A Quantum Money Solution to the Blockchain Scalability ...

Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.

Flatten the Curve. Part 48. Source Here
It's getting crazier day by day now, so are you following the Boy Scout motto?
On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”
Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it.
But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.
'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.
Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.
The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here
Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you.
Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
PACOM? Why isn't that command group responsible for the South China Sea?
Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.
Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Nah. I'm just fear mongering and Doomscrolling again.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]

Information and FAQ

Welcome to the official IOTA subreddit.
If you are new you can find lots of information here, in the sidebar and please use the search button to see if your questions have been asked before. Please focus discussion on IOTA technology, ecosystem announcements, project development, apps, etc. Please direct help questions to /IOTASupport, and price discussions and market talk to /IOTAmarkets.
Before getting started it is recommended to read the IOTA_Whitepaper.pdf. I also suggest watching these videos first to gain a better understanding.
IOTA BREAKDOWN: The Tangle Vs. Blockchain Explained
IOTA tutorial 1: What is IOTA and some terminology explained

Information

Firstly, what is IOTA?

IOTA is an open-source distributed ledger protocol launched in 2015 that goes 'beyond blockchain' through its core invention of the blockless ‘Tangle’. The IOTA Tangle is a quantum-resistant Directed Acyclic Graph (DAG), whose digital currency 'iota' has a fixed money supply with zero inflationary cost.
IOTA uniquely offers zero-fee transactions & no fixed limit on how many transactions can be confirmed per second. Scaling limitations have been removed, since throughput grows in conjunction with activity; the more activity, the more transactions can be processed & the faster the network. Further, unlike blockchain architecture, IOTA has no separation between users and validators (miners / stakers); rather, validation is an intrinsic property of using the ledger, thus avoiding centralization.
IOTA is focused on being useful for the emerging machine-to-machine (m2m) economy of the Internet-of-Things (IoT), data integrity, micro-/nano- payments, and other applications where a scalable decentralized system is warranted.
More information can be found here.

Seeds

A seed is a unique identifier that can be described as a combined username and password that grants you access to your IOTA.
Your seed is used to generate the addresses and private keys you will use to store and send IOTA, so this should be kept private and not shared with anyone. If anyone obtains your seed, they can generate the private keys associated with your addresses and access your IOTA.

Non reusable addresses

Contrary to traditional blockchain based systems such as Bitcoin, where your wallet addresses can be reused, IOTA's addresses should only be used once (for outgoing transfers). That means there is no limit to the number of transactions an address can receive, but as soon as you've used funds from that address to make a transaction, this address should not be used anymore.
Why?
When an address is used to make an outgoing transaction, a random 50% of the private key of that particular address is revealed in the transaction signature, which effectively reduces the security of the key. A typical IOTA private key of 81-trits has 2781 possible combinations ( 8.7 x 10115 ) but after a single use, this number drops to around 2754 ( 2 x 1077 ), which coincidentally is close to the number of combinations of a 256-bit Bitcoin private key. Hence, after a single use an IOTA private key has about the same level of security as that of Bitcoin and is basically impractical to brute-force using modern technology. However, after a second use, another random 50% of the private key is revealed and the number of combinations that an attacker has to guess decreases very sharply to approximately 1.554 (~3 billion) which makes brute-forcing trivial even with an average computer.
Note: your seed is never revealed at at time; only private keys specific to each address.
The current light wallet prevents address reuse automatically for you by doing 2 things:
  1. Whenever you make an outgoing transaction from an address that does not consume its entire balance (e.g. address holds 10 Mi but you send only 5 Mi), the wallet automatically creates a new address and sends the change (5 Mi) to the new address.
  2. The wallet prevents you from performing a second outgoing transaction using the same address (it will display a “Private key reuse detected!” error).
This piggy bank diagram can help visualize non reusable addresses. imgur link
[Insert new Safe analogy].

Address Index

When a new address is generated it is calculated from the combination of a seed + Address Index, where the Address Index can be any positive Integer (including "0"). The wallet usually starts from Address Index 0, but it will skip any Address Index where it sees that the corresponding address has already been attached to the tangle.

Private Keys

Private keys are derived from a seeds key index. From that private key you then generate an address. The key index starting at 0, can be incremented to get a new private key, and thus address.
It is important to keep in mind that all security-sensitive functions are implemented client side. What this means is that you can generate private keys and addresses securely in the browser, or on an offline computer. All libraries provide this functionality.
IOTA uses winternitz one-time signatures, as such you should ensure that you know which private key (and which address) has already been used in order to not reuse it. Subsequently reusing private keys can lead to the loss of funds (an attacker is able to forge the signature after continuous reuse).
Exchanges are advised to store seeds, not private keys.

FAQ

Buying IOTA

How do I to buy IOTA?

Currently not all exchanges support IOTA and those that do may not support the option to buy with fiat currencies.
Visit this website for a Guide: How to buy IOTA
or Click Here for a detailed guide made by 450LbsGorilla

Cheapest way to buy IOTA?

You can track the current cheapest way to buy IOTA at IOTA Prices.
It tells you where & how to get the most IOTA for your money right now. There's an overview of the exchanges available to you and a buying guide to help you along.
IOTAPrices.com monitors all major fiat exchanges for their BTC & ETH rates and combines them with current IOTA rates from IOTA exchanges for easy comparison. Rates are taken directly from each exchange's official websocket. For fiat exchanges or exchanges that don't offer websockets, rates are refreshed every 60 seconds.

What is MIOTA?

MIOTA is a unit of IOTA, 1 Mega IOTA or 1 Mi. It is equivalent to 1,000,000 IOTA and is the unit which is currently exchanged.
We can use the metric prefixes when describing IOTA e.g 2,500,000,000 i is equivalent to 2.5 Gi.
Note: some exchanges will display IOTA when they mean MIOTA.

Can I mine IOTA?

No you can not mine IOTA, all the supply of IOTA exist now and no more can be made.
If you want to send IOTA, your 'fee' is you have to verify 2 other transactions, thereby acting like a minenode.

Storing IOTA

Where should I store IOTA?

It is not recommended to store large amounts of IOTA on the exchange as you will not have access to the private keys of the addresses generated.

Wallets

GUI Desktop (Full Node + Light Node)
Version = 2.5.6
Download: GUI v2.5.6
Guide: Download/Login Guide
Nodes: Status
Headless IRI (Full Node)
Version = 1.4.1.4
Download: Mainnet v1.4.1.4
Guide:
Find Neighbours: /nodesharing
UCL Desktop/Android/iOS (Light Node)
Version = Private Alpha Testing
Website: iota-ucl (Medium)
Android (Light Node)
Version = Beta
Download: Google Play
iOS (Light Node)
Version = Beta Testing
Website: https://iota.tools/wallet
Paper Wallet
Version = v1.3.6
Repo: GitHub
Seed Vault
Version = v1.0.2
Repo: GitHub7

What is a seed?

A seed is a unique identifier that can be described as a combined username and password that grants you access to your wallet.
Your seed is used to generate the addresses linked to your account and so this should be kept private and not shared with anyone. If anyone obtains your seed, they can login and access your IOTA.

How do I generate a seed?

You must generate a random 81 character seed using only A-Z and the number 9.
It is recommended to use offline methods to generate a seed, and not recommended to use any non community verified techniques. To generate a seed you could:

On a Linux Terminal

use the following command:
 cat /dev/urandom |tr -dc A-Z9|head -c${1:-81} 

On a Mac Terminal

use the following command:
 cat /dev/urandom |LC_ALL=C tr -dc 'A-Z9' | fold -w 81 | head -n 1 

With KeePass on PC

A helpful guide for generating a secure seed on KeePass can be found here.

With a dice

Dice roll template

Is my seed secure?

  1. All seeds should be 81 characters in random order composed of A-Z and 9.
  2. Do not give your seed to anyone, and don’t keep it saved in a plain text document.
  3. Don’t input your seed into any websites that you don’t trust.
Is Someone Going To Guess My IOTA Seed?
What are the odds of someone guessing your seed?
  • IOTA seed = 81 characters long, and you can use A-Z, 9
  • Giving 2781 = 8.7x10115 possible combinations for IOTA seeds
  • Now let's say you have a "super computer" letting you generate and read every address associated with 1 trillion different seeds per second.
  • 8.7x10115 seeds / 1x1012 generated per second = 8.7x10103 seconds = 2.8x1096 years to process all IOTA seeds.

Why does balance appear to be 0 after a snapshot?

When a snapshot happens, all transactions are being deleted from the Tangle, leaving only the record of how many IOTA are owned by each address. However, the next time the wallet scans the Tangle to look for used addresses, the transactions will be gone because of the snapshot and the wallet will not know anymore that an address belongs to it. This is the reason for the need to regenerate addresses, so that the wallet can check the balance of each address. The more transactions were made before a snapshot, the further away the balance moves from address index 0 and the more addresses have to be (re-) generated after the snapshot.

What happens if you reuse an address?

It is important to understand that only outgoing transactions reveal the private key and incoming transactions do not. If you somehow manage to receive iotas using an address after having used it previously to send iotas—let's say your friend sends iotas to an old address of yours—these iotas may be at risk.
Recall that after a single use an iota address still has the equivalent of 256-bit security (like Bitcoin) so technically, the iotas will still be safe if you do not try to send them out. However, you would want to move these iotas out eventually and the moment you try to send them out, your private key will be revealed a second time and it now becomes feasible for an attacker to brute-force the private key. If someone is monitoring your address and spots a second use, they can easily crack the key and then use it to make a second transaction that will compete with yours. It then becomes a race to see whose transaction gets confirmed first.
Note: The current wallet prevents you from reusing an address to make a second transaction so any iotas you receive with a 'used' address will be stuck. This is a feature of wallet and has nothing to do with the fundamental workings of IOTA.

Sending IOTA

What does attach to the tangle mean?

The process of making an transaction can be divided into two main steps:
  1. The local signing of a transaction, for which your seed is required.
  2. Taking the prepared transaction data, choosing two transactions from the tangle and doing the POW. This step is also called “attaching”.
The following analogy makes it easier to understand:
Step one is like writing a letter. You take a piece of paper, write some information on it, sign it at the bottom with your signature to authenticate that it was indeed you who wrote it, put it in an envelope and then write the recipient's address on it.
Step two: In order to attach our “letter” (transaction), we go to the tangle, pick randomly two of the newest “letters” and tie a connection between our “letter” and each of the “letters” we choose to reference.
The “Attach address” function in the wallet is actually doing nothing else than making an 0 value transaction to the address that is being attached.

Why is my transaction pending?

IOTA's current Tangle implementation (IOTA is in constant development, so this may change in the future) has a confirmation rate that is ~66% at first attempt.
So, if a transaction does not confirm within 1 hour, it is necessary to "reattach" (also known as "replay") the transaction one time. Doing so one time increases probability of confirmation from ~66% to ~89%.
Repeating the process a second time increases the probability from ~89% to ~99.9%.

How do I reattach a transaction.

