cpu mining - How to code the Simplest BitCoin CPU Miner ...

BiblePay (BBP)

BiblePay (BBP) is a Charity Christian Cryptocurrency that donates 10% of coins to Charity every month, sponsoring orphans
[link]

A Detailed Summary of Every Single Reason Why I am Bullish on Ethereum

The following will be a list of the many reasons why I hold and am extremely bullish on ETH.

This is an extremely long post. If you just want the hopium without the detail, read the TL;DR at the bottom.

ETH 2.0

As we all know, ETH 2.0 phase 0 is right around the corner. This will lock up ETH and stakers will earn interest on their ETH in return for securing the network. Next comes phase 1 where the ETH 2 shards are introduced, shards are essentially parallel blockchains which are each responsible for a different part of Ethereum’s workload, think of it like a multi-core processor vs a single core processor. During phase 1, these shards will only act as data availability layers and won’t actually process transactions yet. However, their data can be utilised by the L2 scaling solution, rollups, increasing Ethereum’s throughput in transactions per second up to 100,000 TPS.
After phase 1 comes phase 1.5 which will move the ETH 1.0 chain into an ETH 2 shard and Ethereum will be fully secured by proof of stake. This means that ETH issuance will drop from around 5% per year to less than 1% and with EIP-1559, ETH might become a deflationary asset, but more on that later.
Finally, with ETH 2.0 phase two, each shard will be fully functional chains. With 64 of them, we can expect the base layer of Ethereum to scale around 64x, not including the massive scaling which comes from layer 2 scaling solutions like rollups as previously mentioned.
While the scaling benefits and ETH issuance reduction which comes with ETH 2.0 will be massive, they aren’t the only benefits. We also get benefits such as increased security from PoS compared to PoW, a huge energy efficiency improvement due to the removal of PoW and also the addition of eWASM which will allow contracts to be programmed in a wide range of programming languages, opening the floodgates for millions of web devs who want to be involved in Ethereum but don’t know Ethereum’s programming language, Solidity.

EIP-1559 and ETH scarcity

As I covered in a previous post of mine, ETH doesn’t have a supply cap like Bitcoin. Instead, it has a monetary policy of “minimum viable issuance”, not only is this is a good thing for network security, but with the addition of EIP-1559, it leaves the door open to the possibility of ETH issuance going negative. In short, EIP-1559 changes the fee market to make transaction prices more efficient (helping to alleviate high gas fees!) by burning a variable base fee which changes based on network usage demand rather than using a highest bidder market where miners simply include who pays them the most. This will result in most of the ETH being paid in transaction fees being burned. As of late, the amount which would be burned if EIP-1559 was in Ethereum right now would make ETH a deflationary asset!

Layer 2 Scaling

In the mean time while we are waiting for ETH 2.0, layer 2 scaling is here. Right now, projects such as Deversifi or Loopring utilise rollups to scale to thousands of tx/s on their decentralised exchange platforms or HoneySwap which uses xDai to offer a more scalable alternative to UniSwap. Speaking of which, big DeFi players like UniSwap and Synthetix are actively looking into using optimistic rollups to scale while maintaining composability between DeFi platforms. The most bullish thing about L2 scaling is all of the variety of options. Here’s a non exhaustive list of Ethereum L2 scaling solutions: - Aztec protocol (L2 scaling + privacy!) - ZKSync - Loopring - Raiden - Arbitrum Rollups - xDai - OMGNetwork - Matic - FuelLabs - Starkware - Optimism - Celer Network - + Many more

DeFi and Composability

If you’re reading this, I am sure you are aware of the phenomena which is Decentralised Finance (DeFi or more accurately, open finance). Ethereum is the first platform to offer permissionless and immutable financial services which when interacting with each other, lead to unprecedented composability and innovation in financial applications. A whole new world of possibilities are opening up thanks to this composability as it allows anyone to take existing pieces of open source code from other DeFi projects, put them together like lego pieces (hence the term money legos) and create something the world has never seen before. None of this was possible before Ethereum because typically financial services are heavily regulated and FinTech is usually proprietary software, so you don’t have any open source lego bricks to build off and you have to build everything you need from scratch. That is if what you want to do is even legal for a centralised institution!
Oh, and if you think that DeFi was just a fad and the bubble has popped, guess again! Total value locked in DeFi is currently at an all time high. Don’t believe me? Find out for yourself on the DeFi Pulse website.

NFTs and tokeniation

NFTs or “Non-Fungible Tokens” - despite the name which may confuse a layman - are a basic concept. They are unique tokens with their own unique attributes. This allows you to create digital art, human readable names for your ETH address (see ENS names and unstoppable domains), breedable virtual collectible creatures like crypto kitties, ownable in game assets like Gods Unchained cards or best of all in my opinion, tokenised ownership of real world assets which can even be split into pieces (this doesn’t necessarily require an NFT. Fungible tokens can be/are used for some of the following use cases). This could be tokenised ownership of real estate (see RealT), tokenised ownership of stocks, bonds and other financial assets (which by the way makes them tradable 24/7 and divisible unlike through the traditional system) or even tokenised ownership of the future income of a celebrity or athlete (see when NBA player Spencer Dinwiddie tokenized his own NBA contract.)

Institutional Adoption

Ethereum is by far the most widely adopted blockchain by enterprises. Ethereum’s Enterprise Ethereum Alliance (EEA) is the largest blockchain-enterprise partnership program and Ethereum is by far the most frequently leveraged blockchain for proof of concepts and innovation in the blockchain space by enterprises. Meanwhile, there are protocols like the Baseline protocol which is a shared framework which allows enterprises to use Ethereum as a common frame of reference and a base settlement layer without having to give up privacy when settling on the public Ethereum mainnet. This framework makes adopting Ethereum much easier for other enterprises.

Institutional Investment

One of Bitcoin’s biggest things it has going for it right now is the growing institutional investment. In case you were wondering, Ethereum has this too! Grayscale offers investment in the cryptocurrency space for financial institutions and their Ethereum fund has already locked up more than 2% of the total supply of ETH. Not only this, but as businesses transact on Ethereum and better understand it, not only will they buy up ETH to pay for their transactions, but they will also realise that much like Bitcoin, Ethereum is a scarce asset. Better yet, a scarce asset which offers yield. As a result, I expect to see companies having ETH holdings become the norm just like how Bitcoin is becoming more widespread on companies’ balance sheets.

The state of global markets

With asset prices in almost every asset class at or near all-time highs and interest rates lower than ever and even negative in some cases, there really aren’t many good opportunities in the traditional financial system right now. Enter crypto - clearly the next evolution of financial services (as I explained in the section on DeFi earlier in this post), with scarce assets built in at the protocol layer, buying BTC or ETH is a lot like buying shares in TCP/IP in 1990 (that is if the underlying protocols of the internet could be invested in which they couldn’t). Best of all, major cryptos are down from their all-time highs anywhere between 35% for BTC or 70% for ETH and much more for many altcoins. This means that they can significantly appreciate in value before entering uncharted, speculative bubble territory.
While of course we could fall dramatically at any moment in the current macro financial conditions, as a longer term play, crypto is very alluring. The existing financial system has shown that it is in dire need of replacing and the potential replacement has started rearing its head in the form of crypto and DeFi.

Improvements in user onboarding and abstracting away complexity

Ethereum has started making huge leaps forward in terms of usability for the end user. We now have ENS names and unstoppable domains which allow you to send ETH to yournamehere.ETH or TrickyTroll.crypto (I don’t actually have that domain, that’s just an example). No longer do you have to check every character of your ugly hexadecimal 0x43AB96D… ETH address to ensure you’re sending your ETH to the right person. We also have smart contract wallets like Argent wallet or the Gnosis safe. These allow for users to access their wallets and interact with DeFi self-custodially from an app on their phone without having to record a private key or recovery phrase. Instead, they offer social recovery and their UI is straight forward enough for anyone who uses a smart phone to understand. Finally, for the more experienced users, DApps like Uniswap have pretty, super easy to use graphical user interfaces and can be used by anyone who knows how to run and use a browser extension like Metamask.

The lack of an obvious #1 ETH killer

One of Ethereum’s biggest threats is for it to be overthrown by a so-called “Ethereum killer” blockchain which claims to do everything Ethereum can do and sometimes more. While there are competitors which are each formidable to a certain extent such as Polkadot, Cardano and EOS, each have their own weaknesses. For example, Polkadot and Cardano are not fully operational yet and EOS is much more centralised than Ethereum. As a result, none of these competitors have any significant network effects just yet relative to the behemoth which is Ethereum. This doesn’t mean that these projects aren’t a threat. In fact, I am sure that projects like Polkadot (which is more focused on complimenting Ethereum than killing it) will take a slice out of Ethereum’s pie. However, I am still very confident that Ethereum will remain on top due to the lack of a clear number 2 smart contract platform. Since none of these ETH killers stands out as the second place smart contract platform, it makes it much harder for one project to create a network effect which even begins to threaten Ethereum’s dominance. This leads me onto my next reason - network effects.

Network effects

This is another topic which I made a previous post on. The network effect is why Bitcoin is still the number one cryptocurrency and by such a long way. Bitcoin is not the most technologically advanced cryptocurrency. However, it has the most widespread name recognition and the most adoption in most metrics (ETH beats in in some metrics these days). The network effect is also why most people use Zoom and Facebook messengeWhatsApp despite the existence of free, private, end to end encrypted alternatives which have all the same features (Jitsi for the zoom alternative and Signal for the private messenger app. I highly recommend both. Let’s get their network effects going!). It is the same for Bitcoin. People don’t want to have to learn about or set up a wallet for alternative options. People like what is familiar and what other people use. Nobody wants to be “that guy” who makes you download yet another app and account you have to remember the password/private key for. In the same way, Enterprises don’t want to have to create a bridge between their existing systems and a dozen different blockchains. Developers don’t want to have to create DeFi money legos from scratch on a new chain if they can just plug in to existing services like Uniswap. Likewise, users don’t want to have to download another browser extension to use DApps on another chain if they already use Ethereum. I know personally I have refrained from investing in altcoins because I would have to install another app on my hardware wallet or remember another recovery phrase.
Overthrowing Ethereum’s network effect is one hell of a big task these days. Time is running out for the ETH killers.

Ethereum is the most decentralised and provably neutral smart contract platform

Ethereum is also arguably the most decentralised and provably neutral smart contract platform (except for maybe Ethereum Classic on the neutrality part). Unlike some smart contract platforms, you can’t round up everyone at the Ethereum Foundation or any select group of people and expect to be able to stop the network. Not only this, but the Ethereum foundation doesn’t have the ability to print more ETH or push through changes as they wish like some people would lead you on to believe. The community would reject detrimental EIPs and hard fork. Ever since the DAO hack, the Ethereum community has made it clear that it will not accept EIPs which attempt to roll back the chain even to recover hacked funds (see EIP-999).
Even if governments around the world wanted to censor the Ethereum blockchain, under ETH 2.0’s proof of stake, it would be incredibly costly and would require a double digit percentage of the total ETH supply, much of which would be slashed (meaning they would lose it) as punishment for running dishonest validator nodes. This means that unlike with proof of work where a 51% attacker can keep attacking the network, under proof of stake, an attacker can only perform the attack a couple of times before they lose all of their ETH. This makes attacks much less financially viable than it is on proof of work chains. Network security is much more than what I laid out above and I am far from an expert but the improved resistance to 51% attacks which PoS provides is significant.
Finally, with the US dollar looking like it will lose its reserve currency status and the existing wire transfer system being outdated, superpowers like China won’t want to use US systems and the US won’t want to use a Chinese system. Enter Ethereum, the provably neutral settlement layer where the USA and China don’t have to trust each other or each other’s banks because they can trust Ethereum. While it may sound like a long shot, it does make sense if Ethereum hits a multi-trillion dollar market cap that it is the most secure and neutral way to transfer value between these adversaries. Not to mention if much of the world’s commerce were to be settled in the same place - on Ethereum - then it would make sense for governments to settle on the same platform.

