Bitcoin Geschichte seit 2008 - BitcoinWiki

Electrum - Simply the best thin Bitcoin client

The best, cutting edge thin Bitcoin wallet.
[link]

Bankcoin!

[link]

Aeon

AEON is a private, secure, untraceable currency. You are your bank, you control your funds, and nobody can trace your transfers.
[link]

Every Wednesday there is a hosted Bitcoin Core PR Review Club on IRC. All welcome to join. This week's review: PR#18772 - Calculate fees in getblock using BlockUndo data

Every Wednesday there is a hosted Bitcoin Core PR Review Club on IRC. All welcome to join. This week's review: PR#18772 - Calculate fees in getblock using BlockUndo data submitted by TheGreatMuffin to Bitcoin [link] [comments]

Every Wednesday there is a hosted Bitcoin Core PR Review Club on IRC. All welcome to join. This week's review: PR#18772 - Calculate fees in getblock using BlockUndo data (x-post from /r/Bitcoin)

Every Wednesday there is a hosted Bitcoin Core PR Review Club on IRC. All welcome to join. This week's review: PR#18772 - Calculate fees in getblock using BlockUndo data (x-post from /Bitcoin) submitted by ASICmachine to CryptoCurrencyClassic [link] [comments]

PSA, you can now chat live with other Bitcoiners in irc.bitcoin.com, or use the web client at chat.bitcoin.com

submitted by MemoryDealers to btc [link] [comments]

PSA, you can now chat live with other Bitcoiners in irc.bitcoin.com, or use the web client at chat.bitcoin.com

submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Do you use IRC? If so, what are your favorite Bitcoin related channels?

submitted by Sou_lay to Bitcoin [link] [comments]

I've been sharing conspiracies on reddit longer than this sub has been around. I have a story to tell.

This story is mostly crafted from my own experiences, my conversations with some of the people involved, and the rest is my own guesswork as I try to fill in the gaps...so bear with me!
That's why I wanted to share with this community, which I've watched grow over the years. I remember posting about the death of Barry Jennings (who witnessed explosions in the WTC on 9/11) the day after it happened. This was before /conspiracy (or right around when it was formed), and I remember thinking "we really need a sub for conspiracies on reddit!"
And here we are, 12 years later and over 1.3 million subscribers...incredible!
So...
My story starts with a young man. We'll call him Andrew.
Andrew grew up in the 90's in a coastal US town and quickly blossomed into a tech whiz at a young age.
He began building his own computers, and after a brief stint using Windows, he decided that Bill Gates was everything wrong with technology (and the world), and he made it his mission to make sure folks like Gates were NOT the future of computers.
He really believed that the use of technology was a fundamental human right, and that charging people for "proprietary" OS's that hid their source code was a violation of these rights.
He saw a possible Deus Ex-like future, with a technocracy literally around the corner if we didn't act now.
Andrew soon joined the Free Software Foundation and began rubbing elbows with the likes of Richard Stallman. He begun exclusively using GNU/Linux and was the type to correct you if you called it just "Linux". He also began visiting tech-savvy forums like slashdot and started networking in earnest.
By 2006 (his senior year of high school) Andrew was completely over his "education" and decided to just drop out completely.
Shockingly, a college accepted him anyway. A small East Coast school had been actively courting Andrew, and when they learned he had failed to get his HS diploma, they accepted him anyway!
Now sometime during this period Andrew went to Iceland and stayed in Reykjavik for several months.
This trip may have happened during the summer, fall, or early winter of 2006. The reason for his trip had something to do with his efforts in the FSF or similar group. The possible significance of this trip will become clear as we go on.
What is clear is that Andrew started college in the fall of 2006, and that the circumstances were unusual. Andrew soon met several like-minded individuals and began building a social and technological network at his school.
Two individuals in particular would become key players in his life (one more prominently in this story, but the other was significant as well), and eventually the 3 would live together in town for several years.
But for now let's stick with Andrew.
Andrew had an idea to build a social network for his college. Except, it wasn't just a network, it was a wiki for information about the school...and beyond. Soon, it began to morph into something much bigger in Andrew's mind.
He saw his project as being one of many data "hubs" for leaks of important documents and otherwise sensitive information.
So yeah, he saw the opportunity for a wiki for leaks (see where this is going yet...?).
As his ambitions grew, his behavior started to become increasingly erratic. He was caught with drugs and arrested. Strangely, the charges were pretty much dropped and he was given a slap on the wrist. Eventually he decided to leave the school, but still lived in town and had access to the servers on campus.
By 2010 Andrew was still living in the small town with his two "hacker" buddies, who were still enrolled at the school.
This house was in some ways legendary. It appears that many "interesting" people spent time at or visited the residence. Indeed, some of the early movers and shakers of /conspiracy itself passed through.
There was usually a full NO2 tank for anyone who was into that kinda thing, and they were stocked with every hallucinogen and research chemical known to man.
It was also likely under surveillance by multiple intelligence agencies (NSA/Mossad/etc).
Over time, the mental state of Andrew was slowly starting to deteriorate, which wasn't helped by his abuse of drugs.
Still, Andrew decided to move his base of operations to Europe, spending time in Belgium, the Czech Republic and elsewhere.
One of his housemates was soon to join him on his adventures in Europe and elsewhere abroad. We'll call him "Aaron."
Aaron had a very similar story and upbringing as Andrew. Aaron was also from a coastal US town and was born into privilege. He was also, supposedly, born into a family with some serious connections to intelligence agencies, including an uncle with ties to the NSA, and both parents connected to military brass.
By 2015, Andrew and Aaron were living together in the Czech Republic. During this time they were working directly and/or indirectly for the NSA (via Cisco and other companies).
You see, the "college" they met at was actually a front for the recruitment of kids into the IC. Apparently, many "schools" in the US function that way. Go figure.
Their intelligence and valuable skill set (hacking etc) made them valuable assets. They were also possibly involved with the distribution of certain "research chemicals" (of the 2C* variety) to dignitaries and their entourages (in one example, they provided 2CB to a group with David Cameron).
In addition, Andrew was allegedly involved with, or stumbled upon, an NSA-linked surveillance project directed at the entire country of Malaysia, while Aaron was involved with Cisco.
Aaron himself had gotten into hot water for releasing damaging information about the NSA, and even claimed to be an NSA whistleblower, and was also possibly the individual who leaked the 2014 (or 2015) Bilderberg meeting list.
And then things went bad. Andrew quit the Malaysia project and Aaron left Cisco. It seems Andrew and Aaron were "set up" during a fiery false flag event in the Czech Republic in 2015. It may have happened at an embassy, but it's unclear which. There is no information on the web about anything like this (afaik).
Aaron was immediately targeted and spent several years on the run. Allegedly, he was added to the list of victims in the so-called "Great Game".
The Great Game is the term used for an international assassination program where intelligence agencies share a list of targets to be neutralized. The German BND and Mossad are heavily involved, as other networks. Individuals targeted by the Great Game may be offed by actual assassins, or by NPC-like humans whose minds will be influenced by mind control tech (a la Matrix...say influencing someone to ram your car unwittingly ie).
As Aaron went on the lam, Andrew soon returned to the US, shell-shocked by his experience.
Both Andrew and Aaron continue to suffer from some sort of PTSD from these series of events, rendering Andrew largely incapacitated and Aaron scattered and discombobulated.
The Meat of the Matter
OK...where does that leave us? Why am I sharing all of this? I think there's much more to this story.
So let's start speculating! Everything I'm about to say is stuff that was told to me personally. I can't vouch for any of this information, though obviously I thought it was compelling enough to share.
Here's the gist: The so-called whistleblowers you see in the media are almost all fake.
This includes: Edward Snowden, Julian Assange, Thomas Drake and William Binney (hey look, his AMA is pinned on this sub right now...no comment!). These individuals, and others, are controlled opposition. The real whistleblowers are severely punished.
For example, Bradley Manning was punished with chemical castration in jail. His "transformation" was chemically induced torture.
Andrew was not alone in his passion. There were lots of other young visionaries like him who dreamed of a freer and more transparent world.
In this story, Julian Assange was an intelligence asset...a psyop meant to steal the thunder from real activists like Andrew.
In this story, a small college-based "wiki" for government leaks was used as the model for an intelligence operation known as "wikileaks".
In this story, Andrew traveled to Iceland at some point in 2006.
When was Wikileaks founded? Wikileaks was founded by Julian Assange in December 2006, in Iceland.
Aaron discovered (legally, like Manning who had clearance to access all the data he leaked) damning information about surveillance happening by the NSA, specifically against recruits entering the US army and elsewhere.
In this story, the "Andrew" identity was co-opted and turned into "Julian Assange", and "Aaron" became "Edward Snowden".
Granted, there were probably other people that these whistleblower imposters were modeled after, but Andrew and Aaron seem like very strong contenders for some of this inspiration.
Now, much of the following may be gobbledygook (lol I spelled that right first try!) for all I know, but since I'm having a really hard time making sense of it all, I'll just include everything I can and let you guys run with it.
Here are some phrases, ideas, terms and people of note that may be involved with this story...MODS: None of this is doxing! All of the links of people are wikipedia pages or published interviews/articles. So yeah. Not dox!
IN CONCLUSION
I don't know how these terms, theories and individuals fit into this story, but that they may be somehow related.
Hopefully there are enough bread crumbs in here to keep some of you busy!
Any help/insight would be appreciated. I confess I'm not so tech-minded so I can't offer any more explanation about some of the more techy terms.
Anyway, thanks for reading, and thanks for continuing to stimulate after all these years! It's really nice to see this place continuing to thrive after all of this time!
submitted by oomiak to conspiracy [link] [comments]

