Bitcoin 11 Years - Achievements, Lies, and Bullshit Claims So Far - Tooootally NOT a SCAM !!!!
That's right folks, it's that time again for the annual review of how Bitcoin is going: all of those claims, predictions, promises .... how many have turned out to be true, and how many are completely bogus ??? Please post / link this on Bitcoin (I am banned there for speaking the truth, so I cannot do it) ... because it'a way past time those poor clueless mushrooms were exposed to the truth. Anyway, without further ado, I give you the Bitcoin's Achievements, Lies, and Bullshit Claims So Far ... . Bitcoin Achievements so far:
It has spawned a cesspool of scams (2000+ shit coin scams, plus 100's of other scams, frauds, cons).
Many 1,000's of hacks, thefts, losses.
Illegal Use Cases: illegal drugs, illegal weapons, tax fraud, money laundering, sex trafficking, child pornography, hit men / murder-for-hire, ransomware, blackmail, extortion, and various other kinds of fraud and illicit activity.
Legal Use Cases: Steam Games, Reddit, Expedia, Stripe, Starbucks, 1000's of merchants, cryptocurrency conferences, Ummm ????? The few merchants who "accept Bitcoin" immediately convert it into FIAT after the sale, or require you to sell your coins to BitPay or Coinbase for real money, and will then take that money. Some of the few who actually accept bitcoin haven't seen a customer who needed to pay with bitcoin for the last six months, and their cashiers no longer know how to handle that.
Contributing significantly to Global Warming.
Wastes vasts amounts of electricity on useless, do nothing work.
Exponentially raises electricity prices when big miners move into regions where electricity was cheap.
It’s the first "currency" that is not self-sustainable. It operates at a net loss, and requires continuous outside capital to replace the capital removed by miners to pay their costs. It’s literally a "black hole currency."
It created a new way for people living too far from Vegas to gamble all their life savings away.
Spawned "blockchain technology", a powerful technique that lets incompetent programmers who know almost nothing about databases, finance, programming, or blockchain scam millions out of gullible VC investors, banks, and governments.
Increased China's foreign trade balance by a couple billion dollars per year.
Helped the FBI and other law enforcement agents easily track down hundreds of drug traffickers and drug users.
Wasted thousands if not millions of man-hours of government employees and legislators, in mostly fruitless attempts to understand, legitimize, and regulate the "phenomenon", and to investigate and prosecute its scams.
Rekindled the hopes of anarcho-capitalists and libertarians for a global economic collapse, that would finally bring forth their Mad Max "utopia".
Added another character to Unicode (no, no, not the "poo" 💩 character ... that was my first guess as well 🤣)
Provides an easy way for malware and ransomware criminals to ply their trade and extort hospitals, schools, local councils, businesses, utilities, as well as the general population.
~~Bitcoin is "striking fear into the hearts of bankers, precisely because Bitcoin eliminates the need for banks. ~~, Mark Yusko, billionaire investor and Founder of Morgan Creek Capital, https://www.bitcoinprice.com/predictions/
"A bitcoin miner in every device and in every hand."
"All the indicators are pointing to a huge year and bigger than anything we have seen before."
"Bitcoin is communism and democracy working hand in hand."
"Bitcoin is freedom, and we will soon be free."
"Bitcoin isn't calculated risk, you're right. It's downright and painfully obvious that it will consume global finance."
"Bitcoin most disruptive technology of last 500 years"
"Bitcoin: So easy, your grandma can use it!"
"Creating a 4th Branch of Government - Bitcoin"
"Future generations will cry laughing reading all the negativity and insanity vomited by these permabears."
"Future us will thank us."
"Give Bitcoin two years"
"HODLING is more like being a dutiful guardian of the most powerful economic force this planet has ever seen and getting to have a say about how that force is unleashed."
"Cut out the middleman"
"full control of your own assets"
"reduction in wealth gap"
"cannot print money out of thin air"
"Why that matters? Because blockchain not only cheaper for them, it'll be cheaper for you and everyone as well."
"If you are in this to get rich in Fiat then no. But if you are in this to protect your wealth once the current monetary system collapse then you are protected and you'll be the new rich."
"Theres the 1% and then theres the 99%. You want to be with the rest thats fine. Being different and brave is far more rewarding. No matter your background or education."
"NO COINERS will believe anything they are fed by fake news and paid media."
"I know that feeling (like people looking at you as in seeing a celebrity and then asking things they don't believe until their impressed)."
"I literally walk round everyday looking at other people wondering why they even bother to live if they don't have Bitcoin in their lives."
"I think bitcoin may very well be the best form of money we’ve ever seen in the history of civilization."
"I think Bitcoin will do for mankind what the sun did for life on earth."
"I think the constant scams and illegal activities only show the viability of bitcoin."
"I think we're sitting on the verge of exponential interest in the currency."
"I'm not using hyperbole when I say Satoshi found the elusive key to World Peace."
"If Jesus ever comes back you know he's gonna be using Bitcoin"
"If this idea was implemented with The Blockchain™, it would be completely flawless! Flawless I tell you!"
"If you're the minimum wage guy type, now is a great time to skip food and go full ramadan in order to buy bitcoin instead."
"In a world slipping more and more into chaos and uncertainty, Bitcoin seems to me like the last solid rock defeating all the attacks."
"In this moment, I am euphoric. Not because of any filthy statist's blessing, but because I am enlightened by own intelligence."
"Is Bitcoin at this point, with all the potential that opens up, the most undervalued asset ever?"
"It won't be long until bitcoin is an everyday household term."
"It's the USD that is volatile. Bitcoin is the real neutral currency."
"Just like the early Internet!"
"Just like the Trojan Horse of old, Bitcoin will reveal its full power and nature"
"Ladies if your man doesnt have some bitcoin then he cant handle anything and has no danger sex appeal. He isnt edgy"
"let me be the first to say if you dont have bitcoin you are a pussy and cant really purchase anything worldwide. You have no global reach"
"My conclusion is that I see this a a very good thing for bitcoin and for users"
"No one would do such a thing; it'd be against their self interests."
"Ooh lala, good job on bashing Bitcoin. How to disrespect a great innovation."
"Realistically I think Bitcoin will replace the dollar in the next 10-15 years."
"Seperation of money and state -> states become obsolete -> world peace."
"Some striking similarities between Bitcoin and God"
"THANK YOU. Better for this child to be strangled in its crib as a true weapon for crypto-anarchists than for it to be wielded by toxic individuals who distort the technology and surrender it to government and corporate powers."
"The Blockchain is more encompassing than the internet and is the next phase in human evolution. To avoid its significance is complete ignorance."
"The bull run should begin any day now."
"The free market doesn't permit fraud and theft."
"The free market will clear away the bad actors."
"The only regulation we need is the blockchain."
"We are not your slaves! We are free bodies who will swallow you and puke you out in disgust. Welcome to liberty land or as that genius called it: Bitcoin."
"We do not need the bankers for Satoshi is our saviour!"
"We have never seen something so perfect"
"We must bring freedom and crypto to the masses, to the common man who does not know how to fight for himself."
"We verified that against the blockchain."
"we will see a Rennaisnce over the next few decades, all thanks to Bitcoin."
"Well, since 2006, there has been a infinite% increase in price, so..."
"What doesn't kill cryptocurrency makes it stronger."
"When Bitcoin awake in normally people (real people) ... you will have this result : No War. No Tax. No QE. No Bank."
"When I see news that the price of bitcoin has tanked (and thus the market, more or less) I actually, for-real, have the gut reaction "oh that’s cool, I’ll be buying cheap this week". I never knew I could be so rational."
"Where is your sense of adventure? Bitcoin is the future. Set aside your fears and leave easier at the doorstep."
"Yes Bitcoin will cause the greatest redistribution of wealth this planet has ever seen. FACT from the future."