ETH distribution is decentralised

Thanks to over 5 years of proof of work - a system where miners have to sell newly minted ETH to pay for electricity costs - newly mined ETH has found its way into the hands of everyday people who buy ETH off miners selling on exchnages. As pointed out by u/AdamSC1 in his analysis of the top 10K ETH addresses (I highly recommend reading this if you haven’t already), the distribution of ETH is actually slightly more decentralised than Bitcoin with the top 10,000 ETH wallets holding 56.70% of ETH supply compared to the top 10,000 Bitcoin wallets which hold 57.44% of the Bitcoin supply. This decentralised distribution means that the introduction of staking won’t centralise ETH in the hands of a few wallets who could then control the network. This is an advantage for ETH which many proof of stake ETH killers will never have as they never used PoW to distribute funds widely throughout the community and these ETH killers often did funding rounds giving large numbers of tokens to VC investors.

The community

Finally, while I may be biased, I think that Ethereum has the friendliest community. Anecdotally, I find that the Ethereum developer community is full of forward thinking people who want to make the world a better place and build a better future, many of whom are altruistic and don’t always act in their best interests. Compare this to the much more conservative, “at least we’re safe while the world burns” attitude which many Bitcoiners have. I don’t want to generalise too much here as the Bitcoin community is great too and there are some wonderful people there. But the difference is clear if you compare the daily discussion of Bitcoin to the incredibly helpful and welcoming daily discussion of EthFinance who will happily answer your noob questions without calling you an idiot and telling you to do you own research (there are plenty more examples in any of the daily threads). Or the very helpful folks over at EthStaker who will go out of their way to help you set up an ETH 2.0 staking node on the testnets (Shoutout to u/superphiz who does a lot of work over in that sub!). Don’t believe me? Head over to those subs and see for yourself.
Please don’t hate on me if you disagree about which project has the best community, it is just my very biased personal opinion and I respect your opinion if you disagree! :)

TL;DR:

submitted by Tricky_Troll to CryptoCurrency [link] [comments]

A Detailed Summary of Every Single Reason Why I am Bullish on ETH.

The following will be a list of the many reasons why I hold and am extremely bullish on ETH.

This is an extremely long post. If you just want the hopium without the detail, read the TL;DR at the bottom.

ETH 2.0

As we all know, ETH 2.0 phase 0 is right around the corner. This will lock up ETH and stakers will earn interest on their ETH in return for securing the network. Next comes phase 1 where the ETH 2 shards are introduced, shards are essentially parallel blockchains which are each responsible for a different part of Ethereum’s workload, think of it like a multi-core processor vs a single core processor. During phase 1, these shards will only act as data availability layers and won’t actually process transactions yet. However, their data can be utilised by the L2 scaling solution, rollups, increasing Ethereum’s throughput in transactions per second up to 100,000 TPS.
After phase 1 comes phase 1.5 which will move the ETH 1.0 chain into an ETH 2 shard and Ethereum will be fully secured by proof of stake. This means that ETH issuance will drop from around 5% per year to less than 1% and with EIP-1559, ETH might become a deflationary asset, but more on that later.
Finally, with ETH 2.0 phase two, each shard will be fully functional chains. With 64 of them, we can expect the base layer of Ethereum to scale around 64x, not including the massive scaling which comes from layer 2 scaling solutions like rollups as previously mentioned.
While the scaling benefits and ETH issuance reduction which comes with ETH 2.0 will be massive, they aren’t the only benefits. We also get benefits such as increased security from PoS compared to PoW, a huge energy efficiency improvement due to the removal of PoW and also the addition of eWASM which will allow contracts to be programmed in a wide range of programming languages, opening the floodgates for millions of web devs who want to be involved in Ethereum but don’t know Ethereum’s programming language, Solidity.

EIP-1559 and ETH scarcity

As I covered in a previous post of mine, ETH doesn’t have a supply cap like Bitcoin. Instead, it has a monetary policy of “minimum viable issuance”, not only is this is a good thing for network security, but with the addition of EIP-1559, it leaves the door open to the possibility of ETH issuance going negative. In short, EIP-1559 changes the fee market to make transaction prices more efficient (helping to alleviate high gas fees!) by burning a variable base fee which changes based on network usage demand rather than using a highest bidder market where miners simply include who pays them the most. This will result in most of the ETH being paid in transaction fees being burned. As of late, the amount which would be burned if EIP-1559 was in Ethereum right now would make ETH a deflationary asset!

Layer 2 Scaling

In the mean time while we are waiting for ETH 2.0, layer 2 scaling is here. Right now, projects such as Deversifi or Loopring utilise rollups to scale to thousands of tx/s on their decentralised exchange platforms or HoneySwap which uses xDai to offer a more scalable alternative to UniSwap. Speaking of which, big DeFi players like UniSwap and Synthetix are actively looking into using optimistic rollups to scale while maintaining composability between DeFi platforms. The most bullish thing about L2 scaling is all of the variety of options. Here’s a non exhaustive list of Ethereum L2 scaling solutions: - Aztec protocol (L2 scaling + privacy!) - ZKSync - Loopring - Raiden - Arbitrum Rollups - xDai - OMGNetwork - Matic - FuelLabs - Starkware - Optimism - Celer Network - + Many more

DeFi and Composability

If you’re reading this, I am sure you are aware of the phenomena which is Decentralised Finance (DeFi or more accurately, open finance). Ethereum is the first platform to offer permissionless and immutable financial services which when interacting with each other, lead to unprecedented composability and innovation in financial applications. A whole new world of possibilities are opening up thanks to this composability as it allows anyone to take existing pieces of open source code from other DeFi projects, put them together like lego pieces (hence the term money legos) and create something the world has never seen before. None of this was possible before Ethereum because typically financial services are heavily regulated and FinTech is usually proprietary software, so you don’t have any open source lego bricks to build off and you have to build everything you need from scratch. That is if what you want to do is even legal for a centralised institution!
Oh, and if you think that DeFi was just a fad and the bubble has popped, guess again! Total value locked in DeFi is currently at an all time high. Don’t believe me? Find out for yourself at: https://defipulse.com

NFTs and tokeniation

NFTs or “Non-Fungible Tokens” - despite the name which may confuse a layman - are a basic concept. They are unique tokens with their own unique attributes. This allows you to create digital art, human readable names for your ETH address (see ENS names and unstoppable domains), breedable virtual collectible creatures like crypto kitties, ownable in game assets like Gods Unchained cards or best of all in my opinion, tokenised ownership of real world assets which can even be split into pieces (this doesn’t necessarily require an NFT. Fungible tokens can be/are used for some of the following use cases). This could be tokenised ownership of real estate (see RealT), tokenised ownership of stocks, bonds and other financial assets (which by the way makes them tradable 24/7 and divisible unlike through the traditional system) or even tokenised ownership of the future income of a celebrity or athlete (see when NBA Star Spencer Dinwiddie Tokenized His Own NBA Contract.

Institutional Adoption

Ethereum is by far the most widely adopted blockchain by enterprises. Ethereum’s Enterprise Ethereum Alliance (EEA) is the largest blockchain-enterprise partnership program and Ethereum is by far the most frequently leveraged blockchain for proof of concepts and innovation in the blockchain space by enterprises. Meanwhile, there are protocols like the Baseline protocol which is a shared framework which allows enterprises to use Ethereum as a common frame of reference and a base settlement layer without having to give up privacy when settling on the public Ethereum mainnet. This framework makes adopting Ethereum much easier for other enterprises.

Institutional Investment

One of Bitcoin’s biggest things it has going for it right now is the growing institutional investment. In case you were wondering, Ethereum has this too! Grayscale offers investment in the cryptocurrency space for financial institutions and their Ethereum fund has already locked up more than 2% of the total supply of ETH. Not only this, but as businesses transact on Ethereum and better understand it, not only will they buy up ETH to pay for their transactions, but they will also realise that much like Bitcoin, Ethereum is a scarce asset. Better yet, a scarce asset which offers yield. As a result, I expect to see companies having ETH holdings become the norm just like how Bitcoin is becoming more widespread on companies’ balance sheets.

The state of global markets

With asset prices in almost every asset class at or near all-time highs and interest rates lower than ever and even negative in some cases, there really aren’t many good opportunities in the traditional financial system right now. Enter crypto - clearly the next evolution of financial services (as I explained in the section on DeFi earlier in this post), with scarce assets built in at the protocol layer, buying BTC or ETH is a lot like buying shares in TCP/IP in 1990 (that is if the underlying protocols of the internet could be invested in which they couldn’t). Best of all, major cryptos are down from their all-time highs anywhere between 35% for BTC or 70% for ETH and much more for many altcoins. This means that they can significantly appreciate in value before entering uncharted, speculative bubble territory.
While of course we could fall dramatically at any moment in the current macro financial conditions, as a longer term play, crypto is very alluring. The existing financial system has shown that it is in dire need of replacing and the potential replacement has started rearing its head in the form of crypto and DeFi.

Improvements in user onboarding and abstracting away complexity

Ethereum has started making huge leaps forward in terms of usability for the end user. We now have ENS names and unstoppable domains which allow you to send ETH to yournamehere.ETH or TrickyTroll.crypto (I don’t actually have that domain, that’s just an example). No longer do you have to check every character of your ugly hexadecimal 0x43AB96D… ETH address to ensure you’re sending your ETH to the right person. We also have smart contract wallets like Argent wallet or the Gnosis safe. These allow for users to access their wallets and interact with DeFi self-custodially from an app on their phone without having to record a private key or recovery phrase. Instead, they offer social recovery and their UI is straight forward enough for anyone who uses a smart phone to understand. Finally, for the more experienced users, DApps like Uniswap have pretty, super easy to use graphical user interfaces and can be used by anyone who knows how to run and use a browser extension like Metamask.

The lack of an obvious #1 ETH killer

One of Ethereum’s biggest threats is for it to be overthrown by a so-called “Ethereum killer” blockchain which claims to do everything Ethereum can do and sometimes more. While there are competitors which are each formidable to a certain extent such as Polkadot, Cardano and EOS, each have their own weaknesses. For example, Polkadot and Cardano are not fully operational yet and EOS is much more centralised than Ethereum. As a result, none of these competitors have any significant network effects just yet relative to the behemoth which is Ethereum. This doesn’t mean that these projects aren’t a threat. In fact, I am sure that projects like Polkadot (which is more focused on complimenting Ethereum than killing it) will take a slice out of Ethereum’s pie. However, I am still very confident that Ethereum will remain on top due to the lack of a clear number 2 smart contract platform. Since none of these ETH killers stands out as the second place smart contract platform, it makes it much harder for one project to create a network effect which even begins to threaten Ethereum’s dominance. This leads me onto my next reason - network effects.

Network effects

This is another topic which I made a previous post on. The network effect is why Bitcoin is still the number one cryptocurrency and by such a long way. Bitcoin is not the most technologically advanced cryptocurrency. However, it has the most widespread name recognition and the most adoption in most metrics (ETH beats in in some metrics these days). The network effect is also why most people use Zoom and Facebook messengeWhatsApp despite the existence of free, private, end to end encrypted alternatives which have all the same features (https://meet.jit.si/ for zoom alternative and Signal for the private messenger app. I highly recommend both. Let’s get their network effects going!). It is the same for Bitcoin. People don’t want to have to learn about or set up a wallet for alternative options. People like what is familiar and what other people use. Nobody wants to be “that guy” who makes you download yet another app and account you have to remember the password/private key for. In the same way, Enterprises don’t want to have to create a bridge between their existing systems and a dozen different blockchains. Developers don’t want to have to create DeFi money legos from scratch on a new chain if they can just plug in to existing services like Uniswap. Likewise, users don’t want to have to download another browser extension to use DApps on another chain if they already use Ethereum. I know personally I have refrained from investing in altcoins because I would have to install another app on my hardware wallet or remember another recovery phrase.
Overthrowing Ethereum’s network effect is one hell of a big task these days. Time is running out for the ETH killers.