Reattaching a transaction is different depending on where you send your transaction from. To reattach using the GUI Desktop wallet follow these steps:
  1. Click 'History'.
  2. Click 'Show Bundle' on the 'pending' transaction.
  3. Click 'Reattach'.
  4. Click 'Rebroadcast'. (optional, usually not required)
  5. Wait 1 Hour.
  6. If still 'pending', repeat steps 1-5 once more.

Does the private key get revealed each time you reattach a transaction?

When you use the reattach function in the desktop wallet, a new transaction will be created but it will have the same signature as the original transaction and hence, your private key will not revealed a second time.

What happens to pending transactions after a snapshot?

IOTA Network and Nodes

What incentives are there for running a full node?

IOTA is made for m2m economy, once wide spread adoption by businesses and the IOT, there will be a lot of investment by these businesses to support the IOTA network. In the meantime if you would like to help the network and speed up p2p transactions at your own cost, you can support the IOTA network by setting up a Full Node.
Running a full node also means you don't have to trust a 3rd party light node provider. By running a full node you get to take advantage of new features that might not be installed on 3rd party nodes.

How to set up a full node?

To set up a full node you will need to follow these steps:
  1. Download the full node software: either GUI, or headless CLI for lower system requirements and better performance.
  2. Get a static IP for your node.
  3. Join the network by adding 7-9 neighbours.
  4. Keep your full node up and running as much as possible.
A detailed user guide on how to set up a VTS IOTA Full Node from scratch can be found here.

How do I get a static IP?

To learn how to setup a hostname (~static IP) so you can use the newest IOTA versions that have no automated peer discovery please follow this guide.

How do I find a neighbour?

Are you a single IOTA full node looking for a partner? You can look for partners in these place:

Resources

You can find a wiki I have been making here.
More to come...
If you have any contributions or spot a mistake or clarification, please PM me or leave a comment.
submitted by Boltzmanns_Constant to Iota [link] [comments]

I'm writing a series about blockchain tech and possible future security risks. This is the third part of the series introducing Quantum resistant blockchains.

Part 1 and part 2 will give you usefull basic blockchain knowledge that is not explained in this part.
Part 1 here
Part 2 here
Quantum resistant blockchains explained.
- How would quantum computers pose a threat to blockchain?
- Expectations in the field of quantum computer development.
- Quantum resistant blockchains
- Why is it easier to change cryptography for centralized systems such as banks and websites than for blockchain?
- Conclusion
The fact that whatever is registered on a blockchain can’t be tampered with is one of the great reasons for the success of blockchain. Looking ahead, awareness is growing in the blockchain ecosystem that quantum computers might cause the need for some changes in the cryptography that is used by blockchains to prevent hackers from forging transactions.
How would quantum computers pose a threat to blockchain?
First, let’s get a misconception out of the way. When talking about the risk quantum computers could pose for blockchain, some people think about the risk of quantum computers out-hashing classical computers. This, however, is not expected to pose a real threat when the time comes.
This paper explains why: https://arxiv.org/pdf/1710.10377.pdf "In this section, we investigate the advantage a quantum computer would have in performing the hashcash PoW used by Bitcoin. Our findings can be summarized as follows: Using Grover search, a quantum computer can perform the hashcash PoW by performing quadratically fewer hashes than is needed by a classical computer. However, the extreme speed of current specialized ASIC hardware for performing the hashcash PoW, coupled with much slower projected gate speeds for current quantum architectures, essentially negates this quadratic speedup, at the current difficulty level, giving quantum computers no advantage. Future improvements to quantum technology allowing gate speeds up to 100GHz could allow quantum computers to solve the PoW about 100 times faster than current technology.
However, such a development is unlikely in the next decade, at which point classical hardware may be much faster, and quantum technology might be so widespread that no single quantum enabled agent could dominate the PoW problem."
The real point of vulnerability is this: attacks on signatures wherein the private key is derived from the public key. That means that if someone has your public key, they can also calculate your private key, which is unthinkable using even today’s most powerful classical computers. So in the days of quantum computers, the public-private keypair will be the weak link. Quantum computers have the potential to perform specific kinds of calculations significantly faster than any normal computer. Besides that, quantum computers can run algorithms that take fewer steps to get to an outcome, taking advantage of quantum phenomena like quantum entanglement and quantum superposition. So quantum computers can run these certain algorithms that could be used to make calculations that can crack cryptography used today. https://en.wikipedia.org/wiki/Elliptic-curve_cryptography#Quantum_computing_attacks and https://eprint.iacr.org/2017/598.pdf
Most blockchains use Elliptic Curve Digital Signature Algorithm (ECDSA) cryptography. Using a quantum computer, Shor's algorithm can be used to break ECDSA. (See for reference: https://arxiv.org/abs/quant-ph/0301141 and pdf: https://arxiv.org/pdf/quant-ph/0301141.pdf ) Meaning: they can derive the private key from the public key. So if they got your public key (and a quantum computer), then they got your private key and they can create a transaction and empty your wallet.
RSA has the same vulnerability while RSA will need a stronger quantum computer to be broken than ECDSA.
At this point in time, it is already possible to run Shor’s algorithm on a quantum computer. However, the amount of qubits available right now makes its application limited. But it has been proven to work, we have exited the era of pure theory and entered the era of practical applications:
So far Shor's algorithm has the most potential, but new algorithms might appear which are more efficient. Algorithms are another area of development that makes progress and pushes quantum computer progress forward. A new algorithm called Variational Quantum Factoring is being developed and it looks quite promising. " The advantage of this new approach is that it is much less sensitive to error, does not require massive error correction, and consumes far fewer resources than would be needed with Shor’s algorithm. As such, it may be more amenable for use with the current NISQ (Noisy Intermediate Scale Quantum) computers that will be available in the near and medium term." https://quantumcomputingreport.com/news/zapata-develops-potential-alternative-to-shors-factoring-algorithm-for-nisq-quantum-computers/
It is however still in development, and only works for 18 binary bits at the time of this writing, but it shows new developments that could mean that, rather than a speedup in quantum computing development posing the most imminent threat to RSA and ECDSA, a speedup in the mathematical developments could be even more consequential. More info on VQF here: https://arxiv.org/abs/1808.08927
It all comes down to this: when your public key is visible, which is always necessary to make transactions, you are at some point in the future vulnerable for quantum attacks. (This also goes for BTC, which uses the hash of the public key as an address, but more on that in the following articles.) If you would have keypairs based on post quantum cryptography, you would not have to worry about that since in that case not even a quantum computer could derive your private key from your public key.
The conclusion is that future blockchains should be quantum resistant, using post-quantum cryptography. It’s very important to realize that post quantum cryptography is not just adding some extra characters to standard signature schemes. It’s the mathematical concept that makes it quantum resistant. to become quantm resistant, the algorithm needs to be changed. “The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat.” https://en.wikipedia.org/wiki/Post-quantum_cryptography
Expectations in the field of quantum computer development.
To give you an idea what the expectations of quantum computer development are in the field (Take note of the fact that the type and error rate of the qubits is not specified in the article. It is not said these will be enough to break ECDSA or RSA, neither is it said these will not be enough. What these articles do show, is that a huge speed up in development is expected.):
When will ECDSA be at risk? Estimates are only estimates, there are several to be found so it's hard to really tell.
The National Academy of Sciences (NAS) has made a very thourough report on the development of quantum computing. The report came out in the end of 2018. They brought together a group of scientists of over 70 people from different interconnecting fields in quantum computing who, as a group, have come up with a close to 200 pages report on the development, funding, implications and upcoming challenges for quantum computing development. But, even though this report is one of the most thourough up to date, it doesn't make an estimate on when the risk for ECDSA or RSA would occur. They acknowledge this is quite impossible due to the fact there are a lot of unknowns and due to the fact that they have to base any findings only on publicly available information, obviously excluding any non available advancements from commercial companies and national efforts. So if this group of specialized scientists can’t make an estimate, who can make that assessment? Is there any credible source to make an accurate prediction?
The conclusion at this point of time can only be that we do not know the answer to the big question "when".
Now if we don't have an answer to the question "when", then why act? The answer is simple. If we’re talking about security, most take certainty over uncertainty. To answer the question when the threat materializes, we need to guess. Whether you guess soon, or you guess not for the next three decades, both are guesses. Going for certain means you'd have to plan for the worst, hope for the best. No matter how sceptical you are, having some sort of a plan ready is a responsible thing to do. Obviously not if you're just running a blog about knitting. But for systems that carry a lot of important, private and valuable information, planning starts today. The NAS describes it quite well. What they lack in guessing, they make up in advice. They have a very clear advice:
"Even if a quantum computer that can decrypt current cryptographic ciphers is more than a decade off, the hazard of such a machine is high enough—and the time frame for transitioning to a new security protocol is sufficiently long and uncertain—that prioritization of the development, standardization, and deployment of post-quantum cryptography is critical for minimizing the chance of a potential security and privacy disaster."
Another organization that looks ahead is the National Security Agency (NSA) They have made a threat assessment in 2015. In August 2015, NSA announced that it is planning to transition "in the not too distant future" (statement of 2015) to a new cipher suite that is resistant to quantum attacks. "Unfortunately, the growth of elliptic curve use has bumped up against the fact of continued progress in the research on quantum computing, necessitating a re-evaluation of our cryptographic strategy." NSA advised: "For those partners and vendors that have not yet made the transition to Suite B algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum resistant algorithm transition.” https://en.wikipedia.org/wiki/NSA_Suite_B_Cryptography#cite_note-nsa-suite-b-1
What these organizations both advice is to start taking action. They don't say "implement this type of quantum resistant cryptography now". They don't say when at all. As said before, the "when" question is one that is a hard one to specify. It depends on the system you have, the value of the data, the consequences of postponing a security upgrade. Like I said before: you just run a blog, or a bank or a cryptocurrency? It's an individual risk assesment that's different for every organization and system. Assesments do need to be made now though. What time frame should organisationds think about when changing cryptography? How long would it take to go from the current level of security to fully quantum resistant security? What changes does it require to handle bigger signatures and is it possible to use certain types of cryptography that require to keep state? Do your users need to act, or can al work be done behind the user interface? These are important questions that one should start asking. I will elaborate on these challenges in the next articles.
Besides the unsnswered question on "when", the question on what type of quantum resistant cryptography to use is unanswered too. This also depends on the type of system you use. The NSA and NAS both point to NIST as the authority on developments and standardization of quantum resistant cryptography. NIST is running a competition right now that should end up in one or more standards for quantum resistant cryptography. The NIST competition handles criteria that should filter out a type of quantum resistant cryptography that is feasable for a wide range of systems. This takes time though. There are some new algorithms submitted and assessing the new and the more well known ones must be done thouroughly. They intend to wrap things up around 2022 - 2024. From a blockchain perspective it is important to notice that a specific type of quantum resistant cryptography is excluded from the NIST competition: Stateful Hash-Based Signatures. (LMS and XMSS) This is not because these are no good. In fact they are excelent and XMSS is accepted to be provable quantum resistant. It's due to the fact that implementations will need to be able to securely deal with the requirement to keep state. And this is not a given for most systems.
At this moment NIST intends to approve both LMS and XMSS for a specific group of applications that can deal with the statefull properties. The only loose end at this point is an advice for which applications LMS and XMSS will be adviced and for what applications it is discouraged. These questions will be answered in the beginning of april this year: https://csrc.nist.gov/news/2019/stateful-hbs-request-for-public-comments This means that quite likely LMS and XMSS will be the first type of standardized quantum resistant cryptography ever. To give a small hint: keeping state, is pretty much a naturally added property of blockchain.
Quantum resistant blockchains
“Quantum resistant” is only used to describe networks and cryptography that are secure against any attack by a quantum computer of any size in the sense that there is no algorithm known that makes it possible for a quantum computer to break the applied cryptography and thus that system.
Also, to determine if a project is fully quantum resistant, you would need to take in account not only how a separate element that is implemented in that blockchain is quantum resistant, but also the way it is implemented. As with any type of security check, there should be no backdoors, in which case your blockchain would be just a cardboard box with bulletproof glass windows. Sounds obvious, but since this is kind of new territory, there are still some misconceptions. What is considered safe now, might not be safe in the age of quantum computers. I will address some of these in the following chapters, but first I will elaborate a bit about the special vulnerability of blockchain compared to centralized systems.
Why is it easier to change cryptography for centralized systems such as banks and websites than for blockchain?
Developers of a centralized system can decide from one day to the other that they make changes and update the system without the need for consensus from the nodes. They are in charge, and they can dictate the future of the system. But a decentralized blockchain will need to reach consensus amongst the nodes to update. Meaning that the majority of the nodes will need to upgrade and thus force the blockchain to only have the new signatures to be valid. We can’t have the old signature scheme to be valid besides the new quantum resistant signature scheme. Because that would mean that the blockchain would still allow the use of vulnerable, old public- and private keys and thus the old vulnerable signatures for transactions. So at least the majority of the nodes need to upgrade to make sure that blocks which are constructed using the old rules and thus the old vulnerable signature scheme, are rejected by the network. This will eventually result in a fully upgraded network which only accepts the new post quantum signature scheme in transactions. So, consensus is needed. The most well-known example of how that can be a slow process is Bitcoin’s need to scale. Even though everybody agrees on the need for a certain result, reaching consensus amongst the community on how to get to that result is a slow and political process. Going quantum resistant will be no different, and since it will cause lesser performance due to bigger signatures and it will need hardware upgrades quite likely it will be postponed rather than be done fast and smooth due to lack of consensus. And because there are several quantum resistant signature schemes to choose from, agreement an automatic given. The discussion will be which one to use, and how and when to implement it. The need for consensus is exclusively a problem decentralized systems like blockchain will face.
Another issue for decentralized systems that change their signature scheme, is that users of decentralized blockchains will have to manually transfe migrate their coins/ tokens to a quantum safe address and that way decouple their old private key and activate a new quantum resistant private key that is part of an upgraded quantum resistant network. Users of centralized networks, on the other hand, do not need to do much, since it would be taken care of by their centralized managed system. As you know, for example, if you forget your password of your online bank account, or some website, they can always send you a link, or secret question, or in the worst case they can send you mail by post to your house address and you would be back in business. With the decentralized systems, there is no centralized entity who has your data. It is you who has this data, and only you. So in the centralized system there is a central entity who has access to all the data including all the private accessing data, and therefore this entity can pull all the strings. It can all be done behind your user interface, and you probably wouldn’t notice a thing.
And a third issue will be the lost addresses. Since no one but you has access to your funds, your funds will become inaccessible once you lose your private key. From that point, an address is lost, and the funds on that address can never be moved. So after an upgrade, those funds will never be moved to a quantum resistant address, and thus will always be vulnerable to a quantum hack.
To summarize: banks and websites are centralized systems, they will face challenges, but decentralized systems like blockchain will face some extra challenges that won't apply for centralized systems.
All issues specific for blockchain and not for banks or websites or any other centralized system.
Conclusion
Bitcoin and all currently running traditional cryptocurrencies are not excluded from this problem. In fact, it will be central to ensuring their continued existence over the coming decades. All cryptocurrencies will need to change their signature schemes in the future. When is the big guess here. I want to leave that for another discussion. There are enough certain specifics we can discuss right now on the subject of quantum resistant blockchains and the challenges that existing blockchains will face when they need to transfer. This won’t be an easy transfer. There are some huge challenges to overcome and this will not be done overnight. I will get to this in the next few articles.
Part 1, what makes blockchain reliable?
Part 2, The two most important mathematical concepts in blockchain.
Part 4A, The advantages of quantum resistance from genesis block, A
Part 4B, The advantages of quantum resistance from genesis block, B
Part 5, Why BTC will be vulnerable sooner than expected.
submitted by QRCollector to CryptoTechnology [link] [comments]