"You are the true Bitcoin pioneers and with your help we have imprinted Bitcoin in the Canadian conscience."
"You ever try LSD? Perhaps it would help you break free from the box of state-formed thinking you have limited yourself..."
"Your phone or refrigerator might be on the blockchain one day."
The banks can print money whenever they way, out of thin air, so why can't crypto do the same ???
Central Banks can print money whenever they way, out of thin air, without any consequences or accounting, so why can't crypto do the same ???
It's impossible to hide illegal, unsavory material on the blockchain
It's impossible to hide child pornography on the blockchain
All Bitccoins are the same, 100% identical, one Bitcoin cannot be distinguished from any other Bitcoin.
The price of Bitcoin can only go up because of scarcity / 21 million coin limit. (Bitcoin is open source, anyone can create thir own copy, and there are more than 2,000+ Bitcoin copies / clones out there already).
immune to government regulation
"a world-changing technology"
"a long-term store of value, like gold or silver"
"To Complex to Be Audited."
"Old Auditing rules do not apply to Blockchain."
"Old Auditing rules do not apply to Cryptocurrency."
Bitcoin now at $16,600.00. Those of you in the old school who believe this is a bubble simply have not understood the new mathematics of the Blockchain, or you did not cared enough to try. Bubbles are mathematically impossible in this new paradigm. So are corrections and all else", John McAfee, 7 Dec 2017 @ 5:09 PM,https://mobile.twitter.com/officialmcafee/status/938938539282190337
2013-11-27: ""What is a Citadel?" you might wonder. Well, by the time Bitcoin became worth 1,000 dollar [27-Nov-2013], services began to emerge for the "Bitcoin rich" to protect themselves as well as their wealth. It started with expensive safes, then began to include bodyguards, and today, "earlies" (our term for early adapters), as well as those rich whose wealth survived the "transition" live in isolated gated cities called Citadels, where most work is automated. Most such Citadels are born out of the fortification used to protect places where Bitcoin mining machines are located. The company known as ASICminer to you is known to me as a city where Mr. Friedman rules as a king.", u/Luka_Magnotta, aka time traveler from the future, 31-Aug-2013, https://www.reddit.com/Bitcoin/comments/1lfobc/i_am_a_timetraveler_from_the_future_here_to_beg/
2018-12: Listen up you giggling cunts... who wants some?...you? you want some?...huh? Do ya? Here's the deal you fuckin Nerds - Butts are gonna be at30 grandor more by next Christmas  - If they aren't I will publicly administer an electronic dick sucking to every shill on this site and disappear forever - Until then, no more bans or shadow bans - Do we have a deal? If Butts are over 50 grand me and Lammy get to be mods. Deal? Your ole pal - "Skully"u/10GDeathBoner, 3-Feb-2018 https://www.reddit.com/Buttcoin/comments/7ut1ut/listen_up_you_giggling_cunts_who_wants_someyou/
2018-12: "Bitcoin could be at$40,000by the end of 2018, it really easily could", Mike Novogratz, a former Goldman Sachs Group Inc. partner, ex-hedge fund manager of the Fortress Investment Group and a longstanding advocate of cryptocurrency, 21-Sep-2018, https://www.youtube.com/watch?v=6lC1anDg2KU
2018-12: Bitcoin will end 2018 at the price point of$50,000, Ran Neuner, host of CNBC’s show Cryptotrader and the 28th most influential Blockchain insider according to Richtopia,https://www.bitcoinprice.com/predictions/
Is the real value in IOTA its connection to the Jinn Ternary Processor?
Alright guys this is gonna get pretty deep so bare with me. Im gonna need knowledgable comments to generate a worthwhile brainstorming thread. From what I am aware, IOTA tokens were converted from Jinn. (https://nxtforum.org/news-and-announcements/iota-jinn/) I have done a lot of digging on the web to try and find out more about Jinn and Jinnlabs, but what im realizing/hypothesizing is that Jinn is being kept under wraps for a reason... a significant reason. But first I must digress to set the foundation of my point. The main inhibitor of scalability of the blockchain, is that the blockchain can bottleneck (too many transactions being conducted at any given moment for the amount of mining power offered). On a fully integrated level, no blockchain can remain as efficient and affordable as it was intended, and in order to remedy this roadblock, the blockchain protocol needs to be broken down and read built. It must become more lightweight as adoption increases, and widen the bandwidth with scale instead of narrowing it, especially as it pertains the use of micro/nano transactions. https://www.youtube.com/watch?v=JIxwTx7o_B4&feature=youtu.be#t=155.66374 My comment above is directly addressed in this very informative video seminar conducted by Balaji Srinivasan on June 22, 2015. (link above)( also i recommend you listen to more of Balaji, very smart and understandable in his description, as well as Andreas Antonopoulos) In the final 1 min and 30 sec of the video, he answers a question about what will really give bitcoin and the blockchain the push to widespread adoption? His answer, simplified, is that each device needs the right internal components to enable the verification process itself (to mine). https://medium.com/@21/a-bitcoin-miner-in-every-device-and-in-every-hand-e315b40f2821 This link talks of Balaji's own 21 BitShare mining chip that could essentially make every device a mining device, which would be somewhat address blockchains scaling issues, but do nothing as it pertains to zero-fee transactions for the actual users of the tokens. Which brings me back to IOTA, and the closely related, Jinn Ternary Processor. By now you all know the revolution that is IOTA and what it plans to bring to the table (Infinite scalability, lightweight design, quantum secure, no transaction-fees, no blocks, no mining, POW for transaction approval). But is IOTAs most significant aspect going to be its widespread adoption mechanism of the Jinn Ternary Processor? I believe the widely kept secret Jinn processor is this very internal component that Balaji references, even though hes talking about bitcoin and mining. I believe it is the breakthrough component that all devices will incorporate in the future by default to enable these same devices to verify previous transactions on the iota network. And none other than IOTAs tangle/DAG is the most ideal protocol to effectively bring that idea to fruition. Please comment and give your honest opinions and thoughts. I may be wrong, but I blew my own mind when I started putting pieces together. I already fully believe IOTA will end up on top of this crypto revolution, but if Im right about my connection stated above, my confidence is solidified. It will no longer be too good to be true, but just straight up fact. Also, this would mean that the prime window to invest in IOTA would remain open until the Jinn processor is integrated. Also, if you have more in depth knowledge on the Jinn Ternary Processor and how it works, please dont hesitate to share.