Ethereum is the most decentralised and provably neutral smart contract platform

Ethereum is also arguably the most decentralised and provably neutral smart contract platform (except for maybe Ethereum Classic on the neutrality part). Unlike some smart contract platforms, you can’t round up everyone at the Ethereum Foundation or any select group of people and expect to be able to stop the network. Not only this, but the Ethereum foundation doesn’t have the ability to print more ETH or push through changes as they wish like some people would lead you on to believe. The community would reject detrimental EIPs and hard fork. Ever since the DAO hack, the Ethereum community has made it clear that it will not accept EIPs which attempt to roll back the chain even to recover hacked funds (see EIP-999).
Even if governments around the world wanted to censor the Ethereum blockchain, under ETH 2.0’s proof of stake, it would be incredibly costly and would require a double digit percentage of the total ETH supply, much of which would be slashed (meaning they would lose it) as punishment for running dishonest validator nodes. This means that unlike with proof of work where a 51% attacker can keep attacking the network, under proof of stake, an attacker can only perform the attack a couple of times before they lose all of their ETH. This makes attacks much less financially viable than it is on proof of work chains. Network security is much more than what I laid out above and I am far from an expert but the improved resistance to 51% attacks which PoS provides is significant.
Finally, with the US dollar looking like it will lose its reserve currency status and the existing wire transfer system being outdated, superpowers like China won’t want to use US systems and the US won’t want to use a Chinese system. Enter Ethereum, the provably neutral settlement layer where the USA and China don’t have to trust each other or each other’s banks because they can trust Ethereum. While it may sound like a long shot, it does make sense if Ethereum hits a multi-trillion dollar market cap that it is the most secure and neutral way to transfer value between these adversaries. Not to mention if much of the world’s commerce were to be settled in the same place - on Ethereum - then it would make sense for governments to settle on the same platform.

ETH distribution is decentralised

Thanks to over 5 years of proof of work - a system where miners have to sell newly minted ETH to pay for electricity costs - newly mined ETH has found its way into the hands of everyday people who buy ETH off miners selling on exchnages. As pointed out by u/AdamSC1 in his analysis of the top 10K ETH addresses (I highly recommend reading this if you haven’t already), the distribution of ETH is actually slightly more decentralised than Bitcoin with the top 10,000 ETH wallets holding 56.70% of ETH supply compared to the top 10,000 Bitcoin wallets which hold 57.44% of the Bitcoin supply. This decentralised distribution means that the introduction of staking won’t centralise ETH in the hands of a few wallets who could then control the network. This is an advantage for ETH which many proof of stake ETH killers will never have as they never used PoW to distribute funds widely throughout the community and these ETH killers often did funding rounds giving large numbers of tokens to VC investors.

The community

Finally, while I may be biased, I think that Ethereum has the friendliest community. Anecdotally, I find that the Ethereum developer community is full of forward thinking people who want to make the world a better place and build a better future, many of whom are altruistic and don’t always act in their best interests. Compare this to the much more conservative, “at least we’re safe while the world burns” attitude which many Bitcoiners have. I don’t want to generalise too much here as the Bitcoin community is great too and there are some wonderful people there. But the difference is clear if you compare the daily discussion of Bitcoin to the incredibly helpful and welcoming daily discussion of EthFinance who will happily answer your noob questions without calling you an idiot and telling you to do you own research (there are plenty more examples in any of the daily threads). Or the very helpful folks over at EthStaker who will go out of their way to help you set up an ETH 2.0 staking node on the testnets (Shoutout to u/superphiz who does a lot of work over in that sub!). Don’t believe me? Head over to those subs and see for yourself.
Please don’t hate on me if you disagree about which project has the best community, it is just my very biased personal opinion and I respect your opinion if you disagree! :)

TL;DR:

submitted by Tricky_Troll to ethtrader [link] [comments]

A detailed summary of every reason why I am bullish on ETH.

The following will be a list of the many reasons why I hold and am extremely bullish on ETH.

This is an extremely long post. If you just want the hopium without the detail, read the TL;DR at the bottom.

ETH 2.0

As we all know, ETH 2.0 phase 0 is right around the corner. This will lock up ETH and stakers will earn interest on their ETH in return for securing the network. Next comes phase 1 where the ETH 2 shards are introduced, shards are essentially parallel blockchains which are each responsible for a different part of Ethereum’s workload, think of it like a multi-core processor vs a single core processor. During phase 1, these shards will only act as data availability layers and won’t actually process transactions yet. However, their data can be utilised by the L2 scaling solution, rollups, increasing Ethereum’s throughput in transactions per second up to 100,000 TPS.
After phase 1 comes phase 1.5 which will move the ETH 1.0 chain into an ETH 2 shard and Ethereum will be fully secured by proof of stake. This means that ETH issuance will drop from around 5% per year to less than 1% and with EIP-1559, ETH might become a deflationary asset, but more on that later.
Finally, with ETH 2.0 phase two, each shard will be fully functional chains. With 64 of them, we can expect the base layer of Ethereum to scale around 64x, not including the massive scaling which comes from layer 2 scaling solutions like rollups as previously mentioned.
While the scaling benefits and ETH issuance reduction which comes with ETH 2.0 will be massive, they aren’t the only benefits. We also get benefits such as increased security from PoS compared to PoW, a huge energy efficiency improvement due to the removal of PoW and also the addition of eWASM which will allow contracts to be programmed in a wide range of programming languages, opening the floodgates for millions of web devs who want to be involved in Ethereum but don’t know Ethereum’s programming language, Solidity.

EIP-1559 and ETH scarcity

As I covered in a previous post of mine, ETH doesn’t have a supply cap like Bitcoin. Instead, it has a monetary policy of “minimum viable issuance”, not only is this is a good thing for network security, but with the addition of EIP-1559, it leaves the door open to the possibility of ETH issuance going negative. In short, EIP-1559 changes the fee market to make transaction prices more efficient (helping to alleviate high gas fees!) by burning a variable base fee which changes based on network usage demand rather than using a highest bidder market where miners simply include who pays them the most. This will result in most of the ETH being paid in transaction fees being burned. As of late, the amount which would be burned if EIP-1559 was in Ethereum right now would make ETH a deflationary asset!

Layer 2 Scaling

In the mean time while we are waiting for ETH 2.0, layer 2 scaling is here. Right now, projects such as Deversifi or Loopring utilise rollups to scale to thousands of tx/s on their decentralised exchange platforms or HoneySwap which uses xDai to offer a more scalable alternative to UniSwap. Speaking of which, big DeFi players like UniSwap and Synthetix are actively looking into using optimistic rollups to scale while maintaining composability between DeFi platforms. The most bullish thing about L2 scaling is all of the variety of options. Here’s a non exhaustive list of Ethereum L2 scaling solutions: - Aztec protocol (L2 scaling + privacy!) - ZKSync - Loopring - Raiden - Arbitrum Rollups - xDai - OMGNetwork - Matic - FuelLabs - Starkware - Optimism - Celer Network - + Many more

DeFi and Composability

If you’re reading this, I am sure you are aware of the phenomena which is Decentralised Finance (DeFi or more accurately, open finance). Ethereum is the first platform to offer permissionless and immutable financial services which when interacting with each other, lead to unprecedented composability and innovation in financial applications. A whole new world of possibilities are opening up thanks to this composability as it allows anyone to take existing pieces of open source code from other DeFi projects, put them together like lego pieces (hence the term money legos) and create something the world has never seen before. None of this was possible before Ethereum because typically financial services are heavily regulated and FinTech is usually proprietary software, so you don’t have any open source lego bricks to build off and you have to build everything you need from scratch. That is if what you want to do is even legal for a centralised institution!
Oh, and if you think that DeFi was just a fad and the bubble has popped, guess again! Total value locked in DeFi is currently at an all time high. Don’t believe me? Find out for yourself at: https://defipulse.com

NFTs and tokeniation

NFTs or “Non-Fungible Tokens” - despite the name which may confuse a layman - are a basic concept. They are unique tokens with their own unique attributes. This allows you to create digital art, human readable names for your ETH address (see ENS names and unstoppable domains), breedable virtual collectible creatures like crypto kitties, ownable in game assets like Gods Unchained cards or best of all in my opinion, tokenised ownership of real world assets which can even be split into pieces (this doesn’t necessarily require an NFT. Fungible tokens can be/are used for some of the following use cases). This could be tokenised ownership of real estate (see RealT), tokenised ownership of stocks, bonds and other financial assets (which by the way makes them tradable 24/7 and divisible unlike through the traditional system) or even tokenised ownership of the future income of a celebrity or athlete (see when NBA Star Spencer Dinwiddie Tokenized His Own NBA Contract.

Institutional Adoption

Ethereum is by far the most widely adopted blockchain by enterprises. Ethereum’s Enterprise Ethereum Alliance (EEA) is the largest blockchain-enterprise partnership program and Ethereum is by far the most frequently leveraged blockchain for proof of concepts and innovation in the blockchain space by enterprises. Meanwhile, there are protocols like the Baseline protocol which is a shared framework which allows enterprises to use Ethereum as a common frame of reference and a base settlement layer without having to give up privacy when settling on the public Ethereum mainnet. This framework makes adopting Ethereum much easier for other enterprises.

Institutional Investment

One of Bitcoin’s biggest things it has going for it right now is the growing institutional investment. In case you were wondering, Ethereum has this too! Grayscale offers investment in the cryptocurrency space for financial institutions and their Ethereum fund has already locked up more than 2% of the total supply of ETH. Not only this, but as businesses transact on Ethereum and better understand it, not only will they buy up ETH to pay for their transactions, but they will also realise that much like Bitcoin, Ethereum is a scarce asset. Better yet, a scarce asset which offers yield. As a result, I expect to see companies having ETH holdings become the norm just like how Bitcoin is becoming more widespread on companies’ balance sheets.

The state of global markets

With asset prices in almost every asset class at or near all-time highs and interest rates lower than ever and even negative in some cases, there really aren’t many good opportunities in the traditional financial system right now. Enter crypto - clearly the next evolution of financial services (as I explained in the section on DeFi earlier in this post), with scarce assets built in at the protocol layer, buying BTC or ETH is a lot like buying shares in TCP/IP in 1990 (that is if the underlying protocols of the internet could be invested in which they couldn’t). Best of all, major cryptos are down from their all-time highs anywhere between 35% for BTC or 70% for ETH and much more for many altcoins. This means that they can significantly appreciate in value before entering uncharted, speculative bubble territory.
While of course we could fall dramatically at any moment in the current macro financial conditions, as a longer term play, crypto is very alluring. The existing financial system has shown that it is in dire need of replacing and the potential replacement has started rearing its head in the form of crypto and DeFi.

Improvements in user onboarding and abstracting away complexity

Ethereum has started making huge leaps forward in terms of usability for the end user. We now have ENS names and unstoppable domains which allow you to send ETH to yournamehere.ETH or TrickyTroll.crypto (I don’t actually have that domain, that’s just an example). No longer do you have to check every character of your ugly hexadecimal 0x43AB96D… ETH address to ensure you’re sending your ETH to the right person. We also have smart contract wallets like Argent wallet or the Gnosis safe. These allow for users to access their wallets and interact with DeFi self-custodially from an app on their phone without having to record a private key or recovery phrase. Instead, they offer social recovery and their UI is straight forward enough for anyone who uses a smart phone to understand. Finally, for the more experienced users, DApps like Uniswap have pretty, super easy to use graphical user interfaces and can be used by anyone who knows how to run and use a browser extension like Metamask.

The lack of an obvious #1 ETH killer

One of Ethereum’s biggest threats is for it to be overthrown by a so-called “Ethereum killer” blockchain which claims to do everything Ethereum can do and sometimes more. While there are competitors which are each formidable to a certain extent such as Polkadot, Cardano and EOS, each have their own weaknesses. For example, Polkadot and Cardano are not fully operational yet and EOS is much more centralised than Ethereum. As a result, none of these competitors have any significant network effects just yet relative to the behemoth which is Ethereum. This doesn’t mean that these projects aren’t a threat. In fact, I am sure that projects like Polkadot (which is more focused on complimenting Ethereum than killing it) will take a slice out of Ethereum’s pie. However, I am still very confident that Ethereum will remain on top due to the lack of a clear number 2 smart contract platform. Since none of these ETH killers stands out as the second place smart contract platform, it makes it much harder for one project to create a network effect which even begins to threaten Ethereum’s dominance. This leads me onto my next reason - network effects.

Network effects

This is another topic which I made a previous post on. The network effect is why Bitcoin is still the number one cryptocurrency and by such a long way. Bitcoin is not the most technologically advanced cryptocurrency. However, it has the most widespread name recognition and the most adoption in most metrics (ETH beats in in some metrics these days). The network effect is also why most people use Zoom and Facebook messengeWhatsApp despite the existence of free, private, end to end encrypted alternatives which have all the same features (https://meet.jit.si/ for zoom alternative and Signal for the private messenger app. I highly recommend both. Let’s get their network effects going!). It is the same for Bitcoin. People don’t want to have to learn about or set up a wallet for alternative options. People like what is familiar and what other people use. Nobody wants to be “that guy” who makes you download yet another app and account you have to remember the password/private key for. In the same way, Enterprises don’t want to have to create a bridge between their existing systems and a dozen different blockchains. Developers don’t want to have to create DeFi money legos from scratch on a new chain if they can just plug in to existing services like Uniswap. Likewise, users don’t want to have to download another browser extension to use DApps on another chain if they already use Ethereum. I know personally I have refrained from investing in altcoins because I would have to install another app on my hardware wallet or remember another recovery phrase.
Overthrowing Ethereum’s network effect is one hell of a big task these days. Time is running out for the ETH killers.