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

Technical: The Path to Taproot Activation

Taproot! Everybody wants to have it, somebody wants to make it, nobody knows how to get it!
(If you are asking why everybody wants it, see: Technical: Taproot: Why Activate?)
(Pedants: I mostly elide over lockin times)
Briefly, Taproot is that neat new thing that gets us:
So yes, let's activate taproot!

The SegWit Wars

The biggest problem with activating Taproot is PTSD from the previous softfork, SegWit. Pieter Wuille, one of the authors of the current Taproot proposal, has consistently held the position that he will not discuss activation, and will accept whatever activation process is imposed on Taproot. Other developers have expressed similar opinions.
So what happened with SegWit activation that was so traumatic? SegWit used the BIP9 activation method. Let's dive into BIP9!

BIP9 Miner-Activated Soft Fork

Basically, BIP9 has a bunch of parameters:
Now there are other parameters (name, starttime) but they are not anywhere near as important as the above two.
A number that is not a parameter, is 95%. Basically, activation of a BIP9 softfork is considered as actually succeeding if at least 95% of blocks in the last 2 weeks had the specified bit in the nVersion set. If less than 95% had this bit set before the timeout, then the upgrade fails and never goes into the network. This is not a parameter: it is a constant defined by BIP9, and developers using BIP9 activation cannot change this.
So, first some simple questions and their answers:

The Great Battles of the SegWit Wars

SegWit not only fixed transaction malleability, it also created a practical softforkable blocksize increase that also rebalanced weights so that the cost of spending a UTXO is about the same as the cost of creating UTXOs (and spending UTXOs is "better" since it limits the size of the UTXO set that every fullnode has to maintain).
So SegWit was written, the activation was decided to be BIP9, and then.... miner signalling stalled at below 75%.
Thus were the Great SegWit Wars started.

BIP9 Feature Hostage

If you are a miner with at least 5% global hashpower, you can hold a BIP9-activated softfork hostage.
You might even secretly want the softfork to actually push through. But you might want to extract concession from the users and the developers. Like removing the halvening. Or raising or even removing the block size caps (which helps larger miners more than smaller miners, making it easier to become a bigger fish that eats all the smaller fishes). Or whatever.
With BIP9, you can hold the softfork hostage. You just hold out and refuse to signal. You tell everyone you will signal, if and only if certain concessions are given to you.
This ability by miners to hold a feature hostage was enabled because of the miner-exit allowed by the timeout on BIP9. Prior to that, miners were considered little more than expendable security guards, paid for the risk they take to secure the network, but not special in the grand scheme of Bitcoin.

Covert ASICBoost

ASICBoost was a novel way of optimizing SHA256 mining, by taking advantage of the structure of the 80-byte header that is hashed in order to perform proof-of-work. The details of ASICBoost are out-of-scope here but you can read about it elsewhere
Here is a short summary of the two types of ASICBoost, relevant to the activation discussion.
Now, "overt" means "obvious", while "covert" means hidden. Overt ASICBoost is obvious because nVersion bits that are not currently in use for BIP9 activations are usually 0 by default, so setting those bits to 1 makes it obvious that you are doing something weird (namely, Overt ASICBoost). Covert ASICBoost is non-obvious because the order of transactions in a block are up to the miner anyway, so the miner rearranging the transactions in order to get lower power consumption is not going to be detected.
Unfortunately, while Overt ASICBoost was compatible with SegWit, Covert ASICBoost was not. This is because, pre-SegWit, only the block header Merkle tree committed to the transaction ordering. However, with SegWit, another Merkle tree exists, which commits to transaction ordering as well. Covert ASICBoost would require more computation to manipulate two Merkle trees, obviating the power benefits of Covert ASICBoost anyway.
Now, miners want to use ASICBoost (indeed, about 60->70% of current miners probably use the Overt ASICBoost nowadays; if you have a Bitcoin fullnode running you will see the logs with lots of "60 of last 100 blocks had unexpected versions" which is exactly what you would see with the nVersion manipulation that Overt ASICBoost does). But remember: ASICBoost was, at around the time, a novel improvement. Not all miners had ASICBoost hardware. Those who did, did not want it known that they had ASICBoost hardware, and wanted to do Covert ASICBoost!
But Covert ASICBoost is incompatible with SegWit, because SegWit actually has two Merkle trees of transaction data, and Covert ASICBoost works by fudging around with transaction ordering in a block, and recomputing two Merkle Trees is more expensive than recomputing just one (and loses the ASICBoost advantage).
Of course, those miners that wanted Covert ASICBoost did not want to openly admit that they had ASICBoost hardware, they wanted to keep their advantage secret because miners are strongly competitive in a very tight market. And doing ASICBoost Covertly was just the ticket, but they could not work post-SegWit.
Fortunately, due to the BIP9 activation process, they could hold SegWit hostage while covertly taking advantage of Covert ASICBoost!

UASF: BIP148 and BIP8

When the incompatibility between Covert ASICBoost and SegWit was realized, still, activation of SegWit stalled, and miners were still not openly claiming that ASICBoost was related to non-activation of SegWit.
Eventually, a new proposal was created: BIP148. With this rule, 3 months before the end of the SegWit timeout, nodes would reject blocks that did not signal SegWit. Thus, 3 months before SegWit timeout, BIP148 would force activation of SegWit.
This proposal was not accepted by Bitcoin Core, due to the shortening of the timeout (it effectively times out 3 months before the initial SegWit timeout). Instead, a fork of Bitcoin Core was created which added the patch to comply with BIP148. This was claimed as a User Activated Soft Fork, UASF, since users could freely download the alternate fork rather than sticking with the developers of Bitcoin Core.
Now, BIP148 effectively is just a BIP9 activation, except at its (earlier) timeout, the new rules would be activated anyway (instead of the BIP9-mandated behavior that the upgrade is cancelled at the end of the timeout).
BIP148 was actually inspired by the BIP8 proposal (the link here is a historical version; BIP8 has been updated recently, precisely in preparation for Taproot activation). BIP8 is basically BIP9, but at the end of timeout, the softfork is activated anyway rather than cancelled.
This removed the ability of miners to hold the softfork hostage. At best, they can delay the activation, but not stop it entirely by holding out as in BIP9.
Of course, this implies risk that not all miners have upgraded before activation, leading to possible losses for SPV users, as well as again re-pressuring miners to signal activation, possibly without the miners actually upgrading their software to properly impose the new softfork rules.