Three Laws of BTC Bull and Bear Cycle and Its Applications — Freezing Point Forecast — One

Three Laws of BTC Bull and Bear Cycle and Its Applications — Freezing Point Forecast — One
📷
https://preview.redd.it/ithso6k9w7531.jpg?width=750&format=pjpg&auto=webp&s=e87d53120d9cc645b080c070afc5f9b402d56bf3
TOKEN Roll x FENBUSHI DIGITAL
Analyst: Song Shuangjie
Special Adviser: Shen Bo Rin
Guide:
The fourth price-rising cycle of BTC might commence around May 2019. The mainstream institutions join the game and ETF might be the driving force of the fourth round of price cycle.
Summary:
BTC has undergone three rounds of price cycles. ‘It is different this time’ has always been a terrible lesson for investors. The tokens, typical represented by BTC, are special in nature to other financial products, which makes it easily get mistaken that BTC will go up straightly and never decline. When the cycle power works, the asset price, which was thought to create a different history, will collapse. There are 3 major rules of the BTC price cycle:
A. BTC price cycle is closely related to its halving cycle. A complete BTC price cycle lasts for about four years. The price-rising section will commence one year ahead of the time before the output is halved. The BTC output was halved for the first time at the end of November 2012, and before that the BTC price touched the bottom in November 2011. The BTC output was halved for the second time in July 2016, as the BTC price touched the bottom in August 2015. As you can see, each time BTC output halving, is the start of a price-rising cycle, and the price speeding up begins with it.
B. BTC price fluctuation range decreases as market value increasing. The BTC’s (in circulation) market value varies with its price fluctuations, which means BTC’s price rising makes its market value increases, and the price fluctuation range decreases. It is similar to the historical process of other asset classes. During the first price cycle, the price of BTC rose by 10636 times which was the biggest gain, and the maximum drawdown was declined by 93.76%. During the second price cycle, the price of BTC rose by 623 times, and declined by 83.93% maximum. During the third price cycle, BTC rose by 98.57 times at most, the maximum declining has not been confirmed yet.
C. The innovation led by BTC is constantly evolving and more and more approved by the mainstream. From BTC to Altcoin, from Altcoin to Crowdsale, there are iconic innovations and applications in every price cycle. In the first cycle, the birth and gradual application of BTC was a landmark event. In the second cycle, with the re-emergence of BTC in 2013, the tide of the Altcoins was rampant, and a large number of Altcoins appeared. In the third cycle, Crowdsale began to be popular around the world, and many websites started to provide Crowdsale's news and discussion forum. Since 2017, Crowdsale has dominated the blockchain investment, far exceeding VCs and corporate investment. With the development of blockchain technology, the evolution of digital certification, the improvement of practitioners' awareness, and the evolution of government regulation, the innovation led by BTC has evolved and is more approved by the mainstream.
The third round of the price cycle might come to an end around May 2019, and followed by the fourth round of price cycle. The maximum rise in the BTC's fourth price-rising cycle will be smaller than last three cycles. BTC's increasing market value demands more capital. Digital token shall embrace supervision to absorb more institutional funds. ETF will be a viable solution. In the future, it will shift from Crowdsale to ETF, and from deregulation to embracing supervision.
Risk Tips: ETFs have put capital amount into this market less than that we expected. Quantum computer technology is advancing by leaps and bounds
Content
1 The First Round of Price Cycle .
2 The Second Round of Price Cycle
3 The Third Round of Price Cycle
4 Three Major Rules of BTC Price Cycle
4.1 BTC price cycle is closely related to its halving cycle
4.2 BTC price cycle is closely related to its halving cycle
4.3 BTC-led innovatioized by the mainstream
5 The new journey of BTC will Start in May 2019
List of Graphs
Graph 1: BTC Price Trend in The First Price Cycle (in USD)
Graph 2: BTC price trend in the second round of price cycle (in USD)
Graph 3: The number of tokens in 2013 has increased significantly Graph 4: BTC price trend in the third round of price cycle (in USD)
Graph 5: VIX index and BTC price are negatively correlated
Graph 6: Crowdsale has dominated blockchain investment since 2017 (millions of US dollars)
Graph 7: A large number of Crypto Funds were established in recent years.
Graph 8: ETH price trend (in USD)
Graph 9: ETH price is positively related to the size of Crowdsale financing
Graph 10: Lightning network capacity continues to grow
Graph 11: The number of lightning network channels continues to grow
Graph 12: The global Crowdsale growth rate slows down in 2018 .
Graph 13: Crowdsale’s fundraising has started to decline since 2018 .
Graph 14: Significant growth in venture capital in the blockchain sector in 2018
Graph 15: BTC block reward trend reduction
Graph 16: BTC price cycle and halving mechanism (in USD)
Graph 17: BTC market value scale trend increase
Graph 18: BTC price fluctuations become smaller
Graph 19: Admission to mainstream institutions has continued since the end of 2018
Graph 20: The third round of the price cycle may be completed around May 2019
Graph 21: The current stage of the price cycle has been probable more than half, and the downside space is limited
History doesn't repeat itself, but it does rhyme. --Mark Twain
‘It is different this time’ has always been a terrible lesson for investors. The tokens, typical represented by BTC, are special in nature to other financial products, which results in producing an idea, in some investors’ mind, that the price of BTC will go up straightly and never decline. When the cycle power works, the asset price, which was thought to create a different history, will collapse. No matter it is the A-share market of 2007 or the one of 2015, or any ‘bubble time’ in human history, the cycle power played its role. As far as BTC is concerned, its price has also experienced three rounds of cycles.
In addition, when the asset price is in a dark period of continuous decline and weak rebound, the power of the cycle also works. As long as it is a valuable asset, its price will eventually bounce back from the bottom. Opportunities have always been there, if you have an asset with high potential in hand. In the dark moments before dawn, the more you are afraid, the more you will be confused. At this time, you have to believe in the value investing. ‘Be fearful when others are greedy and be greedy when others are fearful’, not the other way around. That means, we shall invest reversely, buying undervalued assets gradually in the bottom region of price decline cycle; selling overvalued assets gradually in the top region of price-rising cycle; and following the trend in other time region of the cycle.
1 The First Round of Price Cycle
The first round of BTC price cycle lasted for 610 days, from March 2010 to November 2011, and in this cycle, BTC price rise rate was the highest of BTCs three price cycles.
The price rise stage of the first round of price cycle, from March 2010 to June 2011, lasted for 447 days. The starting price was 0.003 USD/piece, and the highest price was 31.91 USD/piece, the rise rate reached 10,636 times. The price decline section of the first round of price cycle, from June 2011 to November 2011, lasted for 163 days. In this price decline section, the starting price of BTC was $31.91 per piece, and the lowest price was $1.99 per piece. The decline rate was 94%.
On May 22, 2010, the famous BTC Pizza dealt. Laszlo Hanyecz from Jacksonville, FL, bought two pizzas with 10,000 BTCs. Each price ofBTC is less than 0.01US dollars.
In the first round of the price cycle, there is no explicit positive or negative factors causing BTC's price huge fluctuation. Fluctuations are more like in a “natural” situation. Before the first BTC bubble bursted in November 2011, its price was in a trend of increasing. The reason of rise was that the price base of BTC was very low. With the understanding of BTC gradually getting better, the demand increased, and then, the price rose. For example, June 2011, WikiLeaks and some organizations began accepting BTC donations.
https://preview.redd.it/ol9mlz0kw7531.png?width=688&format=png&auto=webp&s=7f76ac24ef02d785f56c8a770be745cfeddbb1e7
2 The Second Round of Price Cycle
The second round of BTC price cycle lasted for 1377 days, from November 2011 to August 2015, and in this cycle, the price of BTC exceeded gold for the first time.
The price rise stage of the second round of price cycle, from November 2011 to November 2013, lasted for 743 days. The starting price was $1.99 USD/piece, and the highest price was 1,242 USD/piece, the rise rate reached 623 times. The price decline section of the second round of price cycle. From November 2013 to August 2015, lasted for 634 days. In this price decline stage, the starting price of BTC was 1,242 USD per piece, and the lowest price was 199.57 USD per piece. The decline rate was 84%.
At the second price cycle, the range of application of BTC has been greatly expanded. In November 2012, WordPress began to accept BTC; and in October 2013, the world's first BTC ATM was deployed in a coffee shop in Vancouver where customers could buy and sell BTC. In November 2013, the University of Nicosia announced accepting BTC for tuition, the university's chief financial officer called it "gold of tomorrow"; In addition to some underground economy and gray economy began to accept BTC, BTC is also getting closer to daily life.
The success of BTC popularized altcoins. The first type of altcoin LTC (Litecoin) was created in October 2011, and it is the time when the BTC price came to the end of price decline. In 2011, Namecoin and SwiftCoin were born successively. In 2012, Bytecoin and Peercoin were issued, however, BTC was still in the stage of rising slowly from the bottom, and the market was not hot. Along with the re-emergence of BTC in 2013, the tide of the altcoins is rampant, and a large number of altcoins are issued. According to CoinMarketCap data, there were 66 kinds of altcoins at the end of 2013, while there were less than 10 at the beginning of the year.
The safe-haven properties of BTC are widely approved. BTC was a choice for people in many countries that are in crises. The residents flocked to BTC, hoping to maintain assets value through BTC. This phenomenon has occurred many times during the European debt crisis. For example, in early 2013, in order to get the bailout, the Cyprus government imposed taxes on deposits and imposed strict capital controls. In order to prevent property from shrinking, the Cypriot people rushed to bank runs and exchanged their currencies for BTC. The price of BTC quickly rose from 30 something to 265 US dollars.