Ethereum is the most decentralised and provably neutral smart contract platform

Ethereum is also arguably the most decentralised and provably neutral smart contract platform (except for maybe Ethereum Classic on the neutrality part). Unlike some smart contract platforms, you can’t round up everyone at the Ethereum Foundation or any select group of people and expect to be able to stop the network. Not only this, but the Ethereum foundation doesn’t have the ability to print more ETH or push through changes as they wish like some people would lead you on to believe. The community would reject detrimental EIPs and hard fork. Ever since the DAO hack, the Ethereum community has made it clear that it will not accept EIPs which attempt to roll back the chain even to recover hacked funds (see EIP-999).
Even if governments around the world wanted to censor the Ethereum blockchain, under ETH 2.0’s proof of stake, it would be incredibly costly and would require a double digit percentage of the total ETH supply, much of which would be slashed (meaning they would lose it) as punishment for running dishonest validator nodes. This means that unlike with proof of work where a 51% attacker can keep attacking the network, under proof of stake, an attacker can only perform the attack a couple of times before they lose all of their ETH. This makes attacks much less financially viable than it is on proof of work chains. Network security is much more than what I laid out above and I am far from an expert but the improved resistance to 51% attacks which PoS provides is significant.
Finally, with the US dollar looking like it will lose its reserve currency status and the existing wire transfer system being outdated, superpowers like China won’t want to use US systems and the US won’t want to use a Chinese system. Enter Ethereum, the provably neutral settlement layer where the USA and China don’t have to trust each other or each other’s banks because they can trust Ethereum. While it may sound like a long shot, it does make sense if Ethereum hits a multi-trillion dollar market cap that it is the most secure and neutral way to transfer value between these adversaries. Not to mention if much of the world’s commerce were to be settled in the same place - on Ethereum - then it would make sense for governments to settle on the same platform.

ETH distribution is decentralised

Thanks to over 5 years of proof of work - a system where miners have to sell newly minted ETH to pay for electricity costs - newly mined ETH has found its way into the hands of everyday people who buy ETH off miners selling on exchnages. As pointed out by u/AdamSC1 in his analysis of the top 10K ETH addresses (I highly recommend reading this if you haven’t already), the distribution of ETH is actually slightly more decentralised than Bitcoin with the top 10,000 ETH wallets holding 56.70% of ETH supply compared to the top 10,000 Bitcoin wallets which hold 57.44% of the Bitcoin supply. This decentralised distribution means that the introduction of staking won’t centralise ETH in the hands of a few wallets who could then control the network. This is an advantage for ETH which many proof of stake ETH killers will never have as they never used PoW to distribute funds widely throughout the community and these ETH killers often did funding rounds giving large numbers of tokens to VC investors.

The community

Finally, while I may be biased, I think that Ethereum has the friendliest community. Anecdotally, I find that the Ethereum developer community is full of forward thinking people who want to make the world a better place and build a better future, many of whom are altruistic and don’t always act in their best interests. Compare this to the much more conservative, “at least we’re safe while the world burns” attitude which many Bitcoiners have. I don’t want to generalise too much here as the Bitcoin community is great too and there are some wonderful people there. But the difference is clear if you compare the daily discussion of Bitcoin to the incredibly helpful and welcoming daily discussion of EthFinance who will happily answer your noob questions without calling you an idiot and telling you to do you own research (there are plenty more examples in any of the daily threads). Or the very helpful folks over at EthStaker who will go out of their way to help you set up an ETH 2.0 staking node on the testnets (Shoutout to u/superphiz who does a lot of work over in that sub!). Don’t believe me? Head over to those subs and see for yourself.
Please don’t hate on me if you disagree about which project has the best community, it is just my very biased personal opinion and I respect your opinion if you disagree! :)

TL;DR:

submitted by Tricky_Troll to ethfinance [link] [comments]

PSA: Someone is using a bot to downvote everything in this subreddit. For newcomers, please know that Bitcoin Cash has been under attacked for the last 4 years because Bitcoin Cash, a global peer to peer cash system, is a threat to banks and fiat currencies.

For any newbies coming here wondering why someone is running a downvote bot in this subreddit (among other attacks), I would like to spread awareness about this issue.
There are many signs that BTC has been infiltrated. When you put them all together, it starts to form a clearer picture. Here are some examples.
There is consistent trolls/harassments/smear campaigns against Bitcoin Cash the last 4 years. Who is funding all these propaganda campaigns? Who is funding these efforts to run downvote bots to disrupt this community?
In 2013, Peter Todd was paid off by a government intelligence agent to create RBF, create a propaganda video, and cripple the BTC code. Source: https://steemit.com/bitcoin/@adambalm/in-2013-peter-todd-was-paid-off-by-a-government-intelligence-agent-to-create-rbf-create-a-propaganda-video-and-cripple-the-btc
Blockstream kicking Gavin, the lead Bitcoin developer, out of Bitcoin development, successfully hijacked control over the Bitcoin github.
Mike Hearn and Gavin wanted to prevent Bitcoin from being hijacked, so they created a fork. That fork didn't survived after they were heavily DDOS. Mike Hearn was heavily character assassinated by what I believe to be orchestrated paid campaigns by Blockstream. And of course, now that Mike Hearn is gone, the character assassination campaigns are directed at Bitcoin Cash main supporters like Roger Ver. Source: https://np.reddit.com/Bitcoincash/comments/8lozww/how_bitcoin_btc_was_hijacked_and_why_bitcoin_cash/
Blockstream not honoring the Hong Kong agreement and the New York agreement they signed.
Blockstream doesn't want Bitcoin to compete with the banks. Their aim is to make Bitcoin unusable with no long term future. Source: https://www.trustnodes.com/2017/12/22/gregory-maxwell-celebrates-high-fees-300000-stuck-transactions
Samson Mow admitting in an interview that Blockstream is out for profit (in other words, the BTC holders will be milked as their cash cows, BTC miners will be driven out with Lightning Network taking its place) Source: https://www.youtube.com/watch?v=cFOmUm-_DMQ The false flag attacks where they claimed Bitcoin Cash was hacking them (but turns out Greg Maxwell was the ones doing it) Source: https://www.trustnodes.com/2017/11/22/reddit-bitcoin-mods-gregory-maxwell-accused-false-flag-bot-attack-hacking)
Hackers targeting Bitcoin Cash users stealing their tippr funds and taking over their reddit accounts Source: https://np.reddit.com/tippcomments/7naogq/tippr_on_reddit_disabled_temporarily/
Misinformation campaigns (BTC people registering bcash sites and subreddits, then trying to associate Bitcoin Cash as bcash to forums/websites they control) Source: https://np.reddit.com/btc/comments/8dd5ij/why_bitcoin_cash_users_reject_the_name_bcash_so/
Censorship to brainwash newcomers with Bitcoin misinformation and propaganda. Source: https://medium.com/@johnblocke/a-brief-and-incomplete-history-of-censorship-in-r-bitcoin-c85a290fe43
Blockstream declaring that Bitcoin is not for the poor. Source: https://np.reddit.com/btc/comments/ahzog2/reminder_bitcoin_isnt_for_people_that_live_on/
Blockstream sabotaged Bitcoin codes by reducing its functionality such as OP Return size reduction, RBF vulnerability, 1MB blocksize, etc... so that it breaks software built on top of Bitcoin.
Source (OP Return Reduction): https://np.reddit.com/btc/comments/80ycim/a_few_months_after_the_counterparty_developers/
Source (Bitcoin RBF Vulnerability): https://www.ccn.com/bitcoin-atm-double-spenders-police-need-help-identifying-four-criminals/
I was involved in some BCH projects and there had been multiple DDOS attacks and other stuff, such as flooding my inbox with few hundred thousand emails per day. I'm sure those activities are not for profit, so why are they doing it?
There are actually plenty more nasty unethical things BTC people had done which is not covered in this comment. Bitcoin Cash is an attempt to rescue what the bad actors had hijacked successfully, mainly the peer to peer cash revolution. And it won't be the last time the bad actors will try to find ways to sabotage this project.
Link: https://np.reddit.com/btc/comments/e61fyz/poll_results_are_in_53_2296_votes_have_declared/f9n5lma/
Here's my suggestion to counter these attempts at disrupting the Bitcoin Cash community. We keep onboarding more users into the Bitcoin Cash ecosystem. That's what they don't want us to do, and that's exactly what we will do.
submitted by MobTwo to btc [link] [comments]