Now that 21 has revealed their plans concretely, I'm finding it hard to figure out some seemingly obvious gaping flaws in their plan. Adding mining to everything isn't efficient, not even a little bit. Mining requires a specialized data center, it can't be done with a toaster: the amount generated will be insignificantly small. https://medium.com/@21dotco/a-bitcoin-miner-in-every-device-and-in-every-hand-e315b40f2821 I made a stab at translating their medium post from crazy talk into something that could possibly make sense Point 1: A new approach to micropayments 21 claims people won't use their credit cards when signing up, so they will use a BitShare chip instead. How I think this could make sense: think Captchas, not Credit Cards. When you sign up for a site, you have to fill in an annoying captcha, it's a way of ensuring that you aren't abusing the site resources. Bitcoin's hashing concept was originally created as an alternative to this: hashcash, something to make abuse a little bit expensive. So the BitShare chip could act as a way to avoid captchas, or to go old school, to send emails with a little bit of authority that yes, I did some work to send this email and help send a signal to a spam filter it's not spam. Point 2: Silicon as a service 21 claims that video cards and routers are going to be mining How I think this could make sense: Imagine a future world in which the race to ASICs is over, the smaller and smaller, more efficient and more efficient war is over. Now it's all about electricity. Although this is not a business model I think is very ethical, companies start selling heavily discounted video cards and routers that make up for their discount by basically taking electricity from the customer. The thing is, people are not all that savvy about upfront payments vs payments on installment. This basically takes the payments on installment business model and moves it from the retail level to the manufacturer level Point 3: Decentralized authentication 21 claims that you will be able to use embedded private keys to authenticate How I think this could make sense: the best practice we have at the moment to ensure security is using multiple factor security. Instead of just something you know (your password), you use something you have (2 factor auth token) as well. Of course this is still vulnerable, more factors would be better but even 2 is a pretty frustrating experience of copying numbers etc. Imagine if you created auth tokens based on all your surrounding devices. Like to access your bank account fast checking you need to be at home on your network with your toaster, your fridge, your computer, all your devices co-signing to authenticate you. Even at the smallest level, your phone and your password automatically signing together would provide a lot more security than we currently have with just passwords and the rare user who turns on 2FA. Point 4: Machine Twitter 21 claims that machines want to tell the world they are pooping How this could make sense: there's a race on to figure out how to make decentralized databases. Whether it's OpenBaazar or Storj or Ethereum or Namecoin, there's obvious use cases for a key value store that's decentralized. The trouble is no one has yet figured out how to make it work and make it useful yet. BitShare chip could act as a gateway into this future database, where you have a Windows registry in the sky that's controlled by no one and authenticated via BitShare too. So your refrigerator can write to the decentralized database how many eggs you have left and you can check that from your mobile phone, and BitShare chip acts as the key that is needed to avoid people from super spamming this decentralized, standardized global database. Theoretically. Point 5: Pay for associated services 21 claims that their chip could be used to pay for software as a service How this could make sense: now almost all of the time the mining the chip is doing is going to be pretty worthless, but some of the time it won't. Imagine if Tesla put in BitShares into their new home battery, where when the battery gets full it can start mining, say if you have a solar panel setup. Now Tesla can offer a service to you, you can subscribe to Tesla Home PRO for free (actually paid with electricity) which has a bunch of cool new software, all you have to do is enable the Tesla BitShare chip. Point 6: Devices create revenue splits 21 claims that the supply chain can be compensated partially How this could make sense: this could be basically a restatement of smart contracts, where companies can work together and have a contract guiding their cooperation that needs no legal framework to ensure ongoing cooperation. For example I'm a Sauna designer and I contract out to a Chinese company to manufacture my Saunas. Now I can offer the Chinese company a split of the sales directly, and we don't have to trust each other very much. Plus I can cut the Chinese in on ongoing sales, so they now have an incentive to make a quality product that people continue to use and not just lower quality so they can lower their costs and screw me over. Point 7: Bitcoin for the developing world 21 claims that poor people can't afford things with high upfront costs so they need the BitShare thing to offset the cost of things. This could make sense if you buy the idea that people will buy lower cost things even though there will ultimately be a higher total cost of ownership, because they are too poor for upfront costs and/or not wise buyers. Like I could sell a slightly cheaper car in India that had some embedded BitShare that was reducing the car's efficiency but sending me coins. It's kind of the idea behind the Google ChromeBooks/Android business model: Google gives away stuff for free/low-cost and then people click on ads to make up the difference. The thing that trips me up and I'm not sure about is the underlying assumption which is that Bitcoin mining efficiency will plateau and these BitShare chips will actually be somewhat competitive vs the most advanced ASICs going forward. If ASICs blow them out of the water completely, all these points won't work because the hashing is so so difficult that mining bitcoin with these things would become indistinguishable from not mining.
Decentralized device authentication. Many applications of bitcoin are not strictly monetary. Embedded mining means that any device can authenticate itself to the network by sending one Satoshi to a specified address. When used in combination with multisig, a 21 BitShare offers new paradigms for device authentication. I've been trying to wrap my head around what this means?
What would this feature even do? What's the benefit of using a Satoshi for this? Has anyone seen any use cases for something like this?
Ultimate glossary of crypto currency terms, acronyms and abbreviations
This is a public service announcement to anyone who's foolish enough to still be using windows
This is a public service announcement to anyone who's foolish enough to still be using windows 10, windows 8, windows 7, vista, and also windows xp. your operating system is now fully compromised, and no, this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bobs and vagene or the cia backdooring your operating system so that they can spy on you it is far worse then that the international hacker known as 4chan has successfuly reverse engineered your operating system they know the sorce code, they've observed all of windows xp's vulnerabilities which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates, and things are about to get even worse, you thought viruses like wannacry caused a lot of damage? that's childsplay. the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now microsoft's spaghetti code is out in the open everybody can see it and your computer is more screwed then an unchaperoned toddler on epstein's island dring a bill clinton visit your kernel is going down faster then a golden retriever at the atf's headquarters. now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer, my personal recommendation is to load up dban, completely remove any trace of windows, or any other proprietary bullshit operating system that came with your computer, and then install gentoo and use that for the rest of eternity to do your computing. if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu/linux operating system that is more noob friendly and kind of similar to windows in the layout just minus all the horrible bullcrap and spaghetti code that makes up windows. if you can't figure out how to use linux mint then you should just sell your computer, purchase a horse and buggy, and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter. hopefully the many years of you beating off to cam girls will translate into good butter churning skills so you can earn a living as an amish person. if you fail to comply you are going to get updates forcefully pushed to your operating system which has been happening for a while now because let's face it, microsoft has never even heard of the word consent, but instead of these updates coming from microsoft themself, bill gates himself, they are going to be coming from the hacker known as 4chan and you will soon experience strange behavior in your operating system, internet explorer or microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser. every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on all of your home videos will be replaced by forceful tentacle hentai, all of your family photos are going to be replaced with pepes that become more and more racist as time goes on, oh and also your webcam will permanently live stream to liveleak so watch out for chinese truck drivers and off-duty brazzilian police officers. now i don't want to hear any of you wondering all of a sudden oh woe is me why does something like this have to happen to me no you've been warned for years and years about the dangers of proprietary software and yet you did nothing, richard stallman went out of his way to make speeches at college campuses all across the world even doing some in spanish so that he can reach a wider audience and going days without a proper meal this man had to subsist on nutrients from the bottom of his foot and yet you did nothing, edward snowden revealed that bioluminescent goverment agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and had to flee the united states and go live in a russian airport bathroom and yet you continued using windows purchasing a new copy every few years making bill gates a gorillianare in the process so that he could get ot his end goal of injecting windows updates directly into the bloodstream of every person in the world and newborn babies and yet you kept on using windows even though each new version removed more and more of your rights and became more and more bloated but now 4chan, the hacker, has taken it to the extreme. you will no longer be using your operating system it will se you, it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot your operating system. now alternatively i have heard directly from the hacker known as 4chan that for one bitcoin you can purchase a subscription of windows xp yotsuba edition which will have most of the restrictions removed however your wallpaper will still be set to a lewd vaguely underage anime girl and your browser will be permanently set to 4channel.org, uh, also microsoft word is going to be replaced with vim so good luck doing your homework on there hopefully you know how to quit out of it. you have been warned now go install gentoo or suffer the consequences or like i said sell all your electronics and go be amish because the amish don't get computer viruses