https://preview.redd.it/slw2443lw7531.png?width=684&format=png&auto=webp&s=33181be556dbfc3a3f0e78e5c6a7674801787951
Due to the lack of supervision, BTC is often affected by negative events, which makes the market confidence in the danger of collapsing. In October 2013, the FBI seized approximately 26,000 BTCs from the Silk Road website, causing the BTC price to collapse to 110 US dollars. On December 5, 2013, the People's Bank of China banned the use of BTC by Chinese financial institutions, which made the price of BTC declined. In February 2014, Mt. Gox, the largest BTC exchange at the time, said that 850,000 BTCs of its customers were stolen, worth nearly 500 million US dollars, and BTC prices fell nearly half, from 867 to 439 US dollars.
The emergence of a large number of altcoins caused market bleeding. Since 2014, the number of altcoins has exploded. By August 2015, the number has reached 556, resulting in diversion of funds and market expansion. On May 1, 2013, BTC accounted for 94.29% of the market value of all tokens, and the market value of other tokens except the top 10 tokens was about 1%. By August 25, 2015, the proportion of BTC is about 83%, and the other tokens account for 4%, which is obvious.
No matter how magical token is, it is still a kind of asset. The mean return of value is a basic common sense of investment. The value will pull the price back to it, just like the gravity. The risk increases with the price rises, and the value appears when the price declines. In the rising section of this cycle, the price of BTC rose by 623 times, which is a great rise rate. When the price is too high, and the potential return in the future is insufficient, the attractiveness to new investors will fall, and the old investors will leave and look for more lucrative assets. Once the power of trend investors exhausted, the trend will reverse.
3 The Third Round of Price Cycle
The third round of price cycle of BTC is not over and is currently in the downward phase of the cycle. The price increased from August 2015 and lasted for 845 days till December 2017. The starting price of the price-rising cycle BTC was 199.57 USD/piece, and the highest price was close to 20,000 USD/piece. The rise rate is up to 99 times. Since December 2017, the price started to decline. The price has fallen to the lowest 3,191.30 US dollars up to now, a drop of 84%.
BTC networks expanded rapidly, and BTC has gained increasing recognition among legislators and traditional financial companies. Studies have shown that by November 2013, the commercialization of BTC is no longer driven by the underground economy, but by legitimate businesses. During this price cycle, people from more countries can get in touch with, select, trade and use BTC on a daily basis. In January 2016, Bitcoin computing capacity reached 1 exahash/S for the first time; In March 2016, the Japanese cabinet acknowledged that BTC has a function similar to real money. In 2017, Norway's largest online bank Skandiabanken integrated BTC accounts. In December 2017, Chicago Mercantile Exchange (CME) officially launched BTC futures, which is an important step for BTC to take toward mainstream investment. In October 2018, Fidelity launched its independent subsidiary Fidelity Digital Asset Services to provide digital asset services to institutional customers. In December 2018, the first round of financing was completed by the token exchange Bakkt launched by the Intercontinental Exchange. In February 2019, Nasdaq officially launched - Bitcoin Liquid Index (BLX) and Ethereum Liquid Index (ELX)- two indexes. The pension fund of US invests in the encryption fund, the mainstream organization is accelerating, and the relevant infrastructure is gradually improved.
BTC has become a risky asset. Under the current “three lows” environment - low interest rates, low spreads and low volatility, investors are seeking high returns, which leads to excessive financial risk behaviors and complacency, investors' risk appetite, and high leverage tools and the acceptance of high-risk products has increased, arbitrage transactions have prevailed, liquidity mismatches have been severe, and the overall market is fragile. As the results we can see that, the price of BTC is increasingly correlated with the VIX index (Chicago Options Exchange Volatility Index). A lower VIX index indicates that investors expect less volatility, while a higher VIX indicates higher expected volatility. The lower VIX index indicates that investors are optimistic about S&P 500, while the higher VIX means that investors are uncertain about the market outlook. When market volatility declines, investors buy stocks and other types of risk assets, when the market volatility rises, investors sell risky assets.
Risk assets will be dumped when risk appetite reduces panic market. BTC bid farewell to the nature of safe-haven assets and become a risky asset. Since December 2017, with the decline of the VIX index, the price of BTC rises, and the price of BTC is negatively correlated with the VIX index. At the beginning of 2018, the VIX index skyrocketed and BTC fell rapidly. In October 2018, the global market risk aversion trend increased, the VIX index went up, and the BTC price also fell sharply.

https://preview.redd.it/49ld77xlw7531.png?width=664&format=png&auto=webp&s=af5b7ff492fe7e8253640f9e6df7820a10c59f52
Crowdsale has become the main financing method in the blockchain field. Crowdsale was born in the second round of the price cycle, Mastercoin did the world's first Crowdsale in July 2013. In 2014, Ethereum also raised funds through Crowdsale, when the price of ETH was less than 0.22 USD per piece. After 2016, when it is in the third price cycle, Crowdsale is popular around the world, and many websites began to provide information and discussion communities for Crowdsale. From a global perspective, Crowdsale has dominated the blockchain investment since 2017, far exceeding VCs and corporate investment. In 2017, Crowdsale raised 7.4 billion US dollars, and in the first half of 2018, Crowdsale Raised 12 billion US dollars.
The Crypto Fund emerged. Along with the Crowdsale boom, a large number of Crypto Funds were created. The number of Crypto Funds newly established in 2017 was nearly 200, far exceeding the total amount of the Crypto funds created in previous years, which fully demonstrated that, with the rise in the price of the token, the enthusiasm of funds to blockchain field is high.

https://preview.redd.it/31badgpmw7531.png?width=659&format=png&auto=webp&s=3e7bdf4dbf07b83d405298aa57424e2b61b5d84a
The rise of blockchain 2.0, the Crowdsale tide pushed ETH up nearly 10,000 times. In the third round of the BTC (Token) price cycle, the biggest star is not BTC, but ETH. Crowdsale after 2016, issued tokens mainly through Ethereum, which represented the rise of ETH in the blockchain 2.0 era. Crowdsale prosperity boosted the rise of ETH. On January 13, 2018, the price of ETH rose to a peak of 1,432.88 US dollars per piece, which is 6512 times rise rate comparing to its initial price.
The ETH price has a significant positive correlation with the growth rate of Crowdsale financing. The growth rate of Crowdsale financing decreased by 69.23% in 2015, the price of ETH decreased by 66.30% in the same year. In 2016, the growth rate of Crowdsale financing increased by 2737.5%, and ETH increased by 753.74%. In 2017, the growth rate of Crowdsale financing increased by 3,159.91%, and ETH rose by 8809.91%.

https://preview.redd.it/ssvz3bonw7531.png?width=660&format=png&auto=webp&s=b91b15aaa7fc4333a7bf1b0bca1fb3bf7ac6fc67
Plan for public blockchain performance improvement emerged, and significant progress were made in lightning network. With the popularization of blockchains, the congestion of BTC and other public chains has gradually emerged, and performance has become one of the bottlenecks in the blockchain industry. In 2018, the performance-improvement plan of the public blockchain emerged. Improvements were made to the difference in blockchain logical architecture, including on-chain capacity expansion schemes by improving consensus mechanism and sharing, and off-chain capacity expansion schemes by status channel, sidechain, off-chain computing, and Layer 0 expansion scheme that enhance the scalability of the blockchain by optimizing the underlying data transmission protocol of the blockchain. Since the main net of BTC lightning network goes live, the number and capacity of channels have been increasing. As of March 10, 2019, the capacity has reached 790 BTC, and the number of channels has reached 35,464.