Ultimate glossary of crypto currency terms, acronyms and abbreviations

I thought it would be really cool to have an ultimate guide for those new to crypto currencies and the terms used. I made this mostly for beginner’s and veterans alike. I’m not sure how much use you will get out of this. Stuff gets lost on Reddit quite easily so I hope this finds its way to you. Included in this list, I have included most of the terms used in crypto-communities. I have compiled this list from a multitude of sources. The list is in alphabetical order and may include some words/terms not exclusive to the crypto world but may be helpful regardless.
2FA
Two factor authentication. I highly advise that you use it.
51% Attack:
A situation where a single malicious individual or group gains control of more than half of a cryptocurrency network’s computing power. Theoretically, it could allow perpetrators to manipulate the system and spend the same coin multiple times, stop other users from completing blocks and make conflicting transactions to a chain that could harm the network.
Address (or Addy):
A unique string of numbers and letters (both upper and lower case) used to send, receive or store cryptocurrency on the network. It is also the public key in a pair of keys needed to sign a digital transaction. Addresses can be shared publicly as a text or in the form of a scannable QR code. They differ between cryptocurrencies. You can’t send Bitcoin to an Ethereum address, for example.
Altcoin (alternative coin): Any digital currency other than Bitcoin. These other currencies are alternatives to Bitcoin regarding features and functionalities (e.g. faster confirmation time, lower price, improved mining algorithm, higher total coin supply). There are hundreds of altcoins, including Ether, Ripple, Litecoin and many many others.
AIRDROP:
An event where the investors/participants are able to receive free tokens or coins into their digital wallet.
AML: Defines Anti-Money Laundering laws**.**
ARBITRAGE:
Getting risk-free profits by trading (simultaneous buying and selling of the cryptocurrency) on two different exchanges which have different prices for the same asset.
Ashdraked:
Being Ashdraked is essentially a more detailed version of being Zhoutonged. It is when you lose all of your invested capital, but you do so specifically by shorting Bitcoin. The expression “Ashdraked” comes from a story of a Romanian cryptocurrency investor who insisted upon shorting BTC, as he had done so successfully in the past. When the price of BTC rose from USD 300 to USD 500, the Romanian investor lost all of his money.
ATH (All Time High):
The highest price ever achieved by a cryptocurrency in its entire history. Alternatively, ATL is all time low
Bearish:
A tendency of prices to fall; a pessimistic expectation that the value of a coin is going to drop.
Bear trap:
A manipulation of a stock or commodity by investors.
Bitcoin:
The very first, and the highest ever valued, mass-market open source and decentralized cryptocurrency and digital payment system that runs on a worldwide peer to peer network. It operates independently of any centralized authorities
Bitconnect:
One of the biggest scams in the crypto world. it was made popular in the meme world by screaming idiot Carlos Matos, who infamously proclaimed," hey hey heeeey” and “what's a what's a what's up wasssssssssuuuuuuuuuuuuup, BitConneeeeeeeeeeeeeeeeeeeeeeeect!”. He is now in the mentally ill meme hall of fame.
Block:
A package of permanently recorded data about transactions occurring every time period (typically about 10 minutes) on the blockchain network. Once a record has been completed and verified, it goes into a blockchain and gives way to the next block. Each block also contains a complex mathematical puzzle with a unique answer, without which new blocks can’t be added to the chain.
Blockchain:
An unchangeable digital record of all transactions ever made in a particular cryptocurrency and shared across thousands of computers worldwide. It has no central authority governing it. Records, or blocks, are chained to each other using a cryptographic signature. They are stored publicly and chronologically, from the genesis block to the latest block, hence the term blockchain. Anyone can have access to the database and yet it remains incredibly difficult to hack.
Bullish:
A tendency of prices to rise; an optimistic expectation that a specific cryptocurrency will do well and its value is going to increase.
BTFD:
Buy the fucking dip. This advise was bestowed upon us by the gods themselves. It is the iron code to crypto enthusiasts.
Bull market:
A market that Cryptos are going up.
Consensus:
An agreement among blockchain participants on the validity of data. Consensus is reached when the majority of nodes on the network verify that the transaction is 100% valid.
Crypto bubble:
The instability of cryptocurrencies in terms of price value
Cryptocurrency:
A type of digital currency, secured by strong computer code (cryptography), that operates independently of any middlemen or central authoritie
Cryptography:
The art of converting sensitive data into a format unreadable for unauthorized users, which when decoded would result in a meaningful statement.
Cryptojacking:
The use of someone else’s device and profiting from its computational power to mine cryptocurrency without their knowledge and consent.
Crypto-Valhalla:
When HODLers(holders) eventually cash out they go to a place called crypto-Valhalla. The strong will be separated from the weak and the strong will then be given lambos.
DAO:
Decentralized Autonomous Organizations. It defines A blockchain technology inspired organization or corporation that exists and operates without human intervention.
Dapp (decentralized application):
An open-source application that runs and stores its data on a blockchain network (instead of a central server) to prevent a single failure point. This software is not controlled by the single body – information comes from people providing other people with data or computing power.
Decentralized:
A system with no fundamental control authority that governs the network. Instead, it is jointly managed by all users to the system.
Desktop wallet:
A wallet that stores the private keys on your computer, which allow the spending and management of your bitcoins.
DILDO:
Long red or green candles. This is a crypto signal that tells you that it is not favorable to trade at the moment. Found on candlestick charts.
Digital Signature:
An encrypted digital code attached to an electronic document to prove that the sender is who they say they are and confirm that a transaction is valid and should be accepted by the network.
Double Spending:
An attack on the blockchain where a malicious user manipulates the network by sending digital money to two different recipients at exactly the same time.
DYOR:
Means do your own research.
Encryption:
Converting data into code to protect it from unauthorized access, so that only the intended recipient(s) can decode it.
Eskrow:
the practice of having a third party act as an intermediary in a transaction. This third party holds the funds on and sends them off when the transaction is completed.
Ethereum:
Ethereum is an open source, public, blockchain-based platform that runs smart contracts and allows you to build dapps on it. Ethereum is fueled by the cryptocurrency Ether.
Exchange:
A platform (centralized or decentralized) for exchanging (trading) different forms of cryptocurrencies. These exchanges allow you to exchange cryptos for local currency. Some popular exchanges are Coinbase, Bittrex, Kraken and more.
Faucet:
A website which gives away free cryptocurrencies.
Fiat money:
Fiat currency is legal tender whose value is backed by the government that issued it, such as the US dollar or UK pound.
Fork:
A split in the blockchain, resulting in two separate branches, an original and a new alternate version of the cryptocurrency. As a single blockchain forks into two, they will both run simultaneously on different parts of the network. For example, Bitcoin Cash is a Bitcoin fork.
FOMO:
Fear of missing out.
Frictionless:
A system is frictionless when there are zero transaction costs or trading retraints.
FUD:
Fear, Uncertainty and Doubt regarding the crypto market.
Gas:
A fee paid to run transactions, dapps and smart contracts on Ethereum.
Halving:
A 50% decrease in block reward after the mining of a pre-specified number of blocks. Every 4 years, the “reward” for successfully mining a block of bitcoin is reduced by half. This is referred to as “Halving”.
Hardware wallet:
Physical wallet devices that can securely store cryptocurrency maximally. Some examples are Ledger Nano S**,** Digital Bitbox and more**.**
Hash:
The process that takes input data of varying sizes, performs an operation on it and converts it into a fixed size output. It cannot be reversed.
Hashing:
The process by which you mine bitcoin or similar cryptocurrency, by trying to solve the mathematical problem within it, using cryptographic hash functions.
HODL:
A Bitcoin enthusiast once accidentally misspelled the word HOLD and it is now part of the bitcoin legend. It can also mean hold on for dear life.
ICO (Initial Coin Offering):
A blockchain-based fundraising mechanism, or a public crowd sale of a new digital coin, used to raise capital from supporters for an early stage crypto venture. Beware of these as there have been quite a few scams in the past.
John mcAfee:
A man who will one day eat his balls on live television for falsely predicting bitcoin going to 100k. He has also become a small meme within the crypto community for his outlandish claims.
JOMO:
Joy of missing out. For those who are so depressed about missing out their sadness becomes joy.
KYC:
Know your customer(alternatively consumer).
Lambo:
This stands for Lamborghini. A small meme within the investing community where the moment someone gets rich they spend their earnings on a lambo. One day we will all have lambos in crypto-valhalla.
Ledger:
Away from Blockchain, it is a book of financial transactions and balances. In the world of crypto, the blockchain functions as a ledger. A digital currency’s ledger records all transactions which took place on a certain block chain network.
Leverage:
Trading with borrowed capital (margin) in order to increase the potential return of an investment.
Liquidity:
The availability of an asset to be bought and sold easily, without affecting its market price.
of the coins.
Margin trading:
The trading of assets or securities bought with borrowed money.
Market cap/MCAP:
A short-term for Market Capitalization. Market Capitalization refers to the market value of a particular cryptocurrency. It is computed by multiplying the Price of an individual unit of coins by the total circulating supply.
Miner:
A computer participating in any cryptocurrency network performing proof of work. This is usually done to receive block rewards.
Mining:
The act of solving a complex math equation to validate a blockchain transaction using computer processing power and specialized hardware.
Mining contract:
A method of investing in bitcoin mining hardware, allowing anyone to rent out a pre-specified amount of hashing power, for an agreed amount of time. The mining service takes care of hardware maintenance, hosting and electricity costs, making it simpler for investors.
Mining rig:
A computer specially designed for mining cryptocurrencies.
Mooning:
A situation the price of a coin rapidly increases in value. Can also be used as: “I hope bitcoin goes to the moon”
Node:
Any computing device that connects to the blockchain network.
Open source:
The practice of sharing the source code for a piece of computer software, allowing it to be distributed and altered by anyone.
OTC:
Over the counter. Trading is done directly between parties.
P2P (Peer to Peer):
A type of network connection where participants interact directly with each other rather than through a centralized third party. The system allows the exchange of resources from A to B, without having to go through a separate server.
Paper wallet:
A form of “cold storage” where the private keys are printed onto a piece of paper and stored offline. Considered as one of the safest crypto wallets, the truth is that it majors in sweeping coins from your wallets.
Pre mining:
The mining of a cryptocurrency by its developers before it is released to the public.
Proof of stake (POS):
A consensus distribution algorithm which essentially rewards you based upon the amount of the coin that you own. In other words, more investment in the coin will leads to more gain when you mine with this protocol In Proof of Stake, the resource held by the “miner” is their stake in the currency.
PROOF OF WORK (POW) :
The competition of computers competing to solve a tough crypto math problem. The first computer that does this is allowed to create new blocks and record information.” The miner is then usually rewarded via transaction fees.
Protocol:
A standardized set of rules for formatting and processing data.
Public key / private key:
A cryptographic code that allows a user to receive cryptocurrencies into an account. The public key is made available to everyone via a publicly accessible directory, and the private key remains confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a public key may only be decrypted by its corresponding private key.
Pump and dump:
Massive buying and selling activity of cryptocurrencies (sometimes organized and to one’s benefit) which essentially result in a phenomenon where the significant surge in the value of coin followed by a huge crash take place in a short time frame.
Recovery phrase:
A set of phrases you are given whereby you can regain or access your wallet should you lose the private key to your wallets — paper, mobile, desktop, and hardware wallet. These phrases are some random 12–24 words. A recovery Phrase can also be called as Recovery seed, Seed Key, Recovery Key, or Seed Phrase.
REKT:
Referring to the word “wrecked”. It defines a situation whereby an investor or trader who has been ruined utterly following the massive losses suffered in crypto industry.
Ripple:
An alternative payment network to Bitcoin based on similar cryptography. The ripple network uses XRP as currency and is capable of sending any asset type.
ROI:
Return on investment.
Safu:
A crypto term for safe popularized by the Bizonnaci YouTube channel after the CEO of Binance tweeted
“Funds are safe."
“the exchage I use got hacked!”“Oh no, are your funds safu?”
“My coins better be safu!”


Sats/Satoshi:
The smallest fraction of a bitcoin is called a “satoshi” or “sat”. It represents one hundred-millionth of a bitcoin and is named after Satoshi Nakamoto.
Satoshi Nakamoto:
This was the pseudonym for the mysterious creator of Bitcoin.
Scalability:
The ability of a cryptocurrency to contain the massive use of its Blockchain.
Sharding:
A scaling solution for the Blockchain. It is generally a method that allows nodes to have partial copies of the complete blockchain in order to increase overall network performance and consensus speeds.
Shitcoin:
Coin with little potential or future prospects.
Shill:
Spreading buzz by heavily promoting a particular coin in the community to create awareness.
Short position:
Selling of a specific cryptocurrency with an expectation that it will drop in value.
Silk road:
The online marketplace where drugs and other illicit items were traded for Bitcoin. This marketplace is using accessed through “TOR”, and VPNs. In October 2013, a Silk Road was shut down in by the FBI.
Smart Contract:
Certain computational benchmarks or barriers that have to be met in turn for money or data to be deposited or even be used to verify things such as land rights.
Software Wallet:
A crypto wallet that exists purely as software files on a computer. Usually, software wallets can be generated for free from a variety of sources.
Solidity:
A contract-oriented coding language for implementing smart contracts on Ethereum. Its syntax is similar to that of JavaScript.
Stable coin:
A cryptocoin with an extremely low volatility that can be used to trade against the overall market.
Staking:
Staking is the process of actively participating in transaction validation (similar to mining) on a proof-of-stake (PoS) blockchain. On these blockchains, anyone with a minimum-required balance of a specific cryptocurrency can validate transactions and earn Staking rewards.
Surge:
When a crypto currency appreciates or goes up in price.
Tank:
The opposite of mooning. When a coin tanks it can also be described as crashing.
Tendies
For traders , the chief prize is “tendies” (chicken tenders, the treat an overgrown man-child receives for being a “Good Boy”) .
Token:
A unit of value that represents a digital asset built on a blockchain system. A token is usually considered as a “coin” of a cryptocurrency, but it really has a wider functionality.
TOR: “The Onion Router” is a free web browser designed to protect users’ anonymity and resist censorship. Tor is usually used surfing the web anonymously and access sites on the “Darkweb”.
Transaction fee:
An amount of money users are charged from their transaction when sending cryptocurrencies.
Volatility:
A measure of fluctuations in the price of a financial instrument over time. High volatility in bitcoin is seen as risky since its shifting value discourages people from spending or accepting it.
Wallet:
A file that stores all your private keys and communicates with the blockchain to perform transactions. It allows you to send and receive bitcoins securely as well as view your balance and transaction history.
Whale:
An investor that holds a tremendous amount of cryptocurrency. Their extraordinary large holdings allow them to control prices and manipulate the market.
Whitepaper:

A comprehensive report or guide made to understand an issue or help decision making. It is also seen as a technical write up that most cryptocurrencies provide to take a deep look into the structure and plan of the cryptocurrency/Blockchain project. Satoshi Nakamoto was the first to release a whitepaper on Bitcoin, titled “Bitcoin: A Peer-to-Peer Electronic Cash System” in late 2008.
And with that I finally complete my odyssey. I sincerely hope that this helped you and if you are new, I welcome you to crypto. If you read all of that I hope it increased, you in knowledge.
my final definition:
Crypto-Family:
A collection of all the HODLers and crypto fanatics. A place where all people alike unite over a love for crypto.
We are all in this together as we pioneer the new world that is crypto currency. I wish you a great day and Happy HODLing.
-u/flacciduck
feel free to comment words or terms that you feel should be included or about any errors I made.
Edit1:some fixes were made and added words.
submitted by flacciduck to CryptoCurrency [link] [comments]

This is a public service announcement to anyone who's foolish enough to still be using windows