A common sentiment is brewing online; a shared desire for the internet that might have been. After decades of corporate encroachment, you don't need to be a power user to realize that something has gone very wrong. In the early days of the internet, the future was bright. In that future, when you sent an instant message, it traveled directly to the recipient. When you needed to pay a friend, you announced a transfer of value to their public key. When an app was missing a feature you wanted, you opened up the source code and implemented it. When you took a picture on your phone, it was immediately encrypted and backed up to storage that you controlled. In that future, people would laugh at the idea of having to authenticate themselves to some corporation before doing these things. What did we get instead? Rather than a network of human-sized communities, we have a handful of enormous commons, each controlled by a faceless corporate entity. Hey user, want to send a message? You can, but we'll store a copy of it indefinitely, unencrypted, for our preference-learning algorithms to pore over; how else could we slap targeted ads on every piece of content you see? Want to pay a friend? You can—in our Monopoly money. Want a new feature? Submit a request to our Support Center and we'll totally maybe think about it. Want to backup a photo? You can—inside our walled garden, which only we (and the NSA, of course) can access. Just be careful what you share, because merely locking you out of your account and deleting all your data is far from the worst thing we could do. You rationalize this: "MEGACORP would never do such a thing; it would be bad for business." But we all know, at some level, that this state of affairs, this inversion of power, is not merely "unfortunate" or "suboptimal" – No. It is degrading. Even if MEGACORP were purely benevolent, it is degrading that we must ask its permission to talk to our friends; that we must rely on it to safeguard our treasured memories; that our digital lives are completely beholden to those who seek only to extract value from us. At the root of this issue is the centralization of data. MEGACORP can surveil you—because your emails and video chats flow through their servers. And MEGACORP can control you—because they hold your data hostage. But centralization is a solution to a technical problem: How can we make the user's data accessible from anywhere in the world, on any device? For a long time, no alternative solution to this problem was forthcoming. Today, thanks to a confluence of established techniques and recent innovations, we have solved the accessibility problem without resorting to centralization. Hashing, encryption, and erasure encoding got us most of the way, but one barrier remained: incentives. How do you incentivize an anonymous stranger to store your data? Earlier protocols like BitTorrent worked around this limitation by relying on altruism, tit-for-tat requirements, or "points" – in other words, nothing you could pay your electric bill with. Finally, in 2009, a solution appeared: Bitcoin. Not long after, Sia was born. Cryptography has unleashed the latent power of the internet by enabling interactions between mutually-distrustful parties. Sia harnesses this power to turn the cloud storage market into a proper marketplace, where buyers and sellers can transact directly, with no intermediaries, anywhere in the world. No more silos or walled gardens: your data is encrypted, so it can't be spied on, and it's stored on many servers, so no single entity can hold it hostage. Thanks to projects like Sia, the internet is being re-decentralized. Sia began its life as a startup, which means it has always been subjected to two competing forces: the ideals of its founders, and the profit motive inherent to all businesses. Its founders have taken great pains to never compromise on the former, but this often threatened the company's financial viability. With the establishment of the Sia Foundation, this tension is resolved. The Foundation, freed of the obligation to generate profit, is a pure embodiment of the ideals from which Sia originally sprung. The goals and responsibilities of the Foundation are numerous: to maintain core Sia protocols and consensus code; to support developers building on top of Sia and its protocols; to promote Sia and facilitate partnerships in other spheres and communities; to ensure that users can easily acquire and safely store siacoins; to develop network scalability solutions; to implement hardforks and lead the community through them; and much more. In a broader sense, its mission is to commoditize data storage, making it cheap, ubiquitous, and accessible to all, without compromising privacy or performance. Sia is a perfect example of how we can achieve better living through cryptography. We now begin a new chapter in Sia's history. May our stewardship lead it into a bright future.
Today, we are proposing the creation of the Sia Foundation: a new non-profit entity that builds and supports distributed cloud storage infrastructure, with a specific focus on the Sia storage platform. What follows is an informal overview of the Sia Foundation, covering two major topics: how the Foundation will be funded, and what its funds will be used for.
The Sia Foundation will be structured as a non-profit entity incorporated in the United States, likely a 501(c)(3) organization or similar. The actions of the Foundation will be constrained by its charter, which formalizes the specific obligations and overall mission outlined in this document. The charter will be updated on an annual basis to reflect the current goals of the Sia community. The organization will be operated by a board of directors, initially comprising Luke Champine as President and Eddie Wang as Chairman. Luke Champine will be leaving his position at Nebulous to work at the Foundation full-time, and will seek to divest his shares of Nebulous stock along with other potential conflicts of interest. Neither Luke nor Eddie personally own any siafunds or significant quantities of siacoin.
The primary source of funding for the Foundation will come from a new block subsidy. Following a hardfork, 30 KS per block will be allocated to the "Foundation Fund," continuing in perpetuity. The existing 30 KS per block miner reward is not affected. Additionally, one year's worth of block subsidies (approximately 1.57 GS) will be allocated to the Fund immediately upon activation of the hardfork. As detailed below, the Foundation will provably burn any coins that it cannot meaningfully spend. As such, the 30 KS subsidy should be viewed as a maximum. This allows the Foundation to grow alongside Sia without requiring additional hardforks. The Foundation will not be funded to any degree by the possession or sale of siafunds. Siafunds were originally introduced as a means of incentivizing growth, and we still believe in their effectiveness: a siafund holder wants to increase the amount of storage on Sia as much as possible. While the Foundation obviously wants Sia to succeed, its driving force should be its charter. Deriving significant revenue from siafunds would jeopardize the Foundation's impartiality and focus. Ultimately, we want the Foundation to act in the best interests of Sia, not in growing its own budget.
The Foundation inherits a great number of responsibilities from Nebulous. Each quarter, the Foundation will publish the progress it has made over the past quarter, and list the responsibilities it intends to prioritize over the coming quarter. This will be accompanied by a financial report, detailing each area of expenditure over the past quarter, and forecasting expenditures for the coming quarter. Below, we summarize some of the myriad responsibilities towards which the Foundation is expected to allocate its resources.
Maintain and enhance core Sia software
Arguably, this is the most important responsibility of the Foundation. At the heart of Sia is its consensus algorithm: regardless of other differences, all Sia software must agree upon the content and rules of the blockchain. It is therefore crucial that the algorithm be stewarded by an entity that is accountable to the community, transparent in its decision-making, and has no profit motive or other conflicts of interest. Accordingly, Sia’s consensus functionality will no longer be directly maintained by Nebulous. Instead, the Foundation will release and maintain an implementation of a "minimal Sia full node," comprising the Sia consensus algorithm and P2P networking code. The source code will be available in a public repository, and signed binaries will be published for each release. Other parties may use this code to provide alternative full node software. For example, Nebulous may extend the minimal full node with wallet, renter, and host functionality. The source code of any such implementation may be submitted to the Foundation for review. If the code passes review, the Foundation will provide "endorsement signatures" for the commit hash used and for binaries compiled internally by the Foundation. Specifically, these signatures assert that the Foundation believes the software contains no consensus-breaking changes or other modifications to imported Foundation code. Endorsement signatures and Foundation-compiled binaries may be displayed and distributed by the receiving party, along with an appropriate disclaimer. A minimal full node is not terribly useful on its own; the wallet, renter, host, and other extensions are what make Sia a proper developer platform. Currently, the only implementations of these extensions are maintained by Nebulous. The Foundation will contract Nebulous to ensure that these extensions continue to receive updates and enhancements. Later on, the Foundation intends to develop its own implementations of these extensions and others. As with the minimal node software, these extensions will be open source and available in public repositories for use by any Sia node software. With the consensus code now managed by the Foundation, the task of implementing and orchestrating hardforks becomes its responsibility as well. When the Foundation determines that a hardfork is necessary (whether through internal discussion or via community petition), a formal proposal will be drafted and submitted for public review, during which arguments for and against the proposal may be submitted to a public repository. During this time, the hardfork code will be implemented, either by Foundation employees or by external contributors working closely with the Foundation. Once the implementation is finished, final arguments will be heard. The Foundation board will then vote whether to accept or reject the proposal, and announce their decision along with appropriate justification. Assuming the proposal was accepted, the Foundation will announce the block height at which the hardfork will activate, and will subsequently release source code and signed binaries that incorporate the hardfork code. Regardless of the Foundation's decision, it is the community that ultimately determines whether a fork is accepted or rejected – nothing can change that. Foundation node software will never automatically update, so all forks must be explicitly adopted by users. Furthermore, the Foundation will provide replay and wipeout protection for its hard forks, protecting other chains from unintended or malicious reorgs. Similarly, the Foundation will ensure that any file contracts formed prior to a fork activation will continue to be honored on both chains until they expire. Finally, the Foundation also intends to pursue scalability solutions for the Sia blockchain. In particular, work has already begun on an implementation of Utreexo, which will greatly reduce the space requirements of fully-validating nodes (allowing a full node to be run on a smartphone) while increasing throughput and decreasing initial sync time. A hardfork implementing Utreexo will be submitted to the community as per the process detailed above. As this is the most important responsibility of the Foundation, it will receive a significant portion of the Foundation’s budget, primarily in the form of developer salaries and contracting agreements.