https://preview.redd.it/qfgryviow7531.png?width=660&format=png&auto=webp&s=59f8f45fb4320fcbf1dff1b50925cb9a8bfb9a7a
Note: The Unique channel refers to the channel that is directly connected to the node for the first time, and the Duplicate channel refers to the channel between the nodes that have been connected.
The standardization of the token is promoted. On January 22, 2018, South Korea required all BTC dealers to disclose their identity, thereby prohibiting anonymous trading of BTC. During the first quarter of 2018, Facebook, Google and Twitter prohibited the promotion of Crowdsale, while the US Securities and Exchange Commission investigated a large number of Crowdsale projects, and issued bans to some Crowdsale projects. Regardless of the government's attitude towards the token, it is committed to incorporating the token into the regulatory framework for legal compliance.
The Crowdsale bubble bursted and the magical story is no longer magical. According to incomplete statistics, in 2017, 871 Crowdsale were completed in the world. These projects involved directions as distributed analogous Facebook, twitter, amazon, and next-generation public chain (blockchain 3.0), etc. These projects have raised a large amount of funds, but the actual operating is worrying. The promotion of the project dissipated a large amount of funds, but the actual development progress was far less than expected, resulting in the market's expectation failure and the diversion of funds from the mainstream token. Superimposed the impact of more and more negative news, technical adjustment requirements and market sentiment fluctuation. The market enters a negative cycle, as the decline begins.

https://preview.redd.it/s51gsunpw7531.png?width=677&format=png&auto=webp&s=f3a2e01c57eece54c9d442b141194faec083350a
In 2018, there has been rapid growth in venture capital in the blockchain sector, indicating that venture capital still have good expectations about the application and future prospects of the blockchain. According to Coindesk data, the risk investment in the blockchain sector in 2018 reverse the decline of 2017, year-on-year increase of 257%, and the total amount for the year 2018 reached 3.1 billion US dollars.

https://preview.redd.it/7bujn1fqw7531.png?width=452&format=png&auto=webp&s=5719239aa4f3447b4320ea47dbe88eec766cdcae
BTC peaked first. In terms of time, in the third round of the price cycle, the first to peak is BTC, which reached 19,870.62 USD per piece in December 2017. The peak of ETH happened later than BTC, in January 2018. EOS did not peak until April. The important reason for BTC to peak first is that the amount of funds needed to support the BTC market value scale is the largest. When the market’s ability to carry on is not enough, it is inevitable for the price of BTC to react first.
4 Three Major Rules of BTC Price Cycle
The price cycle of BTC has obvious regularity, and some unchanging factors determine the price fluctuation of BTC.
4.1 BTC price cycle is closely related to its halving cycle
One full BTC price cycle lasts approximately four years. In the first round of price cycles, the measure of time span is not reliable because of the availability of BTC trading prices. The second round of the price cycle lasted for 1,377 days, from November 2011 to August 2015, about four years.
The price-rising cycle of BTC is closely related to its halving period, and the price-rising cycle starts one year before each halving. At the end of November 2012, the first production of BTC was halved, that is, the number of BTC generated by each block was 25, and in November 2011, the price of BTC has bottomed out, and the halving of BTC is one year after the second price-rising cycle. In July 2016, production of BTC was halved the second time, that is, the number of BTC generated by each block was 12.5. In August 2015, BTC had already bottomed out, and BTC's production was reduced again one year after the third price-rising cycle started.

https://preview.redd.it/9529268rw7531.png?width=445&format=png&auto=webp&s=fe1050eefe6d70403ddcdc053bdbccb0bc47818f
BTC output halving blows the horn of each price-rising cycle, and the price speeding up begin. Although it is not BTC output halving that brings the price-rising cycle, but the halving of BTC output significantly reduced the growth rate of BTC supply, speeding up the rise of BTC price and the price-rising cycle. From November 2011 to November 2012, before the halving of BTC output, BTC increased by 6.74 times in one year. From November 2012 to November 2013, BTC price increased by 99.57 times. In the third price-rising cycle, BTC price rose by a maximum of 2.87 times in about 11 months before the production cut. After halving, BTC price rose by a maximum of 29.73 times in about 11 months.

https://preview.redd.it/dft83mprw7531.png?width=687&format=png&auto=webp&s=82014d03eaee7136a6995a1b2df1faa9d22c6a5f
4.2 BTC price cycle is closely related to its halving cycle
The change in the market value scale of BTC (circulation) is mainly caused by its price fluctuations, and has little to do with the changes in the total amount of BTC output. According to CMC data, by April 28, 2013, the total amount of BTC that had been mined was about 11.18 million pieces, which is more than 53% of the total amount of BTC of 21 million pieces. The halving mechanism of BTC also accelerated the marginal decline of BTC total growth rate. Compared with the amount of BTC already mined, the new supply of BTC is very insignificant. In addition, the volatility of BTC prices far exceeds the volatility of BTC's total output, and the market value of BTC fluctuates with its price.
The market value of BTC has increased in trend. Because of the trend of BTC price-rising, the number of BTC total output has also increased in one direction, and the market value of BTC has increased in the long run. According to CMC data, on April 28, 2013, BTC's market value in circulation was only 1.5 billion US dollars. By the peak of the third price-rising cycle, the market value increased to 326.1 billion US dollars, and the current market value also reached 113.8 billion US dollars, increased by 74.87 times.
The price volatility of BTC is gradually getting smaller. With the increasing of BTC market value in trend, the BTC market is becoming more and more mature, more and more accepted by the public, more and more professional organizations are participating, the compliance operation is becoming mainstream, and the BTC price volatility is decreasing. Similar to the historical process of other asset classes, and the same thing is repeated again and again. In the first price cycle, the price of BTC increased by 10636 times, and the fell by 93.76% maximum. In the second price cycle, the price of BTC increased by 623 times, and fell by 83.93% maximum. In the third price cycle, the maximum increase of BTC price was 98.57 times, and the biggest decline has not been confirmed

https://preview.redd.it/kmk5qeesw7531.png?width=674&format=png&auto=webp&s=bf9d8fd61b833c87c3f859a3bf0f4f63b9c0ff88
4.3 BTC-led innovation continues to evolve and is more and more recognized by the mainstream
From BTC to Altcoin, from Altcoin to Crowdsale, there are iconic innovations and applications in every price cycle. In the first cycle, the birth and gradual application of BTC was a landmark event. In the second cycle, with the re-emergence of BTC in 2013, the tide of the Altcoins was rampant, and a large number of Altcoins appeared. In the third cycle, Crowdsale began to be popular around the world, many websites started to provide Crowdsale's news and discussion forum. Since 2017, Crowdsale has dominated the blockchain investment, far exceeding VCs and corporate investment.
The original intention of Nakamoto to create BTC is to establish a more efficient means of trading that can be electronically transferred in a safe, verifiable and non-tamperable form. During the early days of bitcoin and blockchain development, this drove the development of most applications of BTC and blockchain. However, with the development of blockchain technology, the evolution of digital token, the recognition of practitioners, and the evolution of government regulation, the changes led by BTC continue to evolve and gain more mainstream recognition.
More and more countries recognize that the blockchain reflects its unique value in many fields. The government has gradually incorporated digital token into regulation, and mainstream institutions are increasingly recognizing BTC. In 2017, the Chicago Mercantile Exchange (CME) officially launched BTC futures, as BTC took an important step toward mainstream investment, improving the accessibility of BTC to traditional financial institutions. In March 2017, Cameron's Cliveworth and Taylor W. Crawworth brothers attempted to submit an application to the US Securities and Exchange Commission for BTC ETF (transactional open-ended index fund). Although on September 22, 2018, US Securities and Exchange Commission rejected nine BTC ETF applications, the approval of BTC ETF application is a high probability event in the long run. With the continuous improvement of related infrastructure and the gradual maturity of the market, the pace of institutional entry has shown signs of acceleration. Since the end of 2018, news about the organization of encrypted assets by mainstream institutions has continued.

https://preview.redd.it/pf0u2patw7531.png?width=349&format=png&auto=webp&s=eb603172001520e62eee309e8d37df44c4f8bad9
5 The new journey of BTC will Start in May 2019
The fourth price-rising cycle of BTC will start in May 2019, and mainstream institutions will enter the market, while ETF may become the core trend of the fourth round of BTC price cycle.
From the perspective of supply, the third halving of BTC begins around May 21, 2020. The price-rising cycle of BTC is closely related to its halving period. The price-rising cycle starts about one year before halving. From this perspective, the BTC price-rising cycle may be opened around May 2019.

https://preview.redd.it/29dzwhwtw7531.png?width=695&format=png&auto=webp&s=7e69a27442cd093611027fd067cb4bbd784cb2b0
From the time dimension, the complete BTC price cycle lasts for about four years. The third round of the price cycle, which started in August 2015, will be completed around August 2019, and the fourth round of the price cycle of BTC will begin thereafter. Considering that the data in the second round of the price cycle is more reliable, only the second round of price cycle data is used as the measurement standard, the complete price cycle is 1377 days, about 3 years and 9 months, and the third round price cycle may end around May 2019.
Combined with the previous two BTC price cycles, the downturn phase of the current price cycle has been probably more than half, and further downside space is limited. In the first two rounds of the price cycle, the duration of the downlink phase is less than the duration of the uplink phase. The duration of the third phase of the price cycle has been confirmed (845 days), while the duration of the downturn phase has been more than half of the upstream phase (450 days). From the first two rounds of the price cycle, the rapid decline in prices occurred in the early stage of the downtrend phase. The price fluctuations of BTC in the second half of the downturn phase have been significantly reduced. The BTC price declines reached 61% in the first half and 74% in the second round of the price cycle, and the corresponding maximum declines in BTC were 94% and 84% respectively. In the current round of the price cycle, the biggest drop has reached 84%, so take it from now, even if the price is further down, the downside space is already limited.
https://preview.redd.it/kra7vduuw7531.png?width=684&format=png&auto=webp&s=4f1eda32d42a15b4e34ebfa5dbdaee78065ab110
Note: The data of the third round of the price cycle and the total duration are up to March 12, 2019.
From the price dimension, the downside space of the current round of BTC prices is limited, and the maximum increase of BTC's fourth price-rising cycle will become smaller. In the first price cycle, the price of BTC increased by 10636 times, and fell by 93.76% maximum. In the second price cycle, the price of BTC increased by 623 times, and fell by 83.93% maximum. In the third price cycle, the maximum increase of BTC price was 98.57 times, and the biggest decline has not been confirmed. On February 6, 2018, BTC fell to a minimum of 3,191.30 US dollars per piece, drop by 84.07%, has reached the low of second round of price cycle, from the perspective of price adjustment, BTC price downside has been more limited. The maximum increase in the fourth price-rising cycle of BTC will be smaller.
From the perspective of risk, after a year of continuous adjustment, BTC prices have fully fallen, risks have been gradually released, and investor’s risk appetite has risen to create favorable conditions for BTC prices to stabilize. Beginning at the end of December 2018, the VIX index has fallen, and now it has reached 15 or below. The investor's risk appetite has gradually picked up, creating favorable conditions for the BTC price to rise stably.
Last but not least, from the perspective of capital, the mainstream institutions accelerated their entry and many positive signals were released. With the continuous improvement of related infrastructure and the gradual maturity of the market, the pace of institutional entry has shown signs of acceleration. Since 2018, on the one hand, the entry of mainstream institutions can bring incremental funds to the entire market, on the other hand, it also contributes to the formal development of the entire industry.
The value of the BTC's market value in circulation continues to increase, and the digital token embraces regulation. It is expected that the ETF will be the core trend in the fourth price cycle. As the value of the BTC and digital token market increases, their use will be more tied-up to legitimate use than illegal activities. According to the US Drug Enforcement Administration (DEA) data, only 10% of the current BTC transactions is related to illegal activities and 90% is used for legal transactions. BTC's increasingly large market value requires more financial support. Digital token will embrace supervision to absorb more funds, and ETF will be a viable solution. In the future, there is going to be an evolution from Crowdsale to ETF, from regulation to embrace supervision.
Note:
Although in this report, we try to predict the bottom and time of Token, especially BTC, by using time and space cycle, we would like to tell investors that it is very dangerous to invest basing on a specific dot and time. An investment shall base on the assessment of the value of the token.
Here are our suggestions: 1. Do not try to predict the market. Mistakes are liable to happen when you try to predict market harshly. 2. Feel the cycle. Cycle is always there, because of the constant human nature;3. Be with a good Token, which will bring you more chance to win. 4.Keep valuation in mind. The most important thing in value investing is to keep the valuation in mind. If the price is reasonable, everything is getable. The key is the difference between price and value (Absolute valuation method is not available with Token because of its specialty. However, a relative valuation method can be applied. Please refer to Token Toll’s report series).
Notions:
For some reasons, some definition in this report are not very defined, such as: Token, Digital Token, Digital Currency, Currency, Crowdsale, etc.
If you have any questions, be free to call us to discuss with us.