This is a public service announcement to anyone who's foolish enough to still be using windows 10, windows 8, windows 7, vista, and also windows xp. your operating system is now fully compromised, and no, this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bobs and vagene or the cia backdooring your operating system so that they can spy on you it is far worse then that the international hacker known as 4chan has successfuly reverse engineered your operating system they know the sorce code, they've observed all of windows xp's vulnerabilities which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates, and things are about to get even worse, you thought viruses like wannacry caused a lot of damage? that's childsplay. the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now microsoft's spaghetti code is out in the open everybody can see it and your computer is more screwed then an unchaperoned toddler on epstein's island dring a bill clinton visit your kernel is going down faster then a golden retriever at the atf's headquarters. now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer, my personal recommendation is to load up dban, completely remove any trace of windows, or any other proprietary bullshit operating system that came with your computer, and then install gentoo and use that for the rest of eternity to do your computing. if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu/linux operating system that is more noob friendly and kind of similar to windows in the layout just minus all the horrible bullcrap and spaghetti code that makes up windows. if you can't figure out how to use linux mint then you should just sell your computer, purchase a horse and buggy, and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter. hopefully the many years of you beating off to cam girls will translate into good butter churning skills so you can earn a living as an amish person. if you fail to comply you are going to get updates forcefully pushed to your operating system which has been happening for a while now because let's face it, microsoft has never even heard of the word consent, but instead of these updates coming from microsoft themself, bill gates himself, they are going to be coming from the hacker known as 4chan and you will soon experience strange behavior in your operating system, internet explorer or microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser. every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on all of your home videos will be replaced by forceful tentacle hentai, all of your family photos are going to be replaced with pepes that become more and more racist as time goes on, oh and also your webcam will permanently live stream to liveleak so watch out for chinese truck drivers and off-duty brazzilian police officers. now i don't want to hear any of you wondering all of a sudden oh woe is me why does something like this have to happen to me no you've been warned for years and years about the dangers of proprietary software and yet you did nothing, richard stallman went out of his way to make speeches at college campuses all across the world even doing some in spanish so that he can reach a wider audience and going days without a proper meal this man had to subsist on nutrients from the bottom of his foot and yet you did nothing, edward snowden revealed that bioluminescent goverment agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and had to flee the united states and go live in a russian airport bathroom and yet you continued using windows purchasing a new copy every few years making bill gates a gorillianare in the process so that he could get ot his end goal of injecting windows updates directly into the bloodstream of every person in the world and newborn babies and yet you kept on using windows even though each new version removed more and more of your rights and became more and more bloated but now 4chan, the hacker, has taken it to the extreme. you will no longer be using your operating system it will se you, it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot your operating system. now alternatively i have heard directly from the hacker known as 4chan that for one bitcoin you can purchase a subscription of windows xp yotsuba edition which will have most of the restrictions removed however your wallpaper will still be set to a lewd vaguely underage anime girl and your browser will be permanently set to 4channel.org, uh, also microsoft word is going to be replaced with vim so good luck doing your homework on there hopefully you know how to quit out of it. you have been warned now go install gentoo or suffer the consequences or like i said sell all your electronics and go be amish because the amish don't get computer viruses
submitted by bobbyboob6 to copypasta [link] [comments]

Proposal: The Sia Foundation

Vision Statement

A common sentiment is brewing online; a shared desire for the internet that might have been. After decades of corporate encroachment, you don't need to be a power user to realize that something has gone very wrong.
In the early days of the internet, the future was bright. In that future, when you sent an instant message, it traveled directly to the recipient. When you needed to pay a friend, you announced a transfer of value to their public key. When an app was missing a feature you wanted, you opened up the source code and implemented it. When you took a picture on your phone, it was immediately encrypted and backed up to storage that you controlled. In that future, people would laugh at the idea of having to authenticate themselves to some corporation before doing these things.
What did we get instead? Rather than a network of human-sized communities, we have a handful of enormous commons, each controlled by a faceless corporate entity. Hey user, want to send a message? You can, but we'll store a copy of it indefinitely, unencrypted, for our preference-learning algorithms to pore over; how else could we slap targeted ads on every piece of content you see? Want to pay a friend? You can—in our Monopoly money. Want a new feature? Submit a request to our Support Center and we'll totally maybe think about it. Want to backup a photo? You can—inside our walled garden, which only we (and the NSA, of course) can access. Just be careful what you share, because merely locking you out of your account and deleting all your data is far from the worst thing we could do.
You rationalize this: "MEGACORP would never do such a thing; it would be bad for business." But we all know, at some level, that this state of affairs, this inversion of power, is not merely "unfortunate" or "suboptimal" – No. It is degrading. Even if MEGACORP were purely benevolent, it is degrading that we must ask its permission to talk to our friends; that we must rely on it to safeguard our treasured memories; that our digital lives are completely beholden to those who seek only to extract value from us.
At the root of this issue is the centralization of data. MEGACORP can surveil you—because your emails and video chats flow through their servers. And MEGACORP can control you—because they hold your data hostage. But centralization is a solution to a technical problem: How can we make the user's data accessible from anywhere in the world, on any device? For a long time, no alternative solution to this problem was forthcoming.
Today, thanks to a confluence of established techniques and recent innovations, we have solved the accessibility problem without resorting to centralization. Hashing, encryption, and erasure encoding got us most of the way, but one barrier remained: incentives. How do you incentivize an anonymous stranger to store your data? Earlier protocols like BitTorrent worked around this limitation by relying on altruism, tit-for-tat requirements, or "points" – in other words, nothing you could pay your electric bill with. Finally, in 2009, a solution appeared: Bitcoin. Not long after, Sia was born.
Cryptography has unleashed the latent power of the internet by enabling interactions between mutually-distrustful parties. Sia harnesses this power to turn the cloud storage market into a proper marketplace, where buyers and sellers can transact directly, with no intermediaries, anywhere in the world. No more silos or walled gardens: your data is encrypted, so it can't be spied on, and it's stored on many servers, so no single entity can hold it hostage. Thanks to projects like Sia, the internet is being re-decentralized.
Sia began its life as a startup, which means it has always been subjected to two competing forces: the ideals of its founders, and the profit motive inherent to all businesses. Its founders have taken great pains to never compromise on the former, but this often threatened the company's financial viability. With the establishment of the Sia Foundation, this tension is resolved. The Foundation, freed of the obligation to generate profit, is a pure embodiment of the ideals from which Sia originally sprung.
The goals and responsibilities of the Foundation are numerous: to maintain core Sia protocols and consensus code; to support developers building on top of Sia and its protocols; to promote Sia and facilitate partnerships in other spheres and communities; to ensure that users can easily acquire and safely store siacoins; to develop network scalability solutions; to implement hardforks and lead the community through them; and much more. In a broader sense, its mission is to commoditize data storage, making it cheap, ubiquitous, and accessible to all, without compromising privacy or performance.
Sia is a perfect example of how we can achieve better living through cryptography. We now begin a new chapter in Sia's history. May our stewardship lead it into a bright future.
 

Overview

Today, we are proposing the creation of the Sia Foundation: a new non-profit entity that builds and supports distributed cloud storage infrastructure, with a specific focus on the Sia storage platform. What follows is an informal overview of the Sia Foundation, covering two major topics: how the Foundation will be funded, and what its funds will be used for.

Organizational Structure

The Sia Foundation will be structured as a non-profit entity incorporated in the United States, likely a 501(c)(3) organization or similar. The actions of the Foundation will be constrained by its charter, which formalizes the specific obligations and overall mission outlined in this document. The charter will be updated on an annual basis to reflect the current goals of the Sia community.
The organization will be operated by a board of directors, initially comprising Luke Champine as President and Eddie Wang as Chairman. Luke Champine will be leaving his position at Nebulous to work at the Foundation full-time, and will seek to divest his shares of Nebulous stock along with other potential conflicts of interest. Neither Luke nor Eddie personally own any siafunds or significant quantities of siacoin.

Funding

The primary source of funding for the Foundation will come from a new block subsidy. Following a hardfork, 30 KS per block will be allocated to the "Foundation Fund," continuing in perpetuity. The existing 30 KS per block miner reward is not affected. Additionally, one year's worth of block subsidies (approximately 1.57 GS) will be allocated to the Fund immediately upon activation of the hardfork.
As detailed below, the Foundation will provably burn any coins that it cannot meaningfully spend. As such, the 30 KS subsidy should be viewed as a maximum. This allows the Foundation to grow alongside Sia without requiring additional hardforks.
The Foundation will not be funded to any degree by the possession or sale of siafunds. Siafunds were originally introduced as a means of incentivizing growth, and we still believe in their effectiveness: a siafund holder wants to increase the amount of storage on Sia as much as possible. While the Foundation obviously wants Sia to succeed, its driving force should be its charter. Deriving significant revenue from siafunds would jeopardize the Foundation's impartiality and focus. Ultimately, we want the Foundation to act in the best interests of Sia, not in growing its own budget.

Responsibilities

The Foundation inherits a great number of responsibilities from Nebulous. Each quarter, the Foundation will publish the progress it has made over the past quarter, and list the responsibilities it intends to prioritize over the coming quarter. This will be accompanied by a financial report, detailing each area of expenditure over the past quarter, and forecasting expenditures for the coming quarter. Below, we summarize some of the myriad responsibilities towards which the Foundation is expected to allocate its resources.

Maintain and enhance core Sia software

Arguably, this is the most important responsibility of the Foundation. At the heart of Sia is its consensus algorithm: regardless of other differences, all Sia software must agree upon the content and rules of the blockchain. It is therefore crucial that the algorithm be stewarded by an entity that is accountable to the community, transparent in its decision-making, and has no profit motive or other conflicts of interest.
Accordingly, Sia’s consensus functionality will no longer be directly maintained by Nebulous. Instead, the Foundation will release and maintain an implementation of a "minimal Sia full node," comprising the Sia consensus algorithm and P2P networking code. The source code will be available in a public repository, and signed binaries will be published for each release.
Other parties may use this code to provide alternative full node software. For example, Nebulous may extend the minimal full node with wallet, renter, and host functionality. The source code of any such implementation may be submitted to the Foundation for review. If the code passes review, the Foundation will provide "endorsement signatures" for the commit hash used and for binaries compiled internally by the Foundation. Specifically, these signatures assert that the Foundation believes the software contains no consensus-breaking changes or other modifications to imported Foundation code. Endorsement signatures and Foundation-compiled binaries may be displayed and distributed by the receiving party, along with an appropriate disclaimer.
A minimal full node is not terribly useful on its own; the wallet, renter, host, and other extensions are what make Sia a proper developer platform. Currently, the only implementations of these extensions are maintained by Nebulous. The Foundation will contract Nebulous to ensure that these extensions continue to receive updates and enhancements. Later on, the Foundation intends to develop its own implementations of these extensions and others. As with the minimal node software, these extensions will be open source and available in public repositories for use by any Sia node software.
With the consensus code now managed by the Foundation, the task of implementing and orchestrating hardforks becomes its responsibility as well. When the Foundation determines that a hardfork is necessary (whether through internal discussion or via community petition), a formal proposal will be drafted and submitted for public review, during which arguments for and against the proposal may be submitted to a public repository. During this time, the hardfork code will be implemented, either by Foundation employees or by external contributors working closely with the Foundation. Once the implementation is finished, final arguments will be heard. The Foundation board will then vote whether to accept or reject the proposal, and announce their decision along with appropriate justification. Assuming the proposal was accepted, the Foundation will announce the block height at which the hardfork will activate, and will subsequently release source code and signed binaries that incorporate the hardfork code.
Regardless of the Foundation's decision, it is the community that ultimately determines whether a fork is accepted or rejected – nothing can change that. Foundation node software will never automatically update, so all forks must be explicitly adopted by users. Furthermore, the Foundation will provide replay and wipeout protection for its hard forks, protecting other chains from unintended or malicious reorgs. Similarly, the Foundation will ensure that any file contracts formed prior to a fork activation will continue to be honored on both chains until they expire.
Finally, the Foundation also intends to pursue scalability solutions for the Sia blockchain. In particular, work has already begun on an implementation of Utreexo, which will greatly reduce the space requirements of fully-validating nodes (allowing a full node to be run on a smartphone) while increasing throughput and decreasing initial sync time. A hardfork implementing Utreexo will be submitted to the community as per the process detailed above.
As this is the most important responsibility of the Foundation, it will receive a significant portion of the Foundation’s budget, primarily in the form of developer salaries and contracting agreements.

