Updated list of Global Beermoney opportunities (+180!) - June 2020
Updated list of Global Beermoney opportunities (+180!) - June 2020
Introduction
The current, and now previous, Beermoney Global list started nearly 5 years ago. It’s been updated and has grown over all that time, but it also became a hassle to keep current. It was time to build a new list from scratch based on my experience in the Beermoney world over all these years and all the contributions all of you have been making in this sub. The lists consist of opportunities that are available in at least one country that is not the US. This means there are sites which only work in Canada or the UK. There’s sites which are open to the whole world, but this does not mean everyone can really earn something on it. It’s all still very demographic and therefore location dependent. This list should give you a starting point to try out and find what works for you. I’m not using everything myself as I prefer to focus on a few, so not all are tested by me. They are found in this sub, other subreddits and other resources where people claim to have success. I’ve chosen the format of a simple table with the bare minimum of information to keep things clean. It includes a link, how you earn, personal payment proof if available and sign-up bonus codes if applicable. Some of these bonuses are also one-time use codes specifically made for this sub! For the ones I don’t have payment proof (yet) feel free to provide some as a comment or via modmail so others know it’s legit. I am working on detailed instructions for each method that I personally use which will include things like cashout minimum, cashout options, tips & tricks,... For now I’ve split things up based on the type of earning like passive or mobile. Because of this there’s sometimes an overlap as some are both passive and on mobile or both earning crypto and a GPT (Get Paid To) website. The lists are obviously not complete so I invite you to keep posting new ones in the sub, as a comment to this post, or in modmail. Especially if you have sites or apps which work for one single specific country I can start building a list, just like I did for The Netherlands and Belgium. If you recognize things which are in fact scams or not worth it let me know as well.
Beermoney opportunities
Get Paid To (Surveys, tasks, offers, videos, clicking links, play games, searching)
For The Netherlands there are a few very good options next to a bunch of ‘spaarprogramma’s. There ‘spaarprogramma’s are all the same where you receive and click a bunch of e-mails, advertisements, banners,... I advise you to create a separate e-mail address or use a good filter in your inbox as you will be spammed to death. I believe they can be a nice piece of beermoney but they take quite the effort.
The one-time sign-up bonus programs are still to be found here. If you find a new one let me know so I can create the post to keep all the ref links together.
Saving money
Although it’s not really about making money online, it’s still nice to save some money as well when shopping online.
I had like 3 friends ask me how to build a PC in the past week so I made this to help them.
(Reddit Edit: Help my improve the document with productive constructive comments on what I got wrong or messed up! Im only human lol Also a lot of this is supposed to be kinda humorous. I didn't think I had to say that but, hey, its the internet. I appreciate the positive and productive comments! ) Beginners basic guide to building your own PC as of early 2018 (EDIT: Sorry for being a MSI/Corsair Fanboy) Heres a collection of thoughts to consider when building your own personal PC As always Id personally use PCPartPicker.com to configure your parts and for further thoughts on compatibility. First off building a computer is 100% based around what you plan to use the computer for.
Here are a few uses and generic ideas of what to go for. Audio Editing: Lots of small tasks that need to be completed quickly without lag. - Fast Processor( >4GHZ) - Fast RAM (MHZ) -At least 16 gigs! - Fast Storage, SSD manditorily - M.2 or PCI for best performance. - Shitty Graphics card, graphics card there only to keep the cpu from doing other tasks when working. - Can be a few generations or years old. - Many screens for lots of plug in windows to be open Video Editing: Lots of large to render and files to read. - Multi core processor the more the merrier - SSD for fast read/write of large video files. - Insane graphics card, AMD graphics cards are debatibly better but the nvidia Quadro series are specific for video rendering. Gaming: No more than 4 cores intense graphics card - 92% of games are not coded for more than 4 cores so why spend the extra money for it. - SSD for quick load screens - Nvidia cards, 10 series, the higher the number the better. Titan cards for MAXIMUM OVERDRIVE! Coding: quick processor for lots of small tasks. Ergonomic peripherials? - Dear god please dont use a mechanical keyboard so that your coworkers dont kill you. Home office: Everything can be a few gens behind so you can get the best power per dollar spent. - Sorry that Gateway doesnt exist anymore. I guess try Dell...