https://preview.redd.it/bjnu2hjvw7531.png?width=698&format=png&auto=webp&s=43df46d8337c63a52b8a7089ed5e24360f3b281d
submitted by Token_Roll to u/Token_Roll [link] [comments]

Interview with the CEO of Swap.Online Alexander Noxon

Interview with the CEO of Swap.Online Alexander Noxon
Today our official representative, Vladislav Sopov, interviewed Alexander Noxon, CEO of SwapOnline. Alexander answers the most interesting questions about yourself, blockchain-industry favourite games and shares his thoughts about the future!
Alexander Noxon
Please introduce yourself.
Sasha Noxon, programmer, website developer.
What determined your personal development as a programmer and developer?
The market as such. From the age of 16, I accepted orders on Freelance.ru. I was engaged in everything that brought money. I will not be revealing a secret when I say that mostly it was business websites and online stores.
What projects can you be proud of from those days?
First of all, the website https://pozvonim.com — a feedback widget for sites. In second place, perhaps, the copywriting exchange noxon-text. It no longer functions now.
You said “programmer”. And you can call yourself an entrepreneur?
Of course, I am an entrepreneur. In this regard, I was interested in the blog Spryt.ru back in the day. It was run by a schoolboy earning from advertising on his websites. At the same time, for me there is no division, or an evolution of some kind. I was the creator of websites, worked for a guy, then grew up and became an entrepreneur. No, at different periods of my life I could earn more both from my own projects, and from work for others. I do not think that this is a linear process.
The most predictable question. How did you get to blockchain? What about it attracted you?
It began with an interest in Bitcoin in 2012. As trivial as it sounds, I was attracted to the idea of ​​a free internet currency. Free in terms of emissions, in terms of movement. This is not something that Russia or the US can block. This is more understandable money for me.
So you’re cryptoanarchist?
By no means. I respect cryptoanarchists, I’m interested in them, they are cheerful dudes. But I never considered myself as one of them. Anarchy is not the final state of affairs that the world of cryptocurrencies strives to. On the contrary, anarchy is inadmissible in it.
In which projects you have worked?
Until 2016, I was rather an explorer, not a practitioner. You can learn more about this in my Github. Mostly, I investigated the practical application of smart contracts, IPFS technologies, the properties of ERC-20 tokens. Since 2017, I have headed DAO Casino as a technical director.
“I am not expecting any owners of oil companies”
You saw a huge number of block projects. What good and bad tendencies of 2018 can you name?
It is best to start with the good, isn’t it? (laughs) People had just started understanding cryptocurrencies — what is good and what is bad. They started believing less, and thinking more. Even more important is that the exchanges are now releasing their own tokens, and this leads the macroeconomics of cryptocurrencies to a new level. The model works worse when someone is sitting on commissions from exchange platforms, which they once created. The profitability of the product tokens, in particular the crypto exchanges, depends on the quality of their work, and this is much more important for the community as a whole. Finally, it’s very cool that people are starting to pay attention to cross-chain projects (like Lightning network).
But even unpleasant things are still common. First of all, this is the inertia of investors who cannot affect the teams that they have entrusted their money to. It’s no secret that before the advent of the ICO, the motivation of the team is very high, but new motivation is needed after a successful crowdfunding campaign. In this regard, a large influx of Ether into the industry has served it poorly, as some have been spoiled, others have been deceived. Maybe this is why really big investors are not yet in a hurry to enter this sector…
Another trend! And who is a big investor for you? Where did he get the money?
Investors in this case, above all, are people who have made money on the 2013 and 2017 cryptocurrency boom. It is them first and foremost. The rate of Ether has grown, and they have a lot of money, that’s all.
And, for example, old fat cats, owners of oil companies and others? If you say “big investors are in no hurry” when should we be waiting them?
Look, I do not even think about it. You do not need to think about it. It’s unproductive to wait for these people. The worst thing is that even worthy products from strong teams are now finding it harder to raise the money necessary.
I will tell you another trend, it is neither good nor bad. Now there are a lot of funny ICOs, where people work “as fans”. They just like the idea, it cheers them up, and they invest money in it. These people do not hope for a large income in the foreseeable future from their purchased tokens. It’s something like donating money in games.
So you say “worthy project”, “cool project”? And which projects are the best?
All off-chain and cross-chain ones, especially those that work directly with Bitcoin, which for me remains number 1. Well, and decentralized exchanges with their coins. The future belongs to them, I will not tire of repeating it.
Are there bad projects?
There are no such projects. I will not be hating any projects. Whoever gets the money is good, and they are awaited on the market. And it is good as long as they get the money. Nothing new compared to the “old” economy.
“It is always difficult with strong people”
You directed many projects. Who are you recruiting?
This is very difficult! (laughs). Always in different ways, depends on the task.
No, we need an answer to this question. Let us take another avenue of approach. What is the main principle of your relationship with the team?
Our principles of interaction and payment are published on the site, they can be found. The policy of payment necessarily implies the payment of a part of the work with the tokens of the project.
Payment request form on the site. Any employee receives part of the earnings in SWAP tokens.
I am an adherent of a cautious approach to the freedom of the employee and his schedule. While a person works well, while he has a lot of responsibilities, and he does not fail us, then I’m ready to give him the opportunity to work where he wants and as much as he wants. As the scope of responsibility decreases, the tasks become more specific, a person should go to the office, work on site so that I and others see him.
With strong people it’s always difficult. Strong people are hard to force to work for a common cause. You cannot force a strong programmer to do what you need, but it’s not interesting to him. Of course, a lot can be achieved with money, many are motivated by it, but in the case of really strong people, we are talking about absolutely non-market amounts.
If I pay a lot, then the person works well, and he is interesting to me, and I’m interested in him. It’s the other way around if I pay little.
Are there any categories of people you will not work with or will you quickly fire?
There are. The most dangerous people, whom I will never tolerate, are those who do not adequately assess their competence in different areas of the case, and seek to tell others how to work correctly. You have not done any of “your” tasks, but you are already advising one guy, giving orders to the second one, and criticizing a third! Such people, fortunately, are becoming a rarity, but they are very toxic to the team. As for everything else, everything is trite — I do not like lazy people, who must be constantly kicked, dreamers, projectors, etc. I do not believe in evolution here, by and large. If a person is not a professional, you will not be able to turn him into a professional, or even an average performer.
Swap.Online is the only way”
How and when did the idea of ​​Swap.Online appear? Probably, you will not even be bale to mention an exact date…
On the contrary (opens the computer). On November 22, 2017, in Facebook, I laid out the design of how to exchange a token for Bitcoin. Then I described this as a possible solution for exchanging fiat money and Bitcoin for the tokens of decentralized applications. I made my post in one of the Telegram chats for enthusiasts of the Ethereum blockchain. After some time, an investor wrote to me and said that he saw this text, and some of my smart contracts, and that he liked these ideas. Within a few months, we agreed on the terms, signed the agreement and I left the previous team.
Are not you afraid that by spreading these thoughts in FB that the idea of ​​the project will be simply stolen by someone who is cunning and technically savvy?
No. Open Source in this case is the same as publishing the idea of the likes of ​​”I’m building a house, it has walls and a roof, as well as five floors and an entrance.” Nothing more. The implementation has nothing to do with this, and it will never suffer.
Well, at that time, in terms of implementation, were there some alternatives besides Swap.Online?
No. It was the only way.
But, after all, everyone was fine with centralized exchanges for some time? When did you realize that the time for decentralization has come?
You know, they are satisfied with almost everything nowadays. DEX is the technology of tomorrow, if not the day after tomorrow.
The time has come for some bold predictions from Alexander Noxon. When will the turnover of decentralized exchangers exceed the turnover of centralized ones?
In 2019.
Very soon! What problems of centralized exchanges your Swap.Onlinewill resolve?
First, it is the freezing of funds in the KYC / AML policy types. On many sites of this kind, for example, on the Korean exchange Bithumb, you can have as much funds as possible, and you will be asked for many documents that you cannot always provide when you decide to withdraw them. When you enter the money, you do not know whether they will give it to you the next time.
Secondly, this is the rate of exchange. The hour is nigh when no one will want to wait for 10 to15 minutes to exchange the Ether to Bitcoin. One or two minutes is what we offer our users.
Thirdly, this is reliability. We do not keep your money, we cannot break something and steal it. There are other risks, they are being worked on, for example, the risk of domain locking, in this case, the affected users may suffer, but we will necessarily make isolated desktop applications.
The cherry on the cake is the rate of our transaction commission. It is zero percent. It’s very easy to remember. Mining fees are 20 cents.
Impressive. Who is your target audience?
Well, first of all, the “hodlers”. These are participants of the cryptocurrency market, who tend to hold their assets for a long time without participating in short-term exchange trading. As a rule, they have a lot of cryptos and they are afraid to transfer them on the classic centralized exchanges. I outlined the reasons above.
In addition, highly-informed people, like blockchain geeks, they will come to us. They are interested in the technological side of the exchange and they tend to use the advanced technologies that we will offer.
And who will surprise you if they come to Swap.Online? Who is the “no-purpose” audience?
Interesting, I have not thought about it. Probably, corporate financial clients. Here, “Alfa-Bank”, for example, will surprise me if they come asking for advertising.
Now three short questions about your project. What is its weakest side?
We are young. Unavoidable explosive growth can demotivate the team. But I already faced this in 2013 and 2017, and I derived an important rule from those events, and that is that you need to have global goals and never stop even if everything is very straightforward.
Does it have a scalability limit, ultimate throughput, or something like that?
There is nothing like that.
In a nutshell, turn to the people who are visiting Swap.Online for the first time.
Leave me your mail: it will be interesting.
“I will play Civilization V”
Let’s talk about the future in the end. Can blockchain change the world, and if so, in which direction?
Yes and no. On the one hand, it’s very good that many people have become interested in Bitcoin in 2017, generated wallets, bought coins. Their life will become more prosperous, reasonable and interesting, and this is very cool. On the other hand, some of the fundamental problems of planet Earth cannot be solved by blockchain technologies.
Be Isaac Asimov. Now there is blockchain, tomorrow there is cross-chain and off-chain. And then what? What’s next?
I think at some point quantum computers, fourth-dimensional technology, time warping, all of them will be involved in this. It is very difficult to describe this now. Probably, everything will begin with quantum computers.
The last question for today. The day has come when you are tired of cryptocurrency and blockchain. What will you do on that day?
The answer is simple: computer games.
Games? Write them? Play them?
Write them.
Favorite game?
“Civilization V”.
Interview with the CEO of Swap.Online
Alexander Noxon
"The world of the cryptocurrencies will not allow anarchy to dominate"
We hope you liked it!