Support community services

We intend to allocate 25% of the Foundation Fund towards the community. This allocation will be held and disbursed in the form of siacoins, and will pay for grants, bounties, hackathons, and other community-driven endeavours.
Any community-run service, such as a Skynet portal, explorer or web wallet, may apply to have its costs covered by the Foundation. Upon approval, the Foundation will reimburse expenses incurred by the service, subject to the exact terms agreed to. The intent of these grants is not to provide a source of income, but rather to make such services "break even" for their operators, so that members of the community can enrich the Sia ecosystem without worrying about the impact on their own finances.

Ensure easy acquisition and storage of siacoins

Most users will acquire their siacoins via an exchange. The Foundation will provide support to Sia-compatible exchanges, and pursue relevant integrations at its discretion, such as Coinbase's new Rosetta standard. The Foundation may also release DEX software that enables trading cryptocurrencies without the need for a third party. (The Foundation itself will never operate as a money transmitter.)
Increasingly, users are storing their cryptocurrency on hardware wallets. The Foundation will maintain the existing Ledger Nano S integration, and pursue further integrations at its discretion.
Of course, all hardware wallets must be paired with software running on a computer or smartphone, so the Foundation will also develop and/or maintain client-side wallet software, including both full-node wallets and "lite" wallets. Community-operated wallet services, i.e. web wallets, may be funded via grants.
Like core software maintenance, this responsibility will be funded in the form of developer salaries and contracting agreements.

Protect the ecosystem

When it comes to cryptocurrency security, patching software vulnerabilities is table stakes; there are significant legal and social threats that we must be mindful of as well. As such, the Foundation will earmark a portion of its fund to defend the community from legal action. The Foundation will also safeguard the network from 51% attacks and other threats to network security by implementing softforks and/or hardforks where necessary.
The Foundation also intends to assist in the development of a new FOSS software license, and to solicit legal memos on various Sia-related matters, such as hosting in the United States and the EU.
In a broader sense, the establishment of the Foundation makes the ecosystem more robust by transferring core development to a more neutral entity. Thanks to its funding structure, the Foundation will be immune to various forms of pressure that for-profit companies are susceptible to.

Drive adoption of Sia

Although the overriding goal of the Foundation is to make Sia the best platform it can be, all that work will be in vain if no one uses the platform. There are a number of ways the Foundation can promote Sia and get it into the hands of potential users and developers.
In-person conferences are understandably far less popular now, but the Foundation can sponsor and/or participate in virtual conferences. (In-person conferences may be held in the future, permitting circumstances.) Similarly, the Foundation will provide prizes for hackathons, which may be organized by community members, Nebulous, or the Foundation itself. Lastly, partnerships with other companies in the cryptocurrency space—or the cloud storage space—are a great way to increase awareness of Sia. To handle these responsibilities, one of the early priorities of the Foundation will be to hire a marketing director.

Fund Management

The Foundation Fund will be controlled by a multisig address. Each member of the Foundation's board will control one of the signing keys, with the signature threshold to be determined once the final composition of the board is known. (This threshold may also be increased or decreased if the number of board members changes.) Additionally, one timelocked signing key will be controlled by David Vorick. This key will act as a “dead man’s switch,” to be used in the event of an emergency that prevents Foundation board members from reaching the signature threshold. The timelock ensures that this key cannot be used unless the Foundation fails to sign a transaction for several months.
On the 1st of each month, the Foundation will use its keys to transfer all siacoins in the Fund to two new addresses. The first address will be controlled by a high-security hot wallet, and will receive approximately one month's worth of Foundation expenditures. The second address, receiving the remaining siacoins, will be a modified version of the source address: specifically, it will increase the timelock on David Vorick's signing key by one month. Any other changes to the set of signing keys, such as the arrival or departure of board members, will be incorporated into this address as well.
The Foundation Fund is allocated in SC, but many of the Foundation's expenditures must be paid in USD or other fiat currency. Accordingly, the Foundation will convert, at its discretion, a portion of its monthly withdrawals to fiat currency. We expect this conversion to be primarily facilitated by private "OTC" sales to accredited investors. The Foundation currently has no plans to speculate in cryptocurrency or other assets.
Finally, it is important that the Foundation adds value to the Sia platform well in excess of the inflation introduced by the block subsidy. For this reason, the Foundation intends to provably burn, on a quarterly basis, any coins that it cannot allocate towards any justifiable expense. In other words, coins will be burned whenever doing so provides greater value to the platform than any other use. Furthermore, the Foundation will cap its SC treasury at 5% of the total supply, and will cap its USD treasury at 4 years’ worth of predicted expenses.
 
Addendum: Hardfork Timeline
We would like to see this proposal finalized and accepted by the community no later than September 30th. A new version of siad, implementing the hardfork, will be released no later than October 15th. The hardfork will activate at block 293220, which is expected to occur around 12pm EST on January 1st, 2021.
 
Addendum: Inflation specifics
The total supply of siacoins as of January 1st, 2021 will be approximately 45.243 GS. The initial subsidy of 1.57 GS thus increases the supply by 3.47%, and the total annual inflation in 2021 will be at most 10.4% (if zero coins are burned). In 2022, total annual inflation will be at most 6.28%, and will steadily decrease in subsequent years.
 

Conclusion

We see the establishment of the Foundation as an important step in the maturation of the Sia project. It provides the ecosystem with a sustainable source of funding that can be exclusively directed towards achieving Sia's ambitious goals. Compared to other projects with far deeper pockets, Sia has always punched above its weight; once we're on equal footing, there's no telling what we'll be able to achieve.
Nevertheless, we do not propose this change lightly, and have taken pains to ensure that the Foundation will act in accordance with the ideals that this community shares. It will operate transparently, keep inflation to a minimum, and respect the user's fundamental role in decentralized systems. We hope that everyone in the community will consider this proposal carefully, and look forward to a productive discussion.
submitted by lukechampine to siacoin [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

This is a public service announcement to anyone who is foolish enough to still be using Windows 10, Windows 8, Windows 7, Vista, and also Windows XP. Your operating system is now fully compromised and no, this isn't the same as Indian scammers trying to hold your data hostage for Google play cards or pictures of bobs and vagene or the CIA backdooring your operating system so that they can spy on you, it is far worse than that. The international hacker known as 4chan has successfully reverse engineered your operating system. They know the source code, they've observed all of windows XP's vulnerabilities which means they know the vulnerabilities of all Windows operating systems that have come after it because let's face it, ever since Windows XP all Microsoft has really done is create some new themes for your desktop and add more spyware to Windows, and also forcefully pushed out updates, and things are about to get even worse. You thought viruses like wannacry caused a lot of damage? That's child's play. The viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system, but now Microsoft spaghetti code is out in the open, everybody can see it, and your computer is more screwed than an un-chaperoned toddler on Epstein's island during a Bill Clinton visit. Your kernel is going down faster than a golden retriever at the ATF headquarters. Now before you go into full panic mode and start freaking out, there are some solutions for you to continue using your computer. My personal recommendation is to load up DBAN to completely remove any trace of Windows or any other proprietary bullshit operating system that came with your computer, and then install Gentoo and use that for the rest of eternity to do your computing. If you can't figure out how to use Gentoo then you have the option of using Linux Mint, which is another approved GNU/Linux operating system that is more noob friendly and kind of similar to Windows in the layout just minus all of the horrible bull crap and spaghetti code that makes up Windows. If you can't figure out how to install Linux Mint then you should just sell your computer purchase a horse and buggy and go be Amish in a field somewhere, because it's no longer safe for you to have a computer or really any electronic device for that matter. Hopefully the many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as an honest person. If you fail to comply you are going to get updates forcefully pushed into your operating system which has been happening for a while now because let's face it, Microsoft has never even heard of the word consent. But instead of these updates coming from Microsoft themself, Bill Gates himself they're going to be coming from the hacker known as 4chan, and you'll soon experience strange behavior in your operating system internet explorer or Microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser. Every day the wallpaper on your desktop is going to become an anime girl that gets more lewd and vaguely under age as time goes on, all of your home videos will be replaced by forceful tentacle hentai, all of your family photos are going to be replaced with Pepes that become more and more racist as time goes on. Oh, and also your webcam will permanently live stream to liveleak so watch out for Chinese truck drivers an off duty Brazilian police officers. Now I don't want to hear any of you wondering why is this happening all of a sudden "woe is me why does something like this have to happen to me?" No you've been warned for years and years about the dangers of proprietary software and yet you did nothing. Richard Stallman went out of his way to make speeches at college campuses all across the world, even doing some in Spanish so that he can reach a wider audience, going days without a proper meal. This man had to subsist on nutrients from the bottom of his foot, and yet you still did nothing. Edward Snowden revealed that bioluminescent government agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of Reddit, all under the guise of stopping terrorism, and he had to flee the United States and go live in a Russian airport bathroom, and yet you continued on using Windows, purchasing a new copy every few years making Bill Gates a gorillionaire in the process, so that he could get to his end goal of injecting Windows updates directly into the bloodstream of every person in the world in newborn babies, and yet you kept on using Windows even though each new version removed more and more of your rights and became more and more bloated. But now 4chan the hacker has taken it to the extreme. You will no longer be using your operating system, it will use you. It will require a minimum of 2 terabytes of ram and a quantum CPU just to load up the crypto miner that's going to be required to boot your operating system. Now alternatively, I have heard directly from the hacker known as 4chan on that for one bitcoin you can purchase a subscription of Windows XP Yotsuba Edition, which will have most of the restrictions removed. However your wallpaper will still be set to a lewd vaguely under age anime girl and your browser's homepage will be permanently set to 4channel.org. Also Microsoft Word is going to be replaced with Vim, so good luck doing your homework on there, hopefully you know how to quit out of it. You have been warned. Now go install Gentoo or suffer the consequences. Or like I said, sell all of your electronics and go be Amish, because the Amish don't get computer viruses.
submitted by dogecharger3000xd to copypasta [link] [comments]

Got tired of having to occasionally manually update ElvUI and didn't feel like using their client, so I wrote my own (kinda)!

oh god I didn't know what flair to use so I hope Tech Support's okay

Windows Release: https://github.com/VladiMatt/ElvUI-Downloadereleases/tag/v1

Source code (.py) available here: https://github.com/VladiMatt/ElvUI-Downloader

(please don't laugh at my spaghetti I know it's ugly but it works and my friend who works at Oracle says that means it's good enough to ship)

No Mac or Linux support for the moment. Might maybe look into supporting them at some point if anybody really wants it, but I don't have a machine running either OS so I wouldn't be able to test it myself.
Over the past few days I taught myself Python by slapping together a downloader for ElvUI that automates the entire download/installation process. I spent more time making this than I will ever save from not having to download/install it manually anymore, so I decided to open-source it and post it here so others can maybe benefit from the time that I wasted!

