He influenced builders in the 21st century.

You have people creating new currencies, exposing government surveillance on a national scale, circumventing the broken bueracratic system by creating their own markets, anonymous internet protocols, as well as making encryption applicable to the common man (You can find a list of prominent cypherpunks here and also here).

There isn’t enough that can be said about the applications in which he believed could positively affect us.

May was cognizant of the encroaching all-seeing eye of the state but I believe we are in much better shape now than we’ve ever been.

There may be negative news about what we currently face as individuals, from the unprecedented surveillance of the Snowden leaks to the aforementioned Australian anti-encryption bill, but looking at the grand scheme of our daily lives, these tools and their functions have helped to create a much better day than May could have imagined in 1988.

He was a proponent for the industriousness of human nature to outpace the slow moving regulation that would try to bog down any progress.

You can listen here to what he thought people/creators should do when they develop ground breaking technology.

Arise, you have nothing to lose but your barbed wire fences!

Timothy C. May – “The Crypto Anarchist Manifesto”

Shared with 💚 by Free Spirit

✌ & 💚