BIP91, SegWit2X, and The Aftermath

BIP148 inspired countermeasures, possibly from the Covert ASiCBoost miners, possibly from concerned users who wanted to offer concessions to miners. To this day, the common name for BIP148 - UASF - remains an emotionally-charged rallying cry for parts of the Bitcoin community.
One of these was SegWit2X. This was brokered in a deal between some Bitcoin personalities at a conference in New York, and thus part of the so-called "New York Agreement" or NYA, another emotionally-charged acronym.
The text of the NYA was basically:
  1. Set up a new activation threshold at 80% signalled at bit 4 (vs bit 1 for SegWit).
    • When this 80% signalling was reached, miners would require that bit 1 for SegWit be signalled to achive the 95% activation needed for SegWit.
  2. If the bit 4 signalling reached 80%, increase the block weight limit from the SegWit 4000000 to the SegWit2X 8000000, 6 months after bit 1 activation.
The first item above was coded in BIP91.
Unfortunately, if you read the BIP91, independently of NYA, you might come to the conclusion that BIP91 was only about lowering the threshold to 80%. In particular, BIP91 never mentions anything about the second point above, it never mentions that bit 4 80% threshold would also signal for a later hardfork increase in weight limit.
Because of this, even though there are claims that NYA (SegWit2X) reached 80% dominance, a close reading of BIP91 shows that the 80% dominance was only for SegWit activation, without necessarily a later 2x capacity hardfork (SegWit2X).
This ambiguity of bit 4 (NYA says it includes a 2x capacity hardfork, BIP91 says it does not) has continued to be a thorn in blocksize debates later. Economically speaking, Bitcoin futures between SegWit and SegWit2X showed strong economic dominance in favor of SegWit (SegWit2X futures were traded at a fraction in value of SegWit futures: I personally made a tidy but small amount of money betting against SegWit2X in the futures market), so suggesting that NYA achieved 80% dominance even in mining is laughable, but the NYA text that ties bit 4 to SegWit2X still exists.
Historically, BIP91 triggered which caused SegWit to activate before the BIP148 shorter timeout. BIP148 proponents continue to hold this day that it was the BIP148 shorter timeout and no-compromises-activate-on-August-1 that made miners flock to BIP91 as a face-saving tactic that actually removed the second clause of NYA. NYA supporters keep pointing to the bit 4 text in the NYA and the historical activation of BIP91 as a failed promise by Bitcoin developers.

Taproot Activation Proposals

There are two primary proposals I can see for Taproot activation:
  1. BIP8.
  2. Modern Softfork Activation.
We have discussed BIP8: roughly, it has bit and timeout, if 95% of miners signal bit it activates, at the end of timeout it activates. (EDIT: BIP8 has had recent updates: at the end of timeout it can now activate or fail. For the most part, in the below text "BIP8", means BIP8-and-activate-at-timeout, and "BIP9" means BIP8-and-fail-at-timeout)
So let's take a look at Modern Softfork Activation!

Modern Softfork Activation

This is a more complex activation method, composed of BIP9 and BIP8 as supcomponents.
  1. First have a 12-month BIP9 (fail at timeout).
  2. If the above fails to activate, have a 6-month discussion period during which users and developers and miners discuss whether to continue to step 3.
  3. Have a 24-month BIP8 (activate at timeout).
The total above is 42 months, if you are counting: 3.5 years worst-case activation.
The logic here is that if there are no problems, BIP9 will work just fine anyway. And if there are problems, the 6-month period should weed it out. Finally, miners cannot hold the feature hostage since the 24-month BIP8 period will exist anyway.

PSA: Being Resilient to Upgrades

Software is very birttle.
Anyone who has been using software for a long time has experienced something like this:
  1. You hear a new version of your favorite software has a nice new feature.
  2. Excited, you install the new version.
  3. You find that the new version has subtle incompatibilities with your current workflow.
  4. You are sad and downgrade to the older version.
  5. You find out that the new version has changed your files in incompatible ways that the old version cannot work with anymore.
  6. You tearfully reinstall the newer version and figure out how to get your lost productivity now that you have to adapt to a new workflow
If you are a technically-competent user, you might codify your workflow into a bunch of programs. And then you upgrade one of the external pieces of software you are using, and find that it has a subtle incompatibility with your current workflow which is based on a bunch of simple programs you wrote yourself. And if those simple programs are used as the basis of some important production system, you hve just screwed up because you upgraded software on an important production system.
And well, one of the issues with new softfork activation is that if not enough people (users and miners) upgrade to the newest Bitcoin software, the security of the new softfork rules are at risk.
Upgrading software of any kind is always a risk, and the more software you build on top of the software-being-upgraded, the greater you risk your tower of software collapsing while you change its foundations.
So if you have some complex Bitcoin-manipulating system with Bitcoin somewhere at the foundations, consider running two Bitcoin nodes:
  1. One is a "stable-version" Bitcoin node. Once it has synced, set it up to connect=x.x.x.x to the second node below (so that your ISP bandwidth is only spent on the second node). Use this node to run all your software: it's a stable version that you don't change for long periods of time. Enable txiindex, disable pruning, whatever your software needs.
  2. The other is an "always-up-to-date" Bitcoin Node. Keep its stoarge down with pruning (initially sync it off the "stable-version" node). You can't use blocksonly if your "stable-version" node needs to send transactions, but otherwise this "always-up-to-date" Bitcoin node can be kept as a low-resource node, so you can run both nodes in the same machine.
When a new Bitcoin version comes up, you just upgrade the "always-up-to-date" Bitcoin node. This protects you if a future softfork activates, you will only receive valid Bitcoin blocks and transactions. Since this node has nothing running on top of it, it is just a special peer of the "stable-version" node, any software incompatibilities with your system software do not exist.
Your "stable-version" Bitcoin node remains the same version until you are ready to actually upgrade this node and are prepared to rewrite most of the software you have running on top of it due to version compatibility problems.
When upgrading the "always-up-to-date", you can bring it down safely and then start it later. Your "stable-version" wil keep running, disconnected from the network, but otherwise still available for whatever queries. You do need some system to stop the "always-up-to-date" node if for any reason the "stable-version" goes down (otherwisee if the "always-up-to-date" advances its pruning window past what your "stable-version" has, the "stable-version" cannot sync afterwards), but if you are technically competent enough that you need to do this, you are technically competent enough to write such a trivial monitor program (EDIT: gmax notes you can adjust the pruning window by RPC commands to help with this as well).
This recommendation is from gmaxwell on IRC, by the way.
submitted by almkglor to Bitcoin [link] [comments]

[ Bitcoin ] Technical: Taproot: Why Activate?

Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
[deleted comment]
[deleted comment]
[deleted comment]
submitted by anticensor_bot to u/anticensor_bot [link] [comments]

AgainstHateSubreddits FAQ - Answers to Frequently Asked Questions, both sincere and disingenuous.

What is /AgainstHateSubreddits?