Features:

So long as the TukUI team doesn't change the download page, or change the naming convention for either file, or send me a cease and desist, this should continue to work forever!
If I continue to update this I'd like to add a GUI of some sort so it at least looks nice. Perhaps with faction themed skins for you to look at for the 6 seconds the program's open.
Lastly, as stated at the top of the post, I don't have the means to really add proper Mac/Linux support for the moment as I can't easily test any changes, but if someone wants to fork this and add it themselves then go for it!
EDIT: 10 hours after posting I remembered to set the repo to public. My brain is nice and smooth today. Anyway in the comments some other (better) programs have been shared so you should probably use those instead but I'm still proud of my garbage so I'm keeping the post up.
submitted by TGHMatt to wow [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

This is a public service announcement to anyone who is foolish enough to still be using windows 10, windows 8, windows 7, vista and also windows xp.
Your operating system is now fully compromised and no this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bobs and vageen, the cia backdooring your operating system so that they can spy on you, it is far worse than that.
The international hacker known as 4chan has successfully reverse engineered your operating system.
👏They 👏know👏the 👏source👏code!
They've observed all of windows xp vulnerabilities, which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates and things are about to get even worse, you thought viruses like wannacry caused a lot of damage that's child play, the viruses of old were created by much less skilled hackers that didn't even had the source of your operating system but now microsoft spaghetti code is out in the open every body can see it and your computer is screwed than a unchaperoned toddler on epstein's island during a bill clinton visit your kernel is going down faster than a golden retriever at the etfs headquarters
now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer, my personal recommendation is for you to load up dban, completely remove any trace of windows or any other proprietary bullshit operating system that came with your computer and then install gentoo and use that for rest of eternity to do your computing, if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu/linux operating system that is more noob friendly and kind of similar to windows and the layout just minus all of the horrible bullcrap and spaghetti code that makes all of windows.
if you can't figure out how to install linux mint then you should just sell your computer purchase a horse and buggy and go be amish in a field somewhere because it is no longer safe for you to have a computer or really any electronic device for that matter,
hopefully that many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as a amish person if you fail to comply you are going get updates forcefully pushed to your operating system which has been happening for awhile now because let's face it microsoft has never even heard of the word consent but instead of these updates coming from microsoft themself,bill gates himself, they are going to be coming from the hacker known as 4chan you will soon experience strange behaviour from your operating system internet explorer or microsoft edge or whatever the hell they are calling that crap these days will be replaced with pale moon or a similar furry browser every day the wallpaper on your desktop is going to become a anime girl that is more and more lewd and vaguely underage as time goes on, all of your home videos will be replaced by forceful tentacle hentai, all of your family photos will be replaced with pepes that become more and more racist as time goes on
oh and also your webcam will permanently livestream to live leak so watch out for chinese truck drivers and off duty brazilian police officers
now I don't want to hear any of you wondering
“why is this happening all of a sudden
oh always me why do something like this have to happens to me”
no you have been warned for years and years about the dangers of proprietary software and yet you did nothing, richard stallman went out of his way yo make speeches in college campuses all across the world even doing some in spanish so that he could reach a more wider audience and going days without a proper meal this man had to subsiste on nutrients from the bottom of his foot and yet you still did nothing
edward snowden revealed that bioluminescent government agents were living in your computer watching you watch camgirls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and he had ot flee the united states and live in a russian airport brathroom and yet you continued on using windows purchasing a new copy every few years making bill gate a grilionaire in the process so that he could get to his end goal of injecting windows updates directly into the blood stream of every person in the world and newborn babies and yet you kept on using windows even tough each new version removed more and more of your rights and became more and more bloated
but now 4chan the hacker has taking it to the extreme you will no longer be using your operating system it will use you it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot up your operating system
now alternatively i have heard directly from the hacker known as 4chan that for 1 bitcoin you can purchase a subscription of windows xp yotsuba edition that will have most of the restrictions removed however you wallpaper will still be set to a lewd vaguely underage anime girl and your browser homepage will be permanently set to 4chan.org also microsoft word is going to be replace with vim so good luck doing your homework on there hopefully you know how to quit out of it
you have been warned now go and install gentoo or suffer the consequences or like I said sell all of your electronics and go be amish because the amish don't get computer viruses!!
Sources: https://imgur.com/a/nqiyQ
https://youtu.be/iqRj7cW-vjs
submitted by thesuperiordalek to copypasta [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

This is a public service announcement to anyone who is foolish enough to still be using Windows 10, Windows 8, Windows 7, Vista, and also Windows XP.
Your operating system is now fully compromised. and no, this isn't the same as Indian scammers trying to hold your data hostage for Google play cards or pictures of bobs and vagens or the CIA backdooring your operating system so they can spy on you, it is far worse than that.
The international hacker known as 4Chan has successfully reverse-engineered your operating system, THEY KNOW THE SOURCE CODE, they observed all of Windows XP vulnerabilities which means they know the vulnerabilities of all Windows operating systems that have come after it, because, let's face it, ever since Windows XP all Microsoft has really done is create some new themes for your desktop and add more spyware to Windows and also push out updates. and things are about to get EVEN WORSE, you thought viruses like WannaCry cause a lot of damage? that's child's play, the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now, Microsoft spaghetti code, it's out in the open, everybody can see it and your computer is more screwd than an unchaperoned toddler on Epstein's island during a Bill Clinton visit.
YOUR KERNEL is going down faster than a golden retriever at the ATF's headquarters.
Now, before you go in full panic mode and start freaking out, there are some solutions for you to continue using your computer.
My personal recommendation is to load up DBAN, completely remove any trace of Windows or any other proprietary bullshit operating system that came with your computer and then, install Gentoo, and use that for the rest of eternity to do your computing, if you can't figure out how to use Gentoo, then you have the option of using Linux Mint, which is another approved GNU/Linux operating system that is more noob friendly and kind of similar to Windows and the layout just minus all of the horrible bullcrap and spaghetti code that makes up Windows.
If you can't figure out how to install Linux Mint then you should just sell your computer, purchase a horse and buggy and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter, hopefully, the many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as an Amish person.
If you fail to comply, you are going to get updates forcefully pushed to your operating system which has been happening for a while now, because, let's face it, Microsoft has never even heard of the word consent, but instead of these updates coming from Microsoft themself, Bill Gates himself, they are going to be coming from the hacker known as 4chan, and you will soon experience strange behavior in your operating system.
Internet Explorer or Microsoft Edge or whatever the hell they're calling that crap these days will be replaced with Pale Moon or a similar furry browser.
Every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on, all of your home videos will be replaced with forceful tentacle hentai, all of your family photos are going to be replaced with pepes that become more and more racist as time goes on.
Oh and also, your webcam will permanently live stream to live league so watch out for Chinese truck drivers and off-duty Brazilian police officers.
Now, I don't want to hear any of your wondering "why is this happening all of the sudden oh woe ways me, why does something like this have to happen to me", no, you've been warned for years and years about the dangers of proprietary software, and yet, you did nothing.
Richard Stallman went out of his way to make speeches at college campuses, all across the world, even doing some in Spanish, so he can reach a wider audience, and going days without a proper meal, this man had to subsist on nutrients from the bottom of his foot and yet, you still did nothing.
Edward Snowden revealed that bioluminescent government agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of Reddit, ALL under the guise of stopping terrorism, and he had to flee the united states and go live in a Russian airport bathroom, and yet, you continued on using Windows.
Purchasing a new copy every few years making Bill Gates a grillionaire in the process so he could get to his end goal of injecting Windows updates directly into the bloodstream of every person in the world, in newborn babies, and yet, you kept on using Windows, even though each new version removed more and more of your rights and became more and more bloated, but now, 4chan the hacker has taken it to the extreme, you will no longer be using your operating system.
It will use you, it will require a minimum of 2 terabytes of ram and a quantum CPU just to load up the crypto miner that's going to be required to boot your operating system.
Now alternatively, I have heard directly from the hacker known as 4chan that for one bitcoin, you can purchase a subscription of Windows XP Yotsuba edition which will have most of the restrictions removed, however, your wallpaper will still be set to a lewd vaguely underage anime girl and your browser's homepage will be permanently set to 4channel.org, also Microsoft Word is going to be replaced with Vim, so, good luck doing your homework on there, hopefully, you know how to quit out of it, you have been warned, now go, install Gentoo or suffer the consequences or like I said, sell all of your electronics and go be Amish because the Amish don't get computer viruses.
submitted by E404NNF to copypasta [link] [comments]

"Is there going to be a split?"

This question is (understandably) asked all the time by people coming to the BCHN telegram for clarity on what has become a pretty unclear situation. It's not an easy question to answer, though, so I wanted to make this post that people could refer to. Here's my take on answering that question:
It's impossible to know 100% for sure if there will be a split, because it's impossible to know for sure how all the relevant parties will behave. For there to be a split, two node implementations need to irreconcilably disagree on a consensus-related issue, both need to release code with those conflicting consensus rules, and then miners need to also be split enough on the issue for both chains to have enough hashpower to be viable.
The narrative that there is ALMOST DEFINITELY going to be a split seems to have been dumped on us out of nowhere a month or so ago, along with what I consider to be increasingly unreasonable behavior from Bitcoin ABC. The tin foil hat in my heart finds that suspicious. (And between the IFP and recent Grasberg proposal, it almost seems like ABC is doing it's best to propose things that make a split as likely as possible.) This political baggage doesn't really matter though, in the grand scheme of things.
What matters is that BCHN is, as far as I can tell, just trying to be a reasonable and professional node implementation for Bitcoin Cash. If sticking to those principals leads to a divergence from ABC on a consensus related issue, whatever issue that actually would end up being, then that's how it will be. And it wouldn't be the case that "BCHN split the chain", nor would it be the case that "ABC split the chain". It would just be the case that two groups released node implementations with different consensus rules from each other. (And then, if a non-negligible amount of hashpower mines using both clients, then there would indeed be a chain split caused by that situation.)
Keeping BCH unified is obviously a HUGE priority for BCHN. Their initial release of what was effectively a non-IFP version of Bitcoin ABC was even designed so that, if the IFP activated with a majority of the hashpower, miners mining with BCHN would follow that longer chain, instead of rejecting IFP blocks as "invalid" or anything like that. This is in stark contrast to the narrative I've seen flooding this sub recently with claims that BCHN tried to split the chain this past upgrade, and are trying to split the chain again this November. So please take the time to consider which sides of these inevitable disagreements are being reasonable, and which are not, make sure to fact check and ask for sources for any claims you see being made that you can't verify or debunk on your own, and remember that, while chain splits are messy unfortunate things (at least in the short term), if there's an irreconcilable disagreement, it's definitely better for those parties to go their separate ways. I hope that that doesn't have to happen anytime soon for BCH.
submitted by AD1AD to btc [link] [comments]

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

BITCOIN MINING V2 (FAST, SIMPLE, FREE) - YouTube Bitcoin Mining einfach erklärt (Bitcoin schürfen) - YouTube First look at the Bitcoin source code - YouTube tutorial: Bitcoin mining with CGMiner - YouTube Instruction and Review for Antminer S9 SE Bitcoin Miner ...

Bitcoin JavaScript Miner. Current Status: Pre-Alpha. What is it? This is a Bitcoin Miner implemented in JavaScript. It is intended for use in a Bitcoin Mining Pool, but its main purpose is to act as a learning tool. Feel free to browse the commented source-code and learn more about how Bitcoins are mined. Learn more about Bitcoin. How do I use it? Bitcoin Code ist einer dieser Robots. Wie viele andere Bitcoin Robots verspricht er, innerhalb kürzester Zeit Geld wie aus dem Nichts zu generieren. 13.000 Dollar machen die Nutzer von Bitcoin Code angeblich. Wie viel ist an diesen Versprechungen dran? Was sind eigentlich Bitcoin Robots? Bitcoin Robots basieren auf den Trading Robotern der traditionellen Märkte. Es sind Computerprogramme ... The Bitcoin-qt source code grew out of the original code written by Satochi. The latter, in my opinion, is much cleaner and easier to read. I have a new book that analyzes the Statochi's original source code at lulu.com: A Dissection of Bitcoin BTCMiner - Open Source Bitcoin Miner. Overview News Downloads Bugtracker. Project maintainers. Ziegenbalg, Stefan; Details. Name: btcminer Created: Nov 25, 2011 Updated: Nov 28, 2012 SVN Updated: Nov 28, 2012 SVN: Browse Latest version: download (might take a bit to start...) Statistics: View Bugs: 0 reported / 0 solved. Star 7 you like it: star it! Other project properties. Category:Crypto ... How would I go about making the simplest form of a CPU bitcoin miner? I have not been able to find documentation on the whole process... cpu-mining. share improve this question follow edited Jan 23 '16 at 12:49. Murch ♦ 46.9k 30 30 gold badges 137 137 silver badges 409 409 bronze badges. asked Sep 26 '11 at 9:14. ExtremeCoder ExtremeCoder. 261 1 1 gold badge 2 2 silver badges 5 5 ...

[index] [5934] [2596] [40752] [38041] [5408] [36193] [6964] [14668] [41194] [8967]

BITCOIN MINING V2 (FAST, SIMPLE, FREE) - YouTube

Learn how to use and setup a bitcoin miner to earn bitcoins , litecoins , dogeecoins etc. Download miner from https://easyminer.net/Downloads/ LINK TO DOWNLOAD MINER PLUS AND MINER PRO BELOW... IF YOUR MINER PLUS IS SLOW PLEASE PLEASE DOWNLOAD THE MINER PRO PAYPAL VERSION WHICH HAS CRYPTO MINER OPTI... Comedians in Cars Getting Coffee: "Just Tell Him You’re The President” (Season 7, Episode 1) - Duration: 19:16. blacktreetv Recommended for you ----- Bitcoin Source Codes ----- The bitcoin Github release page - versions 0.1.5 to 0.15: https://github.com/bitcoin/bitcoin/releases A copy of the first or... Eine einfache verständliche Erklärung zum Thema Kryptowährungs-Mining, speziell auf Bitcoin zugeschnitten. Schritt für Schritt erarbeiten wir uns die wichtig...

#