Swap.Online Essential Links

Website: https://testnet.swap.online GitHub: https://github.com/swaponline Email: [email protected] Telegram: https://t.me/swaponline Facebook: https://www.facebook.com/Swaponline Twitter: https://twitter.com/SwapOnlineTeam Wiki: https://wiki.swap.online/ Bitcointalk: https://bitcointalk.org/index.php?topic=4636633
submitted by noxonsu to SwapOnline [link] [comments]

[Spoilers S2E11][Theory] The Annexation of the Democratic Republic of the Congo

Earlier this season we saw former Evil Corp CTO Terry Colby speaking with Evil Corp CEO Phillip Price. Price asks Colby to
pull some strings with an ambassador friend around a UN vote to help pave the way for China to annex the Congo. It may be just an(other) example of Phillip’s unassailable God complex or it could be a clue as to what Phillip and Whiterose have been scheming. Or both (S2E10 episode recap).
So, why the Democratic Republic of the Congo (DRC)? What do we know about the DRC that is true beyond the scope of Mr. Robot the television series?
The Mining industry of the Democratic Republic of the Congo is a significant factor in the world's production of cobalt, copper, diamond, tantalum, and tin, and gold as well. It is the Democratic Republic of the Congo's largest source of export income. In 2009, the Democratic Republic of the Congo (DRC) had an estimated $24 trillion in untapped mineral deposits, including the world's largest reserves of coltan and significant quantities of the world's cobalt (Wikipedia).
Earlier this year, Bloomberg reported that:
Chinese companies that buy cobalt from the Democratic Republic of Congo and supply mobile-phone and laptop makers such as Apple Inc. and Samsung Electronics Co. aren’t fully checking their suppliers and may be acquiring the mineral from mines that rely on child labor, Amnesty International said.
Let's disregard the whole child labor aspect here as it is not relevant to the story. The takeaway is that China already has deep roots in the DRC, as does the tech industry, of which we can assume Evil Corp can be included. In fact, the relationship between China and the DRC dates back to 1971.
In May of this year, the Financial Times reported that a Chinese corporation made the largest private investment in the DRC's history,
designed to secure China’s supplies of cobalt.
Furthermore,
“The majority of the cobalt is heading straight to China,” said Edward Spencer, an analyst at metals consultancy CRU. “Their global hold is huge.”
If the Tenke mine deal goes through, Chinese companies will be responsible for around 62 percent of global refined cobalt production next year, according to CRU estimates. Demand for the material is expected to soar by more than two-thirds over the next decade.
To put things in perspective, Mr. Robot the television series is currently in 2015, still dealing with the aftermath of the events of 5/9. This Chinese deal in the DRC may be indicative of things to come in the future of the Mr. Robot universe. For the time being, it is reasonable to assume that the Dark Army, White Rose & the Chinese Government must still leverage their relationship with Price & Evil Corps to gain access to Cobalt and/or other rare earth elements/minerals, as well as their R&D department.
And now for the Tinfoil
What gives? We should consider two possibilities here, but likely some combination of the two:
Remember, White Rose has been working for 20 years on a mysterious project housed in an Evil Corp's facility in Washington Township, NJ. Back in the real world, research and/or interest in the field of Quantum Computing dates back further than just 20 years. More importantly, there has been considerable progress made in recent years, even as recently as last month at the University of Maryland.
The University of Kentucky reported on just such a breakthrough back in 2012:
An important step toward fabrication of spintronics ("the Holy Grail," Menon says) is finding a semiconductor that has a net "spin" at room temperature. The biggest challenge is in finding a suitable material and figuring out how to set the spin. The UK-USF team showed that a flat sheet of pure carbon only one atom thick, called graphene, can be suitably engineered and used for this purpose when combined with atoms of the metallic element cobalt.
Using state-of-the-art theoretical computations, the UK-USF team demonstrated that by placing cobalt atoms in graphene "holes," created by removing one or two nearby carbon atoms, it is possible to set the spin states of the carbon atoms in a controlled way, which the researchers say is key to practical spintronics application for graphene.
This was followed up by a scholarly article in 2014, again noting the usefulness of Cobalt in Quantum Computing.
It is quite possible that Evil Corp, along with White Rose & the Dark Army made use of Cobalt in their project. Additionally, some kind of incident involving Cobalt could in turn be cause for the sudden illness that struck Elliot's father, Angela's mother, and others in Washington Township.
The metal [Cobalt] has the unfortunate property of producing a fine dust, causing problems with radiation protection. Cobalt from radiotherapy machines has been a serious hazard when not discarded properly, and one of the worst radiation contamination accidents in North America occurred in 1984, when a discarded radiotherapy unit containing cobalt-60 was mistakenly disassembled in a junkyard in Juarez, Mexico.
If Evil Corps were skirting the law, importing radioactive materials into the US behind the back of the U.S. Nuclear Regulatory Commission, they'd be in serious trouble. If the Feds believed they were building nuclear weapons, their import could be considered an act of treason.
Recall that Angela traveled down to D.C. to visit this very regulatory body after having stolen Evil Corp's Washington Township documents. The supposed "gas leak" could very well be a lie.
Other Considerations
u/laninata got me thinking after their posting about an arstechnica article from October 2015.
Serious weaknesses in the Internet's time-synchronization mechanism can be exploited to cause debilitating outages, snoop on encrypted communications, or tamper with Bitcoin transactions, computer scientists warned Wednesday.
The attacks could be used by malicious actors to wreak havoc on the Internet. An attack that prevented sensitive computers and servers from receiving regular time-synchronization updates could cause malfunctions on a mass scale.
Perhaps the digital signal on Angela's lawyer's television was disrupted by nefarious acts on US soil by the Dark Army.
Even worse, the attacks can be used to snoop on encrypted traffic or to bypass important security measures
attacks could be used to trick Bitcoin users into rejecting legitimate entries in the official blockchain for the digital currency, or to tamper with user authentication systems used by websites
So if a breakthrough in Quantum Computing is at play, Price may believe that he'll be able to cheat the new cryptocurrency system, while White Rose has more devious plans. Perhaps White Rose, the Dark Army & The Chinese Government plan to circumvent the security systems of US Defenses worldwide.
What does MrRobot have to say on the matter?
Closing Remarks
Out of all the tinfoil I have seen on MrRobot lately (more of my thoughts on that here), I feel that Quantum Computing presents the least tinfoil of all the tinfoil, with the exception of Cryptocurrency mining, for what could currently be at play in Washington Township.
It seems Evil Corps is on the verge of collapse, for good this time. If Evil Corps goes under, White Rose, the Dark Army, & the Chinese Government will necessarily need to uproot their operation in Washington Township. Perhaps Stage 2 hinges on Evil Corp's R&D department completing their research on a Quantum Computer, of which the Dark Army immediately plans to steal.
It would seem that in this scenario, with the health of the Global Economy at stake, China's desire to annex the Democratic Republic of the Congo will be the least of the USA's concern. Plus, China will then be able to reap the benefits of a potential $24 Trillion haul. In the short term, a $2 Trillion loss will not matter much.
Thoughts?
The Annexation of the Democratic Republic of the Congo (pt II)
EDIT: Formatting.
submitted by jmarg to MrRobot [link] [comments]

[QUESTION] What exactly is stopping Monero from becoming a honey badger?

I think I can say that I am no longer a noob. I more or less understand how Monero works, and I absolutely love the technology behind it, it is the fuckin future.
yuvzst was kind enough to take me down the Monero bunny hole, and explained to me what a hypothetical quantum computer could do to the current public blockchain. While a quantum computer is a long ways out, and it would be very tedious to crack every single address and transaction, hypothetically the entire blockchain can be stripped down to show public addresses sending to public addresses. Wallets constantly reuse the same public address, and further reuse that public address as a change address. If one stealth address gets tied to you, they would be able to see every transaction made with its corresponding public key.
The wallet reuses its public address so that it can scan the entire blockchain efficiently. Without a quantum computer, nobody can see what your public address is receiving or sending anyways, so why make the wallet all clunky?
Maybe I watch Joe Rogan's podcast too much, but he is always getting inspired by just how fast the human race is evolving. This I guess has rubbed off on me, and I feel like it is inevitable that quantum computers will become ubiquitous. And because of this, I feel like the pre-quantum Monero blockchain will inevitably get stripped bare to just public addresses, especially if Monero moons.
I'll admit, I understand very little about crypto. I know that with hash functions you can only go one way, and with public key encryption you can go backwards with a key. With that being said, it seems like there are already quantum-proof algorithms out there that can just be swapped in. The only downside is that they would take up more space on the blockchain.
If you say a quantum proof Monero with such larger transactions is not scalable, please help me understand why. I have no idea how Ethereum works, but it is somehow both a blockchain and a mega computer running hundreds of apps simultaneously, and it somehow seems to be trucking along just fine. How can that be possible, but larger transactions on Monero cannot?
One reason why I currently love Bitcoin is because it is a fuckin honey badger, and this is probably the most important property of money. Quantum computers will effect it very little, and even with all the hooplah about scaling, using electrum's default settings I always get in the next block for about 34 cents. I'm sure they'll eventually find a compromise to Bitcoin's scaling problems, even if it is way until Bitcoin starts to become truly unusable, but I believe it will happen.
Monero though is so much better for one simple reason: it is truly fungible. If Monero was both fungible and a honey badger, I literally wouldn't be able to throw enough money at it.
Quantum computers may be a long ways out, but they nonetheless still effect privacy and security today. I honestly believe that this issue is more important than anything else (apps/ guis/multisig/etc). It is certainly more important than marketing and being more welcoming. Other cryptocurrencies currently don't need to worry about this at all because everything on their blockchain is already public, they can just put out a patch in the future if they need to. The Monero blockchain needs to be opaque, now and forever into the future, especially with Monero users constantly reusing their public addresses. Monero needs to become fuckin honey badger, and it should be priority #1.
Below are some interesting links I have found. Would any of them work? What exactly is stopping us from fixing this right now? I will literally get a Monero tattoo on my dick or something if the public blockchain becomes quantum proof. Honest to god!
https://en.wikipedia.org/wiki/Supersingular_isogeny_key_exchange
https://sphincs.cr.yp.to/
https://eprint.iacr.org/2012/194.pdf
https://en.wikipedia.org/wiki/Lamport_signature
https://en.wikipedia.org/wiki/Lattice-based_cryptography
https://www.pqcrypto.org
https://research.kudelskisecurity.com/2017/02/01/defeating-quantum-algorithms-with-hash-functions/
submitted by moneronoob12345 to Monero [link] [comments]

I believe blockchain technology will replace international systems of banking and government, TMBR.