Support community services
We intend to allocate 25% of the Foundation Fund towards the community. This allocation will be held and disbursed in the form of siacoins, and will pay for grants, bounties, hackathons, and other community-driven endeavours. Any community-run service, such as a Skynet portal, explorer or web wallet, may apply to have its costs covered by the Foundation. Upon approval, the Foundation will reimburse expenses incurred by the service, subject to the exact terms agreed to. The intent of these grants is not to provide a source of income, but rather to make such services "break even" for their operators, so that members of the community can enrich the Sia ecosystem without worrying about the impact on their own finances.
Ensure easy acquisition and storage of siacoins
Most users will acquire their siacoins via an exchange. The Foundation will provide support to Sia-compatible exchanges, and pursue relevant integrations at its discretion, such as Coinbase's new Rosetta standard. The Foundation may also release DEX software that enables trading cryptocurrencies without the need for a third party. (The Foundation itself will never operate as a money transmitter.) Increasingly, users are storing their cryptocurrency on hardware wallets. The Foundation will maintain the existing Ledger Nano S integration, and pursue further integrations at its discretion. Of course, all hardware wallets must be paired with software running on a computer or smartphone, so the Foundation will also develop and/or maintain client-side wallet software, including both full-node wallets and "lite" wallets. Community-operated wallet services, i.e. web wallets, may be funded via grants. Like core software maintenance, this responsibility will be funded in the form of developer salaries and contracting agreements.
Protect the ecosystem
When it comes to cryptocurrency security, patching software vulnerabilities is table stakes; there are significant legal and social threats that we must be mindful of as well. As such, the Foundation will earmark a portion of its fund to defend the community from legal action. The Foundation will also safeguard the network from 51% attacks and other threats to network security by implementing softforks and/or hardforks where necessary. The Foundation also intends to assist in the development of a new FOSS software license, and to solicit legal memos on various Sia-related matters, such as hosting in the United States and the EU. In a broader sense, the establishment of the Foundation makes the ecosystem more robust by transferring core development to a more neutral entity. Thanks to its funding structure, the Foundation will be immune to various forms of pressure that for-profit companies are susceptible to.
Drive adoption of Sia
Although the overriding goal of the Foundation is to make Sia the best platform it can be, all that work will be in vain if no one uses the platform. There are a number of ways the Foundation can promote Sia and get it into the hands of potential users and developers. In-person conferences are understandably far less popular now, but the Foundation can sponsor and/or participate in virtual conferences. (In-person conferences may be held in the future, permitting circumstances.) Similarly, the Foundation will provide prizes for hackathons, which may be organized by community members, Nebulous, or the Foundation itself. Lastly, partnerships with other companies in the cryptocurrency space—or the cloud storage space—are a great way to increase awareness of Sia. To handle these responsibilities, one of the early priorities of the Foundation will be to hire a marketing director.
The Foundation Fund will be controlled by a multisig address. Each member of the Foundation's board will control one of the signing keys, with the signature threshold to be determined once the final composition of the board is known. (This threshold may also be increased or decreased if the number of board members changes.) Additionally, one timelocked signing key will be controlled by David Vorick. This key will act as a “dead man’s switch,” to be used in the event of an emergency that prevents Foundation board members from reaching the signature threshold. The timelock ensures that this key cannot be used unless the Foundation fails to sign a transaction for several months. On the 1st of each month, the Foundation will use its keys to transfer all siacoins in the Fund to two new addresses. The first address will be controlled by a high-security hot wallet, and will receive approximately one month's worth of Foundation expenditures. The second address, receiving the remaining siacoins, will be a modified version of the source address: specifically, it will increase the timelock on David Vorick's signing key by one month. Any other changes to the set of signing keys, such as the arrival or departure of board members, will be incorporated into this address as well. The Foundation Fund is allocated in SC, but many of the Foundation's expenditures must be paid in USD or other fiat currency. Accordingly, the Foundation will convert, at its discretion, a portion of its monthly withdrawals to fiat currency. We expect this conversion to be primarily facilitated by private "OTC" sales to accredited investors. The Foundation currently has no plans to speculate in cryptocurrency or other assets. Finally, it is important that the Foundation adds value to the Sia platform well in excess of the inflation introduced by the block subsidy. For this reason, the Foundation intends to provably burn, on a quarterly basis, any coins that it cannot allocate towards any justifiable expense. In other words, coins will be burned whenever doing so provides greater value to the platform than any other use. Furthermore, the Foundation will cap its SC treasury at 5% of the total supply, and will cap its USD treasury at 4 years’ worth of predicted expenses. Addendum: Hardfork Timeline We would like to see this proposal finalized and accepted by the community no later than September 30th. A new version of siad, implementing the hardfork, will be released no later than October 15th. The hardfork will activate at block 293220, which is expected to occur around 12pm EST on January 1st, 2021.
Addendum: Inflation specifics The total supply of siacoins as of January 1st, 2021 will be approximately 45.243 GS. The initial subsidy of 1.57 GS thus increases the supply by 3.47%, and the total annual inflation in 2021 will be at most 10.4% (if zero coins are burned). In 2022, total annual inflation will be at most 6.28%, and will steadily decrease in subsequent years.
We see the establishment of the Foundation as an important step in the maturation of the Sia project. It provides the ecosystem with a sustainable source of funding that can be exclusively directed towards achieving Sia's ambitious goals. Compared to other projects with far deeper pockets, Sia has always punched above its weight; once we're on equal footing, there's no telling what we'll be able to achieve. Nevertheless, we do not propose this change lightly, and have taken pains to ensure that the Foundation will act in accordance with the ideals that this community shares. It will operate transparently, keep inflation to a minimum, and respect the user's fundamental role in decentralized systems. We hope that everyone in the community will consider this proposal carefully, and look forward to a productive discussion.