The purpose of this community is to draw attention to - and elicit meaningful action upon - instances of the growing problem of radicalization on Reddit.

We call for moderators and admins to take responsibility for their roles in the meme-ification & normalization of:

• bigotry

• hate

• harassment

&

• violence

"Hate Subreddit" is defined here in AHS as:
Reddit communities that exist primarily and materially for the purpose of incitement to hatred --
hatred against a group of persons, or a specific person, on the basis of:
• race • ethnicity • national origin • gender • religion • sexual orientation • other inherent characteristics.
Hate subreddits regularly show disdain for human rights and emotions, the results of academic research, and, of course, basic human decency.

What does /AgainstHateSubreddits DO?

"In a racist society, it is not enough to be non-racist, we must be antiracist.” — Angela Davis

• We organise resources for moderators to help them be educated about hatred and harassment - how to identify and combat it.

• We organise a community to :

• Identify subreddits which host or promote cultures of hatred

&

• Report items (posts / comments) in those subreddits which violate the Reddit Content Policies. Hate speech is a violation of the Reddit Content Policy against Harassment.

• Act in Good Faith - We take /AgainstHateSubreddits' mission seriously, and you should, too.

Irony poisons sincerity, and bigots rely on tiring people out by making them wonder "is this person just joking or are they sincere?". Irony provides a shield for bigots.

• Follow ALL the sitewide Content Policies.

Don't ask people to vote on items. Don't ask people to go to hate subreddits and dogpile comments on them.
We don't do those things - because they are violations of the content policies, and because they serve the goals of bigots.
We will ban accounts that do these things.

What does /AgainstHateSubreddits NOT do?

"When these people come for you, they cannot be reasoned with. When well-intentioned people fall for bad-faith tactics, bad-faith people continue to employ them."** -- Lindsay Ellis

• We DO NOT organise offsite. We do not, and never have had, a Discord for AHS.

We have a Slack channel, where we organise our moderation team and only our moderation team.
If someone tells you that they've seen an AHS Discord / IRC Channel / Pinterest / Tumblr / whatever - that person is lying to you to smear our moderators and users, and is probably a neoNazi. Those are not the first time they've tried to fake evidence of moderators being paedophiles, and it will not be the last time either.

• We DO NOT participate in posts / threads / comments in hate subreddits. We don't vote; We don't comment; We don't feed the trolls.

Engagement and recruitment is Priority #1 of bigots - they don't want to debate you sincerely -- they want you to get angry, and bring your friends, and have those friends bring their friends - so they get lots and lots of attention and an audience and a list of potential recruits. They want to steal time and peace of mind from us, divide us and fracture our united front. Don't fall for it.

• We DO NOT amplify the hate messages of the bigots.

Censor slurs in your posts and comments wherever possible. Use the NSFW tag on your posts if submitting material that is patently offensive, hateful, pornographic, unsuitable for a work environment, etc. Use an archive service to submit posts wherever possible to make it inconvenient to join the bigot's efforts.
If you are a bigot, and you want to participate here, you must do so in Good Faith -- if you come here to platform your bigotry, recruit, proselytise, or abuse people: you will be promptly banned. Your only reason to participate here is to help you find a way to get away from the people reinforcing your bigotry.

• We DO NOT Debate Economic Theory

There are other venues, of varying quality, and varying effectiveness, to recruit people to defend or critique capitalism / communism / barter / mutualism / welfare / Bitcoin / the Dahrendorf hypothesis / Bayesian regret. THIS IS NOT THE PLACE FOR THOSE.

• We DO NOT delete or retroactively radically edit comments.

That's Bad Faith.

• We are NOT your Personal Army.

If the members of one demographic are traditionally vilifying / vilified by another demographic, we will not "take sides" "for" the representatives of either demographic using their respective subreddits as proxies - No International Political Slapfighting.
We do make exceptions for subreddits, named for a demographic or international geographic compartment (i.e. country), that are clearly being operated to platform hatred. Those require substantial, objectively evaluatable evidence of a pattern of hatred, bigotry, harassment, or violence, and the misfeasance of the moderators of the subreddit. We do not want submissions of 4-month old comments by suspended users that never went live or which received no upvotes, in innocent / well-moderated subreddits.

• We DO NOT focus on "joke" or "troll" or "meme" subreddits -- unless they are effectively unmoderated and therefore serve as platforms and recruitment for hate movements. Hatred is independent of medium.

• We DO NOT accept posts about Child Sexual Exploitation material on Reddit.

Because of legal and ethical considerations, we do not allow the use of /AgainstHateSubreddits to direct attention to sexual or suggestive content involving minors on Reddit -- nor for making allegations that any content on Reddit is sexual or suggestive content involving minors.
Please report any content which you reasonably believe to be sexual or suggestive content involving minors using this link:
https://www.reddit.com/report?reason=its-sexual-or-suggestive-content-involving-minors
Please do not solicit other people to view such material, nor direct others as to where to locate it. That can be distribution of obscene material. It's also traumatic for people exposed to it. Don't share links to it with anyone but the Reddit admins, your attorney where applicable, and law enforcement!
You can also use the resources of the FBI via this webpage: https://www.fbi.gov/investigate/violent-crime/cac
and the US Department of Justice via this webpage: https://www.justice.gov/actioncentereport-crime#child
This has been our long-standing policy - we refuse to amplify child sexual exploitation.

• We DO NOT back down and we DO NOT compromise.

Bigots want to run Reddit "from the bottom", Mafia-style -- by spreading Fear, Uncertainty, and Doubt.
They have a track record of smearing people, harassing people, trying to ruin people's lives, trying to run them off Reddit, mocking and ridiculing them, wasting people's time and resources, extorting them into compromising their community's identity and boundaries, falsely threatening vexatious legal action or account suspension / moderator privilege revocation as retaliation for banning bigots or removing posts and comments which compromise the integrity of a community or which violate a Content Policy. They maliciously spread misinformation, rumour, innuendo, propaganda, lies, and scams.

We give bigots NOTHING.

NOT. ONE. INCH.

And if you don't think you're a bigot -- but you feel that you can "peacefully coexist" with violent white supremacists, neo-Nazis, the Khmer Rouge, the KKK, the "alt-Right"?
... Historians have a word for the people who went along with the Nazis. That's "Nazi". Or, sadly, "Victim of the Nazis". Als sie die Juden holten, habe ich geschwiegen; ich war ja kein Jude
Ask good faith questions not addressed here in the comments below.
submitted by Bardfinn to AgainstHateSubreddits [link] [comments]

My collection of amazing early Bitcoin comments, right here from Reddit:

On buying (or not) a gaming rig to mine Bitcoin:
With the difficulty skyrocketing and exchange rates sitting stagnant at $5~8 for the last week or so, you pretty much missed the boat to buy dedicated mining hardware, IMHO. If you already have the hardware, or are looking for an excuse to buy a couple bitchin' new graphics cards for a gaming rig, there's definitely money to be made mining when you're not using it.
But I don't think I'd drop $1k into a rig that's only to mine with unless it was $1k I'd blow on something even more retarded. I certainly wouldn't sink next month's rent into it.
https://reddit.com/AskReddit/comments/hnp7f/_/c1wuv1b/?context=1
On easily cashing out Bitcoin using mtgox:
I think getting money is not that difficult. The daily volume on mtgox is over $100K, so I think anyone can currently sell Bitcoins for USD without problems.
https://reddit.com/AskReddit/comments/hnp7f/_/c1wuhjh/?context=1
On it being $10:
Is Bitcoin 10 usd yet?
https://reddit.com/Bitcoin/comments/hpq6c/is_bitcoin_10_usd_yet/
Bonus: Snapshot of the isbitcoin10usdyet website from 2011: https://web.archive.org/web/20110606125320/http://www.isbitcoin10usdyet.com/
Mtgox might disappear:
400K bitcoins is $4M dollars. Given all risks and uncertainties around bitcoins, no wonder some of the early founders exit their investments. Tomorrow mtgox or dwolla may disappear. It is the matter of one government intervention.
https://reddit.com/Bitcoin/comments/hq1wj/_/c1xgesq/?context=1
Bitcoin is terrible at friendly front-end:
This is a dangerous point-of-view. The entire bitcoin ecosystem is ugly, confusing, and deeply unusable. Really think about the questions posed in the article. The client works, as in, it creates a functional front-end for some bitcoin-related tasks, but it isn't at all designed for how humans would want to interact with the currency. The point of the article isn't that the client is hard, it's that the client works pretty well for obsessive nerds (present company included), but if bitcoin is really going to succeed at the goals it sets out to accomplish, it needs to not only be usable by normal people, it needs to be exceptional. If you think it's reasonably usable, you're welcome to that opinion, but please understand that you're the exact sort of person Mr. Falkvinge was referring to. Great with complex logic, terrible at friendly front-end.
https://reddit.com/Bitcoin/comments/hrqpm/_/c1xtfuy/?context=1
On wallets going out of sync:
One thing that I think is lacking is the ability to functionally use wallets on different machines as they will tend to get out of sync. This might be able to be overcome if new addresses were deterministically created from a seed contained in the wallet, but there are probably better ways.
Also, the UI for the official client is kind of a bone.
https://reddit.com/Bitcoin/comments/hrqpm/_/c1y730k/?context=1
On Bitcoin’s ease of use:
In fact, BTC is in such an infant state right now only enthusiasts investors, and geeks who can actually grasp how the system truly works, are using it for real.
The usability issues raised by the article are real. No grandma, or any well respected enterprise for that matter, would accept working with this type of GUI. If anything, a REAL enterprise backend still needs to be developed to handle the BTC's ungly guts, with all transactions details, hashes, mining, wallets, proxy connections, peer discovery via IRC channels... I mean... this is all too RAW for the end user. I can see a near future where startups will begin to offer user friendly GUIs, online access, maybe even online banking for your bitcoin accounts, automated backups and safety mechanisms to protect your coins in case of theft.
All of us geeks will end up supporting the bootstrap of this network so that, later on, your grandma will be able to use this just as she would use a credit card today.
https://reddit.com/Bitcoin/comments/hrqpm/_/c1xungz/?context=1
rBitcoin is not a sub for memes:
This isnt a subreddit for memes. Take it back to pics
https://reddit.com/Bitcoin/comments/i7z0v/_/c21m3ld/?context=1
I think I’ll keep my money elsewhere:
This further reinforces BC's image as nothing more than a Ponzi scheme. When the distribution is skewed that heavily towards early adopters, they will have almost total control over the market. Those 32 could manipulate to their hearts content. I think I'll keep my money elsewhere....
https://reddit.com/Bitcoin/comments/ifl26/_/c23e3ei/?context=1
Tulip mania:
http://en.wikipedia.org/wiki/Tulip_mania
https://www.reddit.com/AskReddit/comments/hnp7f/i_just_invested_half_of_my_next_months_rent_in/c1wuhkt/
submitted by wisequote to btc [link] [comments]

Navyseals but r/masterhacker

I have a warehouse of 50 computational servers that at any moment, I can instantly activate. They will send so many ddos attacks to your internet, that you will be unable to use the internet at all. They run on a continuous circuit, and my main use for them is to mine bitcoin. The network effects of my ddos attacks are strong enough that if I leave them running for long enough, I can permanently disable someone's internet.. If it's a high profile target, like a government or a popular corporation, I can shut it down completely and keep it from working. It would be incredibly easy to sabotage those servers with malware. They run in the background, and can't be stopped. During my ten year career in electronic warfare, I've shut down over 100 websites, and kept them completely shut down. it's fairly accurate and much more convenient than your average DDoS attacks. I could also issue arbitrary updates to web servers, turn flash player on and off, lock and unlock server and so on. In addition, my power has granted me the ability to render entire computer networks offline. I have sent tens of thousands of ddos attacks for three weeks using my IRC and Web Chat clients (CrackMyDNS, Argus, ZNX, etc), I've zapped multiple ISPs in two countries, and I was responsible for multiple data leaks. I've kept a spreadsheet of IP addresses and Domain Names that have been compromised by me. I have the means to completely empty out a region of a major ISP. It doesn't take a rocket scientist to see that I'm the emperor of the Internet.
submitted by Dudeamax99 to copypasta [link] [comments]

"You chose the wrong hacker, fool"

You chose the wrong hacker, fool
I have a warehouse of 50 computational servers that at any moment, I can instantly activate. They will send so many ddos attacks to your internet, that you will be unable to use the internet at all. They run on a continuous circuit, and my main use for them is to mine bitcoin. The network effects of my ddos attacks are strong enough that if I leave them running for long enough, I can permanently disable someone's internet.. If it's a high profile target, like the government or a popular corporation, I can shut it down completely and keep it from working. It would be incredibly easy to sabotage those servers with malware. They run in the background, and can't be stopped. During my ten year career in electronic warfare, I've shut down over 100 hundred websites, and kept them completely shut down. It's fairly accurate and much more convenient than your average DDoS attacks. I could also issue arbitrary updates to web servers, turn flash players on and off, lock and unlock servers and so on. In addition, my power has granted me the ability to render entire computer networks completely offline. I have sent tens of thousands of ddos attacks for three weeks using my IRC and Web Chat clients (CrackMyDNS, Argus, ZNC, etc), I've zapped multiple ISPs in two countries, and I was responsible for multiple data leaks. I've kept a spreadsheet of IP addresses and Domain Names that have been compromised by me. I have the means to completely empty out a region of a major ISP. It doesn't take a rocket scientist to see that I'm the emperor of the Internet.
So, I finished doxxed you, how do you feel about that? Your email, and other info i listed is sent to an elite dark web hacker group, known as CssHackers. They will process my data, and will massively ddos you along with my own computational ddos station right here in alaska. Tough luck bud. Our combined ddos attacks will be enough to make your router explode; you really have no way to wiggle out of this. Maybe next time, you shouldn't have picked a fight with someone way out of your league, bud. I know your IP address from our previous engagement also. I don't care if you have the courts lined up, I have 2, 4 layer proxies that are stacked up each other, location spoofer, ddos protection, information spoofer, temp emails, basically every security measure out there. It would take millions of yours for you to even crack my name, bud. Maybe you should rethink your life choices, asshole, and maybe I'll add you to the whitelist. CssHackers are simply an elite. A big name, they have worked with intelligence agencies to unlock mails and computer systems. They are absolute master hackers. We will send your information to CssHackers and they will unlock your mails and computer systems and turn them into a boatload of malware that will leak its way into your bank account and other sources of private info. Well, you know what. After I'm done with all the damage to your finances and status, I can have you arrested and thrown in prison.
This was done by my sophisticated ai robotic network, adt, (automatic doxing tool), in less than a minute. You may call me a script kiddie, but this program is a state of the art doxxer, fbi and cia agents have even personally ASKED ME for this program. Also, this tool is 100% independent and undetectable from servers and some clients, so no security loopholes are created.
submitted by 9inchmutatedcock to copypasta [link] [comments]

taken from r/masterhacker

I have a warehouse of 50 computational servers that at any moment, I can instantly activate. They will send so many DDoS attacks to your internet, that you will be unable to use the internet at all. They run on a continuous circuit, and my main use for them is to mine bitcoin. The network effects of my DDos are strong enough that if I leave them running long enough, I can permanently disable someone's internet... If it's a high profile target, like the government or a popular corporation, I can shut it down completely and keep it from working. It would be incredibly easy to sabotage these servers with malware. They run in the background, and can't be stopped. During my 10 year career in electronic warfare, I've shut down over 100 hundred websites, and kept them completely shut down. It's fairly accurate and much more convenient than your average DDoS attacks. I could also issue arbitrary updates to web servers, turn flash players on and off, lock and unlock servers and so on. In addition, my power has granted me the ability to render entire computer networks completely offline. I have sent tens of thousands of DDoS attacks for three weeks using my IRC and Web Chat clients (CrackMyDNS, Argus, ZNC, etc), I've zapped multiple ISPs in two countries, and I was responsible for multiple data leaks. I've kept a spreadsheet of IP addresses and domain names that have been compromised by me. I have the means to completely empty out a region of a major ISP. It doesn't take a rocket scientist to see that I'm the emperor of the Internet.
submitted by yorkea to copypasta [link] [comments]