The advent of blockchain technology is poised to revolutionize money through popular cryptocurrencies like bitcoin; however, few realize the potential it has to disrupt a myriad of other industries including healthcare, real estate, insurance, art, and even the way nations govern themselves.
Distributed ledger technology, combined with smart contracts, quantum computing security and ubiquitous internet, is the inevitable 21st century method of guaranteeing and coding trust between parties in accurate recordkeeping and transmitting value. Dan Tapscott provides an informative TED Talk for those new to the subject, and this wave of tech is already being used by NASDAQ while central banks are beginning to test the waters.
In short, blockchain removes the middle man of banks by allowing individuals to process instantaneous peer-to-peer transactions on a network where record of the transaction is published and confirmed by every other ledger in the system. Though there are still flaws at present, it far outperforms modern banking and in a few short years the technology will be too efficient and valuable to ignore in a digital society. This democratization of our monetary system turns centuries old institutions on their head and has implications to drastically shift power structures of the entire planet, but the fun doesn't stop with just money. Smart contracts are also self-executing code that will change the way investments, insurance and even the law are handled in society.
Now imagine a political system where you as an individual can read and vote on any legislation at any time on your mobile, debate any topic, and have your vote recorded privately and securely on blockchain. Would you even need an elected representative at that point? "Should our country go to war? Should we bailout this bank or corporation? Should we adjust our system of taxation in this way?" Read, educate yourself, cast your vote and move on - blockchain allows for this. And before you cry "evil direct democracy!", you can even develop a liquid e-democracy through vote delegation to someone you feel is more educated on a specific topic, without the need to elect that person into office. This system is already in development to harness blockchain technology while at the same time reshaping government and global democracy.
The list goes on: recording deeds and property rights, verified credit for artists and musicians, medical record transmission and security... blockchain is a wave of tech that is to internet what internet is to information. The simple concept of an accurate, secure, verified record of history guaranteed by modern computer code will be an advent that will reshape the world as we know it. The only thing stopping it will be ourselves; for example if those whose power is threatened by blockchain refuse the paradigm shift and create violence to stop it, or if we destroy the environment before any of this comes to fruition. All else equal, the quantum leap in information symmetry that blockchain brings should not be taken for granted, and I sincerely believe money, government, and society as a whole will not only change but greatly improve because of it. Thanks for reading and TMBR!
submitted by the_buddhaverse to TMBR [link] [comments]

03-04 20:34 - 'The word "farmer" is interesting, also in the world of today. It makes people think of the people working the land, but those people are generally "farmworkers" or "sharecroppers" or "peasants". If you go to r/farming...' by /u/QuantumBitcoin removed from /r/history within 215-225min

'''
The word "farmer" is interesting, also in the world of today. It makes people think of the people working the land, but those people are generally "farmworkers" or "sharecroppers" or "peasants". If you go to /farming, the regular posters are millionaires who inherited their farms. Random people show up and ask about starting small farms and becoming farmers and are generally laughed at.
And the Norman invasion happened in the 12th century. Do you consider the land that the USA sits on to be "stolen" land? There is an argument to be made that [all private property is theft]1 .
'''
Context Link
Go1dfish undelete link
unreddit undelete link
Author: QuantumBitcoin
1: https://en.wikipedia.org/wiki/Property_is_theft!
submitted by removalbot to removalbot [link] [comments]

Love KSC but don't use your CPU/GPU much for other games? Do IRL Science/R&D with the leftover processing power!

So, a year ago, I got a strong gaming rig with GTX 680, i7 3770k and 16 Gb RAM. But since I got KSP, I haven't played any other game at all. This means that my computer never uses more than 30% GPU, 25% CPU and 25% RAM. What do I do with the rest? I thought, why not make my Kerbals proud and use it for real science research. After all, the greatest benefit that KSP does for society [besides the fun] is the interest in science that it creates.
So I looked around and found Boinc, a virtual supercomputer grid project which uses volunteered computers to do math for research. If it were a physical supercomputer, it would be #4 in the world in processing power. That's what hundreds of thousands of computers all connected but running just ~10% of their processors each can do.
The Project works like so - The volunteer downloads a client which acts as a manager for your share in the donated processing power. You can get it here. Once installed, you can use it set your preferences [Use CPU/GPU only when idle, schedules and usage limits for your processors, etc] and attach to research projects that are a part of BOINC. Having done this, the research project sends your pc a task for processing. Each task is usually just a few MBs in size. After the calculations are done, the result is sent back to be integrated in the research data. You can pause its processing at any time or stop it altogether. It automatically stops when CPU/GPU intensive programs are running. Each research project can be joined or left any time or its priority/processing share adjusted.
Some of the projects include - Calculating protein folding results to aid in medical research for AIDS, Alzheimers, Cancer research etc; Tracking and resolving asteroids and other small celestial bodies; Calculating systems and research data for future missions to other planets [rover systems, transfer rocket statistics, etc]; process chemical, mechanical and quantum properties to use in nanotech research; analyze global weather data for climate change research; so on.
Any thoughts? Lets discuss!
TL;DR - Because KSC is light on processing*, use a small part of the leftover processing power to crunch numbers for Real world research projects as a part of the world's largest virtual supercomputer. Help research Medicine, Cosmology, Nanotechnology,etc.
Ps. *KSC is actually very light in usage. The reason it gets terrible fps or crashes is that the Unity engine it uses does not optimally use current CPU/GPU/RAM capabilities.
Note - This isn't like bitcoin mining.
You can select how much of your processing power is given. You can give 10% of your CPU and 0% of your GPU so it doesn't even affect the temperature or power usage much at all, thereby having a negligible impact on your component life. The important thing is that even just 5% processing from an average computer will make a difference.
PPS. You can copy and paste this to wherever you like if you want to spread the word. If you know a community on the internet or IRL that might like/support this, please share/repost it there.
submitted by aaqucnaona to KerbalAcademy [link] [comments]

Join the world's largest virtual supercomputer & do IRL Science/R&D with your leftover processing power!

So, a year ago, I got a strong gaming rig with GTX 680, i7 3770k and 16 Gb RAM. But since I got KSP, I haven't played any other game at all. This means that my computer never uses more than 30% GPU, 25% CPU and 25% RAM. What do I do with the rest?
So I looked around and found Boinc, a virtual supercomputer grid project which uses volunteered computers to do math for research. If it were a physical supercomputer, it would be #4 in the world in processing power. That's what hundreds of thousands of computers all connected but running just ~10% of their processors each can do.
The Project works like so - The volunteer downloads a client which acts as a manager for your share in the donated processing power. You can get it here. Once installed, you can use it set your preferences [Use CPU/GPU only when idle, schedules and usage limits for your processors, etc] and attach to research projects that are a part of BOINC. Having done this, the research project sends your pc a task for processing. Each task is usually just a few MBs in size. After the calculations are done, the result is sent back to be integrated in the research data. You can pause its processing at any time or stop it altogether. It automatically stops when CPU/GPU intensive programs are running. Each research project can be joined or left any time or its priority/processing share adjusted.
Some of the projects include - Calculating protein folding results to aid in medical research for AIDS, Alzheimers, Cancer research etc; Tracking and resolving asteroids and other small celestial bodies; Calculating systems and research data for future missions to other planets [rover systems, transfer rocket statistics, etc]; process chemical, mechanical and quantum properties to use in nanotech research; analyze global weather data for climate change research; so on.
Any thoughts? Lets discuss!
TL;DR - If you dont frequently use much of your CPU/GPU, use a small part of the leftover processing power to crunch numbers for Real world research projects as a part of the world's largest virtual supercomputer. Help research Medicine, Cosmology, Nanotechnology,etc.
Note - This isn't like bitcoin mining.
You can select how much of your processing power is given. You can give 10% of your CPU and 0% of your GPU so it doesn't even affect the temperature or power usage much at all, thereby having a negligible impact on your component life. The important thing is that even just 5% processing from an average computer will make a difference.
Ps. You can copy and paste this to wherever you like if you want to spread the word. If you know a community on the internet or IRL that might like/support this, please share/repost it there.
submitted by aaqucnaona to Futurology [link] [comments]

Wiki Trader review - Honest review Inside The Cryptocurrency Revolution - YouTube I'm A Teenage Bitcoin Millionaire - YouTube Sans limites TV - YouTube Inelastic electron tunneling spectroscopy  Wikipedia audio article

Quantum Microsoft 25 Zoom and Enhance Technology 6/10 Hubble-o-Scope 50 Zoom and Enhance Technology 10/10 Universal Translator Achievements. Name Unlocks at Points/Total Points Monolingual 1 Universal Translator 1/10 Bilingual 5 Universal Translator 2/10 Polyglot 10 Universal Translator 4/10 Mimic 25 Universal Translator 6/10 Ultraglot 50 Universal Translator 10/10 Metaweb Interface ... SatoshiPay announced a transition from the use of bitcoin to the use of IOTA as the transaction cost of ... Grover's algorithm dictates that a quantum computer would be very efficient at conducting brute force attacks. The process of finding a cryptographic nonce in order to generate a Bitcoin block is particularly vulnerable to such brute-force attacks. As of today, an average of around 2 68 ... As discussed briefly in §4, a first step towards maintaining Bitcoin’s security properties in a post-quantum world is seen in replacing ECDSA with a signature scheme believed to be quantum resistant, which can be implemented on classical computers [56–58]. Other proposals rely on quantum hardware to exploit quantum effects to guarantee the security of the cryptocurrency against QCAs [59 ... For a = 0 and b = 7 (the version used by bitcoin), it looks like this: Elliptic curves have useful properties. For example, a non-vertical line intersecting two non-tangent points on the curve ... It has several desirable properties: it is decentralized, requiring no trust in any single entity; payments are as quick as quantum communication, regardless of the total number of users; when a quantum banknote is damaged or lost, the rightful owner can recover the lost value. Popular summary. Circa 1969, Wiesner proposed the idea of using the principles of quantum mechanics to construct ...

[index] [1355] [36202] [41180] [51318] [9345] [6001] [15484] [50948] [45097] [39850]

Wiki Trader review - Honest review

Further reading: Infographic: The Properties of Money http://money.visualcapitalist.com/infographic-the-properties-of-money/ Bitcoin and Cryptocurrency Techn... Bitcoin’s emergence as a global digital currency has been as revolutionary as it has been erratic. But while fledgling investors obsess over every fluctuatio... Click here to buy BitCoin : https: ... How I Bought a 4plex As My First Investment Property (+The Numbers) The Journey to Wealth 12 - Duration: 15:59. Spencer Cornelia Recommended for you. 15:59 ... 18- year-old Erik Finman made his own rules when he invested in Bitcoin and left high school to start his own business Thanks for watching! For donations: Bitcoin - 1CpGMM8Ag8gNYL3FffusVqEBUvHyYenTP8

#