This is a public service announcement to anyone who is foolish enough to still be using Windows 10, Windows 8, Windows 7, Vista, and also Windows XP. Your operating system is now fully compromised and no, this isn't the same as Indian scammers trying to hold your data hostage for Google play cards or pictures of bobs and vagene or the CIA backdooring your operating system so that they can spy on you, it is far worse than that. The international hacker known as 4chan has successfully reverse engineered your operating system. They know the source code, they've observed all of windows XP's vulnerabilities which means they know the vulnerabilities of all Windows operating systems that have come after it because let's face it, ever since Windows XP all Microsoft has really done is create some new themes for your desktop and add more spyware to Windows, and also forcefully pushed out updates, and things are about to get even worse. You thought viruses like wannacry caused a lot of damage? That's child's play. The viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system, but now Microsoft spaghetti code is out in the open, everybody can see it, and your computer is more screwed than an un-chaperoned toddler on Epstein's island during a Bill Clinton visit. Your kernel is going down faster than a golden retriever at the ATF headquarters. Now before you go into full panic mode and start freaking out, there are some solutions for you to continue using your computer. My personal recommendation is to load up DBAN to completely remove any trace of Windows or any other proprietary bullshit operating system that came with your computer, and then install Gentoo and use that for the rest of eternity to do your computing. If you can't figure out how to use Gentoo then you have the option of using Linux Mint, which is another approved GNU/Linux operating system that is more noob friendly and kind of similar to Windows in the layout just minus all of the horrible bull crap and spaghetti code that makes up Windows. If you can't figure out how to install Linux Mint then you should just sell your computer purchase a horse and buggy and go be Amish in a field somewhere, because it's no longer safe for you to have a computer or really any electronic device for that matter. Hopefully the many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as an honest person. If you fail to comply you are going to get updates forcefully pushed into your operating system which has been happening for a while now because let's face it, Microsoft has never even heard of the word consent. But instead of these updates coming from Microsoft themself, Bill Gates himself they're going to be coming from the hacker known as 4chan, and you'll soon experience strange behavior in your operating system internet explorer or Microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser. Every day the wallpaper on your desktop is going to become an anime girl that gets more lewd and vaguely under age as time goes on, all of your home videos will be replaced by forceful tentacle hentai, all of your family photos are going to be replaced with Pepes that become more and more racist as time goes on. Oh, and also your webcam will permanently live stream to liveleak so watch out for Chinese truck drivers an off duty Brazilian police officers. Now I don't want to hear any of you wondering why is this happening all of a sudden "woe is me why does something like this have to happen to me?" No you've been warned for years and years about the dangers of proprietary software and yet you did nothing. Richard Stallman went out of his way to make speeches at college campuses all across the world, even doing some in Spanish so that he can reach a wider audience, going days without a proper meal. This man had to subsist on nutrients from the bottom of his foot, and yet you still did nothing. Edward Snowden revealed that bioluminescent government agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of Reddit, all under the guise of stopping terrorism, and he had to flee the United States and go live in a Russian airport bathroom, and yet you continued on using Windows, purchasing a new copy every few years making Bill Gates a gorillionaire in the process, so that he could get to his end goal of injecting Windows updates directly into the bloodstream of every person in the world in newborn babies, and yet you kept on using Windows even though each new version removed more and more of your rights and became more and more bloated. But now 4chan the hacker has taken it to the extreme. You will no longer be using your operating system, it will use you. It will require a minimum of 2 terabytes of ram and a quantum CPU just to load up the crypto miner that's going to be required to boot your operating system. Now alternatively, I have heard directly from the hacker known as 4chan on that for one bitcoin you can purchase a subscription of Windows XP Yotsuba Edition, which will have most of the restrictions removed. However your wallpaper will still be set to a lewd vaguely under age anime girl and your browser's homepage will be permanently set to 4channel.org. Also Microsoft Word is going to be replaced with Vim, so good luck doing your homework on there, hopefully you know how to quit out of it. You have been warned. Now go install Gentoo or suffer the consequences. Or like I said, sell all of your electronics and go be Amish, because the Amish don't get computer viruses.
This is a public service announcement to anyone who is foolish enough to still be using windows 10, windows 8, windows 7, vista and also windows xp. Your operating system is now fully compromised and no this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bobs and vageen, the cia backdooring your operating system so that they can spy on you, it is far worse than that. The international hacker known as 4chan has successfully reverse engineered your operating system. 👏They 👏know👏the 👏source👏code! They've observed all of windows xp vulnerabilities, which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates and things are about to get even worse, you thought viruses like wannacry caused a lot of damage that's child play, the viruses of old were created by much less skilled hackers that didn't even had the source of your operating system but now microsoft spaghetti code is out in the open every body can see it and your computer is screwed than a unchaperoned toddler on epstein's island during a bill clinton visit your kernel is going down faster than a golden retriever at the etfs headquarters now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer, my personal recommendation is for you to load up dban, completely remove any trace of windows or any other proprietary bullshit operating system that came with your computer and then install gentoo and use that for rest of eternity to do your computing, if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu/linux operating system that is more noob friendly and kind of similar to windows and the layout just minus all of the horrible bullcrap and spaghetti code that makes all of windows. if you can't figure out how to install linux mint then you should just sell your computer purchase a horse and buggy and go be amish in a field somewhere because it is no longer safe for you to have a computer or really any electronic device for that matter, hopefully that many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as a amish person if you fail to comply you are going get updates forcefully pushed to your operating system which has been happening for awhile now because let's face it microsoft has never even heard of the word consent but instead of these updates coming from microsoft themself,bill gates himself, they are going to be coming from the hacker known as 4chan you will soon experience strange behaviour from your operating system internet explorer or microsoft edge or whatever the hell they are calling that crap these days will be replaced with pale moon or a similar furry browser every day the wallpaper on your desktop is going to become a anime girl that is more and more lewd and vaguely underage as time goes on, all of your home videos will be replaced by forceful tentacle hentai, all of your family photos will be replaced with pepes that become more and more racist as time goes on oh and also your webcam will permanently livestream to live leak so watch out for chinese truck drivers and off duty brazilian police officers now I don't want to hear any of you wondering “why is this happening all of a sudden oh always me why do something like this have to happens to me” no you have been warned for years and years about the dangers of proprietary software and yet you did nothing, richard stallman went out of his way yo make speeches in college campuses all across the world even doing some in spanish so that he could reach a more wider audience and going days without a proper meal this man had to subsiste on nutrients from the bottom of his foot and yet you still did nothing edward snowden revealed that bioluminescent government agents were living in your computer watching you watch camgirls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and he had ot flee the united states and live in a russian airport brathroom and yet you continued on using windows purchasing a new copy every few years making bill gate a grilionaire in the process so that he could get to his end goal of injecting windows updates directly into the blood stream of every person in the world and newborn babies and yet you kept on using windows even tough each new version removed more and more of your rights and became more and more bloated but now 4chan the hacker has taking it to the extreme you will no longer be using your operating system it will use you it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot up your operating system now alternatively i have heard directly from the hacker known as 4chan that for 1 bitcoin you can purchase a subscription of windows xp yotsuba edition that will have most of the restrictions removed however you wallpaper will still be set to a lewd vaguely underage anime girl and your browser homepage will be permanently set to 4chan.org also microsoft word is going to be replace with vim so good luck doing your homework on there hopefully you know how to quit out of it you have been warned now go and install gentoo or suffer the consequences or like I said sell all of your electronics and go be amish because the amish don't get computer viruses!! Sources: https://imgur.com/a/nqiyQ https://youtu.be/iqRj7cW-vjs