I will fucking crush you with ddos attacks

i have a warehouse of 50 computational servers that at any moment, i can instantly activate. They will send so many DDOS attacks to your internet, that you will be unable to use your internet at all. They run on a continuous circuit, and my main use for them is to mine bitcoin. The network effects of my DDOS attacks are strong enough that if i leave them running for long enough, I can permanently disable someone’s internet... if it’s a high profile target, like the government or or a popular corporation, i can shut it down completely and keep it from working. It would be incredibly easy to sabotage those servers with malware. They run in the background, and can’t be stopped. During my ten year career in electronic warfare, i’ve shut down over 100 hundred websites, and kept them completely shut down. it’s fairly accurate and much more convenient than your average DDOS attacks. I could also issue arbitrary updates to web servers, turn flash players on and off, lock and unlock servers and so on. In addition, my power has granted me the ability to render entire computer networks completely offline. I have sent tens of thousands of DDOS attacks for three weeks using my IRC and Web Chat clients (CrackMyDNS, Argus, ZNC, etc) i’ve zapped multiple ISPs in two countries, and i was responsible for multiple data leaks. i’ve kept a spreadsheet of IP addresses and domain names that have been compromised by me. I have the means to completely empty out a region of a major ISP. it doesn’t take a rocket scientist to see that i am the emperor of the internet.
submitted by TheFirstPersonGod to copypasta [link] [comments]

From r/masterhacker

i have a warehouse of 50 computational servers that at any moment, i can instantly activate. They will send so many DDOS attacks to your internet, that you will be unable to use your internet at all. They run on a continuous circuit, and my main use for them is to mine bitcoin. The network effects of my DDOS attacks are strong enough that if i leave them running for long enough, I can permanently disable someone’s internet... if it’s a high profile target, like the government or or a popular corporation, i can shut it down completely and keep it from working. It would be incredibly easy to sabotage those servers with malware. They run in the background, and can’t be stopped. During my ten year career in electronic warfare, i’ve shut down over 100 hundred websites, and kept them completely shut down. it’s fairly accurate and much more convenient than your average DDOS attacks. I could also issue arbitrary updates to web servers, turn flash players on and off, lock and unlock servers and so on. In addition, my power has granted me the ability to render entire computer networks completely offline. I have sent tens of thousands of DDOS attacks for three weeks using my IRC and Web Chat clients (CrackMyDNS, Argus, ZNC, etc) i’ve zapped multiple ISPs in two countries, and i was responsible for multiple data leaks. i’ve kept a spreadsheet of IP addresses and domain names that have been compromised by me. I have the means to completely empty out a region of a major ISP. it doesn’t take a rocket scientist to see that i am the emperor of the internet.
submitted by Ekebe23 to copypasta [link] [comments]

The hacker

i have a warehouse of 50 computational servers that at any moment, i can instantly activate. They will send so many DDOS attacks to your internet, that you will be unable to use your internet at all. They run on a continuous circuit, and my main use for them is to mine bitcoin. The network effects of my DDOS attacks are strong enough that if i leave them running for long enough, I can permanently disable someone’s internet... if it’s a high profile target, like the government or or a popular corporation, i can shut it down completely and keep it from working. It would be incredibly easy to sabotage those servers with malware. They run in the background, and can’t be stopped. During my ten year career in electronic warfare, i’ve shut down over 100 hundred websites, and kept them completely shut down. it’s fairly accurate and much more convenient than your average DDOS attacks. I could also issue arbitrary updates to web servers, turn flash players on and off, lock and unlock servers and so on. In addition, my power has granted me the ability to render entire computer networks completely offline. I have sent tens of thousands of DDOS attacks for three weeks using my IRC and Web Chat clients (CrackMyDNS, Argus, ZNC, etc) i’ve zapped multiple ISPs in two countries, and i was responsible for multiple data leaks. i’ve kept a spreadsheet of IP addresses and domain names that have been compromised by me. I have the means to completely empty out a region of a major ISP. it doesn’t take a rocket scientist to see that i am the emperor of the internet.
submitted by TheTrollerxdd to copypasta [link] [comments]

White Paper, Miner, Pizza … | "Old Objects" in the Cryptocurrency Museum

White Paper, Miner, Pizza … |
https://preview.redd.it/giu1ssilga151.jpg?width=900&format=pjpg&auto=webp&s=41510785ccdc0d99544ec74229f62427d1c0ce3e
Museum has played the role of a time recorder. Talking about bitcoin, more than ten years has passed since the creation of it. Although it is uncomparable to the stock market with a hundred years of history, during the ten years, in the different stages of the development of bitcoin and blockchain have continuously poured in geeks, miners, speculators, newbies, leaving keywords such as sudden rich, myth, scam, belief, revolution, etc.
There are also many “old objects” with stories in the “Museum” of the cryptocurrency realm. On Museum Day, let ’s review the stories brought by these “old objects”.
The First Digital Currency White Paper — Bitcoin White Paper
On Oct. 31, 2008, Satoshi Nakamoto released the Bitcoin white paper — A Peer-to-Peer Electronic Cash System in the cryptographic mail group where he belongs, and Bitcoin was born since then.
A white paper is a document that explains the purpose and technology used in cryptocurrency. Usually a cryptocurrency uses the white paper to help people understand what it provides, and it is also an important information channel for investors to understand a project. Therefore, the level of the white paper affects people’s confidence towards the coin.
In a word, in the cryptocurrency and blockchain industry, the value of a white paper is equivalent to that of a standard financing speech. The white paper plays a vital role in this emerging market.
The First Public Bitcoin-Physical Transaction — Pizza
Since Satoshi Nakamoto mined the Bitcoin genesis block on January 3, 2009, Bitcoin has only been spread among the small crowd and has not realized its value.
Not until May 22, 2010, Bitcoin enthusiast “Laszlo Hanyecz” bought a pizza coupon worth $25 with 10,000 bitcoins. This is the first public bitcoin-physical transaction. Bitcoin has its price with 0.3 cents per bitcoin.


This day has also become the famous “Bitcoin Pizza Day” in Bitcoin history. Bitcoin as the imagination of the financial system has more practical significance. The tenth anniversary is coming. How will you commemorate it? Will you buy a pizza?
The First Digital Asset Exchange — Bitcoinmarket.com
After the birth of Bitcoin, in addition to mining, the only way to get Bitcoin in the early days was to conduct transactions on forums or IRC (commonly known as Internet Relay Chat). However, this method involves both long transaction time and great security risk.
In March 2010, the first digital asset exchange — Bitcoinmarket.com launched. However, due to lack of liquidity and transaction depth, it disappeared soon after its establishment, but Bitcoinmarket.com opened the era of the operation of the cryptocurrency realm exchange 1.0.