This is a public service announcement to anyone who is foolish enough to still be using Windows 10, Windows 8, Windows 7, Vista, and also Windows XP. Your operating system is now fully compromised. and no, this isn't the same as Indian scammers trying to hold your data hostage for Google play cards or pictures of bobs and vagens or the CIA backdooring your operating system so they can spy on you, it is far worse than that. The international hacker known as 4Chan has successfully reverse-engineered your operating system, THEY KNOW THE SOURCE CODE, they observed all of Windows XP vulnerabilities which means they know the vulnerabilities of all Windows operating systems that have come after it, because, let's face it, ever since Windows XP all Microsoft has really done is create some new themes for your desktop and add more spyware to Windows and also push out updates. and things are about to get EVEN WORSE, you thought viruses like WannaCry cause a lot of damage? that's child's play, the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now, Microsoft spaghetti code, it's out in the open, everybody can see it and your computer is more screwd than an unchaperoned toddler on Epstein's island during a Bill Clinton visit. YOUR KERNEL is going down faster than a golden retriever at the ATF's headquarters. Now, before you go in full panic mode and start freaking out, there are some solutions for you to continue using your computer. My personal recommendation is to load up DBAN, completely remove any trace of Windows or any other proprietary bullshit operating system that came with your computer and then, install Gentoo, and use that for the rest of eternity to do your computing, if you can't figure out how to use Gentoo, then you have the option of using Linux Mint, which is another approved GNU/Linux operating system that is more noob friendly and kind of similar to Windows and the layout just minus all of the horrible bullcrap and spaghetti code that makes up Windows. If you can't figure out how to install Linux Mint then you should just sell your computer, purchase a horse and buggy and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter, hopefully, the many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as an Amish person. If you fail to comply, you are going to get updates forcefully pushed to your operating system which has been happening for a while now, because, let's face it, Microsoft has never even heard of the word consent, but instead of these updates coming from Microsoft themself, Bill Gates himself, they are going to be coming from the hacker known as 4chan, and you will soon experience strange behavior in your operating system. Internet Explorer or Microsoft Edge or whatever the hell they're calling that crap these days will be replaced with Pale Moon or a similar furry browser. Every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on, all of your home videos will be replaced with forceful tentacle hentai, all of your family photos are going to be replaced with pepes that become more and more racist as time goes on. Oh and also, your webcam will permanently live stream to live league so watch out for Chinese truck drivers and off-duty Brazilian police officers. Now, I don't want to hear any of your wondering "why is this happening all of the sudden oh woe ways me, why does something like this have to happen to me", no, you've been warned for years and years about the dangers of proprietary software, and yet, you did nothing. Richard Stallman went out of his way to make speeches at college campuses, all across the world, even doing some in Spanish, so he can reach a wider audience, and going days without a proper meal, this man had to subsist on nutrients from the bottom of his foot and yet, you still did nothing. Edward Snowden revealed that bioluminescent government agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of Reddit, ALL under the guise of stopping terrorism, and he had to flee the united states and go live in a Russian airport bathroom, and yet, you continued on using Windows. Purchasing a new copy every few years making Bill Gates a grillionaire in the process so he could get to his end goal of injecting Windows updates directly into the bloodstream of every person in the world, in newborn babies, and yet, you kept on using Windows, even though each new version removed more and more of your rights and became more and more bloated, but now, 4chan the hacker has taken it to the extreme, you will no longer be using your operating system. It will use you, it will require a minimum of 2 terabytes of ram and a quantum CPU just to load up the crypto miner that's going to be required to boot your operating system. Now alternatively, I have heard directly from the hacker known as 4chan that for one bitcoin, you can purchase a subscription of Windows XP Yotsuba edition which will have most of the restrictions removed, however, your wallpaper will still be set to a lewd vaguely underage anime girl and your browser's homepage will be permanently set to 4channel.org, also Microsoft Word is going to be replaced with Vim, so, good luck doing your homework on there, hopefully, you know how to quit out of it, you have been warned, now go, install Gentoo or suffer the consequences or like I said, sell all of your electronics and go be Amish because the Amish don't get computer viruses.
My personal experience with Innosilicon A10 Pro (6G) 500Mh ASIC ethash miner
EDIT : This is about the 5G version, not the 6G. Hello, Since there is not much consumers tests online about the Innosilicon A10 (Ethmaster) Pro (5G) at 500Mh, I decided to share my personal experience through an "anonymous" account. I bought it around April 2020, arrived in May but for personal reasons I was only able to turn it on this summer :( The A10 costs me 3242 € + 70 € power supply (Innosilicon 1400W Power Supply) + shipping. I will not reveal where I bought it because this is not an ad, but it was through an european ASIC miner reseller. I know Ethereum 2.0 is coming and I'm aware this is a gamble. I would not advise you to buy it now, especially knowing Eth 2.0 is really coming now, DeFi is pushing at the gates and I heard rumors there is a 750Mh version coming up. So, it is my first ASIC miner, I did some ZEC mining with a 4 x 1080Ti mining rig two years go.
EDIT : EthToDoge pointed out in the comments that the A10 isn't an ASIC technically speaking The A10 is basically a box crammed full of laptop GPUs and some custom firmware and made to look like the Bitcoin ASICS. [Check out the comments for more information]
The A10 mining chains reboots itself every 9 hours on average. When the A10 reboots, it goes into an autotuning mode which can take up to 2 hours, but usually around 1h. When in autotuning, it starts at 0Mh and goes to it's full speed after the autotuning, not mining much during this phase because the autotuning mode causes a lot of invalid shares, up to 20% and going down to 3% when tuning is completed. The chains temperature are around 63°C, I don't know if this is the reason of the reboot. I'll try later on to get a better air flow. I fixed the temperature issue I had by placing in a better ventilated location, temperature is now around 53°C but that didn't fixed the reboot issue. miner web interface, you can see the hashrate drop due to the random reboot Performancesettings I tried balanced and factory modes, and I didn't saw much differences in the reported speed. In a near future I'll have a try with theperformancemode but I will monitor the power consumption when trying since the A10 warns me to pay attention to that when I want to enable performancemode in the web interface. The performance mode consumes around 10% to 15% more electricity than the factory mode, without noticing any difference in the hashrate or stability. I didn't had proper tools to measure the power consumption, my A10 was plugged in an UPS and it's load went from 43% usage to 55% so I'm assuming the difference is the extra power consumption. Changing performance settings causes the miner to go into autotuning. Autoupdate The firmware check is working, but I didn't manage to use the autoupdate. I had no problem to manually download the firmware and upload it, so not really a problem. My device:
Type A10L Controller Version g1 Build Date 15th of July 2020 06:13 AM Platform Version a10l_20200715_061347
EDIT : I upgraded to the new firmware a10l_20200901_053652 but that didn't fixed the reboot issue.
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/ Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners? And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess. First, let's consider some principles of Bitcoin.
You the HODLer should be the one who controls where your money goes. Your keys, your coins.
You the HODLer should be able to coordinate and make contracts with other people regarding your funds.
You the HODLer should be able to do the above without anyone watching over your shoulder and judging you.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so). So, how does Taproot affect those principles?
Taproot and Your /Coins
Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash). (technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input). However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits! Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh? With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save! And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well! (P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1) Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service! So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win! (even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot) And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!
Taproot and Your Contracts
No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade. So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust. Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade. However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade. In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address. Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants). But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer). Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos). (technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).
Taproot and Your Contracts, Part 2: Cryptographic Boogaloo
Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code. This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded. And you can do that, with HTLCs, today. Of course, HTLCs do have problems:
Privacy. Everyone scraping the Bitcoin blockchain can see any HTLCs, and preimages used to claim them.
This can be mitigated by using offchain techniques so HTLCs are never published onchain in the happy case. Lightning would probably in practice be the easiest way to do this offchain. Of course, there are practical limits to what you can pay on Lightning. If you are buying something expensive, then Lightning might not be practical. For example, the "software" you are activating is really the firmware of a car, and what you are buying is not the software really but the car itself (with the activation of the car firmware being equivalent to getting the car keys).
Even offchain techniques need an onchain escape hatch in case of unresponsiveness! This means that, if something bad happens during payment, the HTLC might end up being published onchain anyway, revealing the fact that some special contract occurred.
And an HTLC that is claimed with a preimage onchain will also publicly reveal the preimage onchain. If that preimage is really the activation key of a software than it can now be pirated. If that preimage is really the activation key for your newly-bought cryptographic car --- well, not your keys, not your car!
Trust requirement. You are trusting the developer that it gives you the hash of an actual valid activation key, without any way to validate that the activation key hidden by the hash is actually valid.
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar". Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you. Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige). (Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key). So:
Privacy: PTLCs are private even if done onchain. Nobody else can learn what the private key behind the public key is, except you who knows the adaptor signature that when combined with the complete onchain signature lets you know what the private key of the activation key is. Somebody scraping the blockchain will not learn the same information even if all PTLCs are done onchain!
Lightning is still useful for reducing onchain use, and will also get PTLCs soon after Taproot is activated, but even if something bad happens and a PTLC has to go onchain, it doesn't reveal anything!