On June 9, 2011, China’s first Bitcoin exchange — Bitcoin China (BTCChina) launched. Its founder, Yang Linke, translated Bitcoin into Chinese “比特币” for the first time. In 2013, China’s bitcoin trading entered the golden age, and exchanges sprung up. China monopolized more than 90% of the world’s bitcoin transactions. Now, if the top three exchanges Binance, Huobi Global, OKEx are the Exchange 2.0, then the index exchange represented by 58COIN called the 3.0 version, leading the trend.
The First Generation of High-Performance Miner — ASIC Miner
When Satoshi Nakamoto created Bitcoin, the only way to get it is to use computers (including home computers) to mine, mainly relying on the CPU to calculate. However, as the value of digital currencies such as Bitcoin has become higher and higher, mining has become an industry with the competition is getting fiercer, accompanied by increasing difficulty of mining. Therefore, hardware performance competition starts.
In July 2012, the genius Jiang Xinyu (Internet nickname is “Friedcat”) from the junior class of the University of Science and Technology declared at the forum that he could make ASIC miners (chips). As far as mining computing power is concerned, ASICs can be tens of thousands or more higher than the same-generation CPUs and GPUs.
At the beginning of 2013, Zhang Nanqian (Pumpkin Zhang), a suspended doctoral student from the Beijing University of Aeronautics and Astronautics, developed the ASIC miner and named it “Avalon”.


In June 2013, the Friedcat’s miner USB was finally released, and it maintained 20% of the computing power of the entire network.
At the end of 2013, Wu Jihan, used the tens of millions yuan earned from Friedcat through investment, worked together with Jenke group, to develop the Antminer S1. Since then, the miner manufacturer Bitmain began to enter the stage of history.
It is no exaggeration to say that Friedcat and Zhang Nangeng have opened the domestic “mining” era.
The Birthplace of China’s Bitcoin — Garage Coffee
It is not only the “old objects” that record history, but also a place that everyone in the cryptocurrency realm aspires to.
Guo Hongcai once said, “Without no The Garage Café, there will be no cryptocurrency realm today. Since it is a very mysterious place that all waves of people from the café joint together to create today’s digital asset industry.

▲ In March 2013, American student Jake Smith successfully purchased a cup of coffee at The Garage Café with 0.131 bitcoins. This move attracted the attention of CCTV, and it conducted an interview.
Indeed, The Garage Café is the world ’s first entrepreneurial-themed coffee shop. It has been legendary since its establishment in 2011. The Garage Cafét is not only the core coordinate on China’s Bitcoin map, but also the birthplace of the Chinese cryptocurrency circle, where digital asset realm tycoons including Guo Hongcai, Zhao Dong, Li Xiaolai, Li Lin have made their ways.
The development of digital currency is only 11 years old. Through these “old objects”, we review the various stories of this wave of technology together, hoping to help you understand the development process of the digital currency field. Meanwhile, I also remind all practitioners to use history as a mirror and forge ahead.
Website: https://www.58ex.com/
Twitter: https://twitter.com/58_coin
Facebook: https://www.facebook.com/coin.58COIN
Telegram: https://t.me/official58
Medium: https://medium.com/@58coin_blog/
submitted by 58CoinExchange to u/58CoinExchange [link] [comments]

"The emperor of the internet"

i have a warehouse of 50 computational servers that at any moment, i can instantly activate. They will send so many DDOS attacks to your internet, that you will be unable to use your internet at all. They run on a continuous circuit, and my main use for them is to mine bitcoin. The network effects of my DDOS attacks are strong enough that if i leave them running for long enough, I can permanently disable someone’s internet... if it’s a high profile target, like the government or or a popular corporation, i can shut it down completely and keep it from working. It would be incredibly easy to sabotage those servers with malware. They run in the background, and can’t be stopped. During my ten year career in electronic warfare, i’ve shut down over 100 hundred websites, and kept them completely shut down. it’s fairly accurate and much more convenient than your average DDOS attacks. I could also issue arbitrary updates to web servers, turn flash players on and off, lock and unlock servers and so on. In addition, my power has granted me the ability to render entire computer networks completely offline. I have sent tens of thousands of DDOS attacks for three weeks using my IRC and Web Chat clients (CrackMyDNS, Argus, ZNC, etc) i’ve zapped multiple ISPs in two countries, and i was responsible for multiple data leaks. i’ve kept a spreadsheet of IP addresses and domain names that have been compromised by me. I have the means to completely empty out a region of a major ISP. it doesn’t take a rocket scientist to see that i am the emperor of the internet.
submitted by someone_existing to copypasta [link] [comments]

the emperor of the Internet.

I have a warehouse of 50 computational servers that at any moment, I can instantly activate. They will send so many DDoS attacks to your internet, that you will be unable to use the internet at all. They run on a continuous circuit, and my main use for them is to mine bitcoin. The network effects of my DDos are strong enough that if I leave them running long enough, I can permanently disable someone's internet... If it's a high profile target, like the government or a popular corporation, I can shut it down completely and keep it from working. It would be incredibly easy to sabotage these servers with malware. They run in the background, and can't be stopped. During my 10 year career in electronic warfare, I've shut down over 100 hundred websites, and kept them completely shut down. It's fairly accurate and much more convenient than your average DDoS attacks. I could also issue arbitrary updates to web servers, turn flash players on and off, lock and unlock servers and so on. In addition, my power has granted me the ability to render entire computer networks completely offline. I have sent tens of thousands of DDoS attacks for three weeks using my IRC and Web Chat clients (CrackMyDNS, Argus, ZNC, etc), I've zapped multiple ISPs in two countries, and I was responsible for multiple data leaks. I've kept a spreadsheet of IP addresses and domain names that have been compromised by me. I have the means to completely empty out a region of a major ISP. It doesn't take a rocket scientist to see that I'm the emperor of the Internet.
submitted by luwst to copypasta [link] [comments]

Monero Regulatory Workgroup?

Do we need a workgroup focused on policy/regulation at this stage? While initiating discussions for creating policy briefs to enable Monero community members who want to engage with their elected officials, we have come across people who have been thinking about similar efforts.
Some questions have come up that we’d like to ask for community feedback on.... please comment in this post to make your opinions known!
  1. Do we need a separate workgroup for this or should it fall within the current Monero Outreach Workgroup?
  2. What directions, ideas, priorities exist among Monero that relate to policy and regulation?
  3. How should we organize going forward? Do we need to setup another IRC channel for communication or can we use the existing Monero Outreach channels and stick with periodic community updates?
  4. What other considerations should be made?
A bit more history on some of the ideas that have floated around this topic....
It would obviously make sense for these different parties to be working in support of one another- and ultimately in support of Monero. What do you think would be the best ways to make this happen?
submitted by xmrhaelan to Monero [link] [comments]

What does the community think of the following coins: ARK, ICX, HOT and QNT?

If its possible (with CC you never know) i want to have a civil discussion with the community. I have been an active member of the crypto community since quite a while now (i have been mining since june 2017, investing since nov 2017).

These coins have been on my list for quite some time - even invested in some but later sold to consolidate in other holdings. I am on the fence on all of these but im not sure about them. It feels like the risk/rewards are a bit too much for me (high risk / high reward, while i rather like medium to low risk and medium to low reward - like BTC/ETH/XMR). Now my opinion MIGHT seem like FUD to some, but it isnt. Yes, it is doubt - but not fear or uncertainty. I just dont know. Call me stupid, but my understanding IS limited on these subjects. Crypto is a difficult game to play IMO, and trying to understand it all (as a lowly IT worker) feels impossible without the help and knowledge of the community. It is also why - even though our community can be toxic as hell - am in the end grateful that we do have a community here on reddit.