Trust issues can be proven more easily with a public-private keypair than with a hash-preimage pair.
For example, the developer of the software you are buying could provide a signature signing a message saying "unlock access to the full version for 1 day". You can check if feeding this message and signature to the program will indeed unlock full-version access for 1 day. Then you can check if the signature is valid for the purported pubkey whose private key you will pay for. If so, you can now believe that getting the private key (by paying for it in a PTLC) would let you generate any number of "unlock access to the full version for 1 day" message+signatures, which is equivalent to getting full access to the software indefinitely.
For the car, the manufacturer can show that signing a message "start the engine" and feeding the signature to the car's fimrware will indeed start the engine, and maybe even let you have a small test drive. You can then check if the signature is valid for the purported pubkey whose privkey you will pay for. If so, you can now believe that gaining knowledge of the privkey will let you start the car engine at any time you want.
(pedantry: the signatures need to be unique else they could be replayed, this can be done with a challenge-response sequence for the car, where the car gathers entropy somehow (it's a car, it probably has a bunch of sensors nowadays so it can get entropy for free) and uses the gathered entropy to challenge you to sign a random number and only start if you are able to sign the random number; for the software, it could record previous signatures somewhere in the developer's cloud server and refuse to run if you try to replay a previously-seen signature.)
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script. (technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)
Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable?? Well, in theory yes. In practice, they probably are not. It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash. When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key. So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key. (public keys should be public, that's why they're called public keys, LOL) And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions. So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort. Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers. For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
Current quantum computers can barely crack prime factorization problem for primes of 5 bits.
The 256-bit elliptic curve use by Bitcoin is, by my (possibly wrong) understanding, equivalent to 4096-bit primes, so you can see a pretty big gap between now (5 bit primes) and what is needed (4096 bit primes).
A lot of financial non-Bitcoin systems use the equivalent of 3072-bit primes or less, and are probably easier targets to crack than the equivalent-to-4096-bit-primes Bitcoin.
Quantum computers capable of cracking Bitcoin are still far off.
Pay-to-public-key-hash is not as protective as you might think.
We will probably see banks get cracked before Bitcoin, so the banking system is a useful canary-in-a-coal-mine to see whether we should panic about being quantum vulnerable.
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).
If you are a singlesig HODL-only Bitcoin user, Taproot will not affect you positively or negatively. Importantly: Taproot does no harm!
If you use or intend to use multisig, Taproot will be a positive for you.
If you transact onchain regularly using typical P2PKH/P2WPKH addresses, you get a minor reduction in feerates since multisig users will likely switch to Taproot to get smaller tx sizes, freeing up blockspace for yours.
If you are using multiparticipant setups for special systems of trade, Taproot will be a positive for you.
Remember: Lightning channels are multipartiicpiant setups for special systems of lightning-fast offchain trades!
I Wanna Be The Taprooter!
So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!
If you have developer experience especially in C, C++, or related languages
Review the Taproot code! There is one pull request in Bitcoin Core, and one in libsecp256k1. I deliberately am not putting links here, to avoid brigades of nontechnical but enthusiastic people leaving pointless reviews, but if you are qualified you know how to find them!
But I am not a cryptographeBitcoin Core contributomathematician/someone as awesome as Pieter Wuille
That's perfectly fine! The cryptographers have been over the code already and agree the math is right and the implementation is right. What is wanted is the dreary dreary dreary software engineering: are the comments comprehensive and understandable? no misspellings in the comments? variable names understandable? reasonable function naming convention? misleading coding style? off-by-one errors in loops? conditions not covered by tests? accidental mixups of variables with the same types? missing frees? read-before-init? better test coverage of suspicious-looking code? missing or mismatching header guards? portability issues? consistent coding style? you know, stuff any coder with a few years of experience in coding anything might be able to catch. With enough eyes all bugs are shallow!
If you are running a mining pool/mining operation/exchange/custodial service/SPV server
Be prepared to upgrade!
One of the typical issues with upgrading software is that subtle incompatibilities with your current custom programs tend to arise, disrupting operations and potentially losing income due to downtime. If so, consider moving to the two-node setup suggested by gmax, which is in the last section of my previous post. With this, you have an up-to-date "public" node and a fixed-version "private" node, with the public node protecting the private node from any invalid chainsplits or invalid transactions. Moving to this setup from a typical one-node setup should be smooth and should not disrupt operations (too much).
If you are running your own fullnode for fun or for your own wallet
Be prepared to upgrade! The more nodes validating the new rules (even if you are a non-mining node!), the safer every softfork will be!
If you are using an SPV wallet or custodial wallet/service (including hardware wallets using the software of the wallet provider)
Contact your wallet provider / SPV server and ask for a statement on whether they support Taproot, and whether they are prepared to upgrade for Taproot! Make it known to them that Taproot is something you want!
But I Hate Taproot!!
Raise your objections to Taproot now, or forever hold your peace! Maybe you can raise them here and some of the devs (probably nullc, he goes everywhere, even in rbtc!) might be able to see your objections! Or if your objections are very technical, head over to the appropriate pull request and object away!
Maybe you simply misunderstand something, and we can clarify it here!
Or maybe you do have a good objection, and we can make Taproot better by finding a solution for it!
A bitcoin miner in every device and in every hand. Posted on May 19, 2015 July 19, 2015 Bitcoin. By Balaji S. Srinivasan. 21 is now officially open for business — and business development. After much hard work, we’ve created an embeddable mining chip which we call the BitShare that comes in a variety of form factors. The 21 BitShare can be embedded into an internet-connected device as a ... Alongside my co-founders Veerbhan Kheterpal, Daniel Firu, and Nigel Drego we will be focused on putting a bitcoin miner in every device and in every hand. To aid us in this effort we are fortunate ... I imagine a scenario in which every desktop computer has an ASIC that mines bitcoin, but consumes a very small amount of power, too low for the user of the desktop to notice the difference on his power bill. The user still gets a tiny amount of bitcoin, regularly, and effortlessly. He didn't have to go through the hassles of a bitcoin exchange, and he doesn't have to remember to buy bitcoins ... Even if you have more computing power than every single miner in every pool, do you have more than the entire pool combined? Probably (definitely) not! That said, if you are a multi-millionaire, you could set up a profitable solo mining operation. You’d need to buy hundreds (if not thousands) of ASICs (application-specific circuit chips). For the very best mining chips, you will be looking ... Not that long ago, barely anyone (except for computer geeks) had even heard of Bitcoin. After its price skyrocketed in the fall of 2013 and after the spectacular crash in early 2014, more and more people became interested in this “cryptocurrency,” and some of them even started mining it.While it’s becoming more and more difficult to mine - without spending a lot of money upfront - it’s ...
BITCOIN CLAIM BUTTON (Claim every 10 seconds) - YouTube
SUBSCRIBE FOR MORE HOW MUCH - http://shorturl.at/arBHL Amir visited the freezing cold Siberia for you guys, and show how large it is. Support my channel on P... SUBSCRIBE FOR MORE HOW MUCH - http://shorturl.at/arBHL GekkoScience NewPac USB Miner - https://bit.ly/2RIQgdX GekkoScience 8 Port USB Hub - https://bit.ly/2x... The easiest way to earn Bitcoins? Just change your browser to CryptoTab and receive payments to your balance every 10 minutes. You will get BTC for simply us... bitcoin miner device, bitcoin miner detector, bitcoin miner detection, diy bitcoin miner, miner du bitcoin, does bitcoin miner app work, bitcoin miner escape from tarkov, bitcoin miner etf ... Get an additional $10 in Bitcoins from Coinbase when purchasing through my referral link http://fredyen.com/get/Bitcoins Raspberry Pi: http://amzn.to/2l6yrW7...