I want to know the community opinion about it - and really the whole community. So both FOMO inducing thoughts as FUD inducing thoughts - but with real arguments - no mindless shilling or mindless FUD (PLEASE). Not 'shitcoins buy BTC' or 'BUY NOW or regret it'. Can we for a single moment act rational and just discuss things? What are the pro's and cons, how do you feel about them - and with strong arguments (again NOT, they are shitcoins buy Bitcoin - infact, i rather have Bitcoin/ETH maximalist NOT comment on this thread). Do you also think the team behind the coins will succeed in delivering? And if there is an actual market for it/use cause for it? And i know 'DYOR'. I have done it, i am doing it. Its just that the subs of the coins usually are hostile AF for asking questions, that i have just given up. Also on most sub you just get Shillings or 'DYOR' comments. It doesnt feel neutral. And i am not a discord guy, i wasnt an IRC guy back in the early days either - besides for downloading movies back then. I think - once you remove the BTC and ETH maximalist - CC can be more neutral, have more opinions about the subject as fanboys and sceptics can class here. Also i rather see CC being a center of knowledge, where we can spread and share our knowledge. I know - besides the brainless memes and brainless shilling and fuds -there have been rare ocasions of post that truly have enlightened me, that have given me more knowledge about crypto as a whole or about a specific coin. Let us please share knowledge too, and not be hateful or negative.

My reasons/opinions (both positive and doubts and what i know about the coins in very basic terms) for being interested in the coins are as following:

ARK and ICX:

These two because they have been going for interloperbility since ive known about then back in 2017. Interloperbility IS going to be a major game changer in my eyes (because i dont believe Bitcoin will be the only crypto ever and the rest are all shitcoins - please BTC maximalist, let this thread go! We know your opinion already!). Its one of the reasons i think ADA is interesting (a personal opinion that i know not everyone shares - and that is okay). I know Ark is trying to make side chains very easy (with 'one button' or so they say), creating your own side chain and connecting that with other Blockchains is the idea behind Ark (at least, so far as i have understand it). ICX on the other hand tries to be a bit bigger then that, with its smart contract platform and it also aims at enterprises.

HOT: The CEO of Firefox endorses it (and also the CEO of Netflix if im right), which is amazing. The whole DNA and agents thing is confusing though and even though ive read a lot of comments about it, i still am not sure how secure it is compared to 'regular' blockchain tech. It also wants to be a Dapp platform if im right and even be a standard for Web 3.0 (like Eth is aiming, more or less). Im not sure if its right, but it does feel like ETH is its main competitor, but its system is very different. It isnt a blockchain directly? HOT confuses the shit out of me lol and the wiser man in me says not to invest in things i cant understand.

QNT: It seems like QNT is more of a software/OS that runs of blockchain and through it, connects through all the different kinds of Blockchain. So from my understanding, QNT is an operating system mainly that uses Blockchain to transfer value/information etc. and also links different kind of chains together. I can see the appeal here, though i always wondered what the use of QNT token itself is. The software is amazing, but cant you just replace QNT token with USD/EUR or w/e and have it still working the same? This makes me feel very double about the project. I think the software is something the industry needs (interloperbility!) but another token, just cause you can - is something we dont need. Im a right in this assumption?

Well you dont have to reply on my opinion/thoughts/shilling/fuds (or w/e you want to call it), but i do want to hear your opinion - backed with logical arguments. You can share your sentiment (your emotions) but lets keep the shilling as low as possible. Also if it can, keep it at the forementioned coins. I dont want to hear about other projects. I know about the other projects. Im not asking about them. No VET/IOTA/ADA/ETH/XLM/AMB or some other project please. Definitely NOT Bitcoin. We fucking know it. Its the granddaddy, the big spanker, the baller, the OG - WE KNOW IT. Please lol. Just the coins ARK, ICX, HOT and QNT. I want to further diversify my holdings and these are the coins i am interested in but my own understanding is limited on it, doing the research have left me unsure/confused. Subs like CC should help with these kind of things, as in the end - wether you are a BTC maximalist, ETH maximalist or a lover of another crypto - we are ALL one community and we ALL want crypto to thrive, we ALL see the benefits of it, so please act like this - lets help each other and not be tribal about it. There are enough other threads were you can vent about your favorite team.
submitted by Redac07 to CryptoCurrency [link] [comments]

Andrew Poelstra on Bitcoin Math & Research GPG Web of Trust Tutorial for #bitcoin-otc IRS Needs to ADAPT to Crypto - NOT Accuse Bitcoin Users of Tax Avoidance - CHANGE OR DIE This Data says a Major Bitcoin Rally is Coming A Quick Word About Bitcoin...

Oktober Channel #Bitcoin-Dev wurde beim IRC registriert. 16. Dezember Die Version von Bitcoin v0.2 wurde veröffentlicht. 2010 Jahr . Am 6. Februar wurde der erste offizielle Bitcoin Market eröffnet. 22. Mai Der erste Online-Kauf wurde getätigt. Für 10 tausend Münzen (zu dieser Zeit sind es 25 Dollar) hat ein bestimmter laszlo Pizza gekauft. 11. Juli Version von Bitcoin v0.3 wurde auf der ... #bitcoin-otc marketplace. #bitcoin-otc is an over-the-counter marketplace for trading with bitcoin. The marketplace is located in #bitcoin-otc channel on the freenode IRC network. If you don't have an IRC client, click here to visit the channel with your web browser. resources. Web view of the open order book. Currency ticker. A guide to using #bitcoin-otc. A must-read for all users: how to ... Join us on IRC. webchat.freenode.net #bitcoin. Other Bitcoin sites. Bitcoin Forum Bitcoin Stack Exchange Bitcoin Magazine. Download Bitcoin Core. Bitcoin Core is the backbone of the Bitcoin network. Almost all Bitcoin wallets rely on Bitcoin Core in one way or another. If you have a fairly powerful computer that is almost always online, you can help the network by running Bitcoin Core. You can ... IRC. As-of version 0.6.x of the Bitcoin client IRC bootstrapping is no longer enabled by default, and as of version 0.8.2 support for IRC bootstrapping has been removed completely. The information below is accurate for most versions prior. Bitcoin joins a random channel between #bitcoin00 and #bitcoin99 on irc.lfnet.org. Your nick is set to an encoded form of your IP address. By decoding all ... Search Bitcoin in the channels list of IRC network freenode and get informed about freenode's users and topics! Current Chat Rooms: bitcoin, bitcoin-core-dev, bitcoin-pricetalk, bitcoin-otc, bitcoinsoftware, electrum, talos-workstation, lightning-dev, bitcoin-dev, bitcoin-core-pr-reviews

[index] [47525] [8075] [42807] [25577] [41429] [10506] [51145] [43471] [49454] [42694]

Andrew Poelstra on Bitcoin Math & Research

After registering and setting up GPG, this is how you can use it in windows on a regular basis. LizardSquads IRC #Offline - Duration: 33 seconds. Bitcoin Baron. 5 years ago; 306 views ; Get fucked you faggot Lizards! Bitcoin Baron uploaded a video 5 years ago 0:32. Springfield Missouri City ... Bitcoin Irc Chat Live: Video - Traders inputs reaction as strong Bitcoin downturn sets in. Read on : Open letter from: BittBurger Dear Investors: Anyone who bothered to educate themselves on ... 00:45:13: Discovering the Bitcoin Wizard channel on the IRC 00:48:25: Why Andrew dropped out of academia to pursue Bitcoin and cryptography 00:52:26: The unsolved Hilbert Problem’s 00:54:56 ... This video is unavailable. Watch Queue Queue. Watch Queue Queue

#