Parts (Expensive Legos)
CPU (tells things to go places and outputs data) Basically three main routes to go for: Intel, AMD, or ASIC. Intel - Gaming, Data center, Hackintosh Pros: Cooler, Faster speed (GHZ), short small tasks faster Cons: $$$$, less cores AMD - Gaming, Personal Computing, Large task processing Pros: Lots of cores, better price per performance, faster processing of large tasks Cons: Hot chips, large chips?, compatibility issues with MacOS. ASIC - "Application-specific integrated circuit" Pros: Does the task that they are made to do insanely efficently, great for mining. Cons: Literally does nothing else. Holy hell these are expensive, very hot (fans will get loud) CPU Cooler (Im a big fan) Most come with an in box cooler that are ok but please buy aftermarket. In Box - the free shitty cooler that comes with the processor. Pros: Free. Cons: Ugly, makes chip run hot, hard to clean Air cooler - oldest type of cooler but new designs are highly efficent. Pros: Only cooler that has the possibility of being 100% quiet, most likely cheaper Cons: large, if cooler isnt large enough for the chips thermal output the fans will be loud. Liquid - Custom pipes are beautiful, AIO is easy to install and offers similare performance. Pros: Looks cool, great temperatures, "quiet" Cons: Water pump has possibility of being loud, possible spills Phase Change - uses the technology of refridgerators to cool the chip Pros: Can overclock until the chip breaks. (whats colder than cold? ICE COLD!) Cons: Loud (compressor noise), Large pipes, just why.... Motherboard (the convienacnce store of computer parts) Really just about what type of I/O you want. - MAKE SURE FORM FACTOR FITS YOUR CASE! (or vice versa) - Look for PCI lanes for expansion. - How many graphic cards do you have? - PCI based interfaces? - PCI SSD? - PCI DAC? - PCI WIFI? - USbs? Network? Audio? - How many lanes of RAM? - DOES IT FIT YOUR PROCESSOR!?! (really tho) - M.2? - How many sata interaces? Good Brands: MSI, ASUS, Gigabyte Bad Brands: AS(s)Rock, Dell Memory (Dory) - The more the merrier - No less than 8gb for a functional windows machine (16 gb to never have a problem) - Use all the lanes your computer has to offer! the more lanes to access the faster the data can travel! -Imagine drinking a milkshake. If the straw is wider you can drink more of the milkshake than a skinny straw. - Faster MHZ for faster data access but give minimal performance differances - Please get ram with heat spreadders unles youre building a server with high airflow. - Make sure the type (DDR3 or DDR4) of RAM matches what your processomotherboard call for. Good Brands: Corsair, G.Skill, Ballistix Storage (Grandpa that remembers everythign about how things used to be but takes forever to learn a new tasK) Speed or massive storage? slower is cheaper. Golden ratio of speed/storage/price is 250-500 gb SSD and a 1+ tb disk drive. *Max speeds listed are for a single drive not RAID* Hard Disk Drives (HDD) - Cheapest and slowest - read/write speeds of < 0.5gb/s - 7200+ RPM or GTFO - Higher Speed drives can access data faster. - Do not move while powered up. physical parts will break. - Larger Cahche = faster Read/Write Speeds Pros: Cheap, Holds massive amounts of data Cons: Slower than molasses in a frezer Reputible Brands: Seagate, WD Solid State Drives (SSD) - necessity for quick boots and fast load screens (can only be re-written to so many times) - SATA based (2.5 inch)- Read/Write speeds capped @ 6 gb/s Pros: Most economical, form factor fits with old computers, Cons: "Slow" compared to other ssd's (but stil 12 times faster than a HDD) - M.2 based - Read/Write speeds capped @ 10 gb/s Pros: Size of a sick of gum! High End but not too expensive to be out of reach. Cons: Expensive for any size over 500 gb - PCI based - Read/Write speeds capped @ 20 gb/s for PCI3, x4 Pros: HOLY BANDWIDTH BATMAN! Faster than that little creepy ghost thats always in the corner of you eye Cons: You might have to take out a loan to buy one. *takes up a x4 PCI Lane* Reputible Brands: Samsung! Corsair, Plextor, Intel, Kingston, Crucial Video Card (that one kid that has thick glasses and is really good at math) - A regular old PCI card that handles all of the video rendering and output for your computer. - ASIC PCI cards. - The PCBs and chips are patented by two main companies but the differances come from line up and varying manufacturer cooling devices. - The more memory the better -NVIDIA (Team Green) Great for gaming, has specific card series for intensive rendering. Lazy driver updates. - Gaming - 900 series - Cheap - Low performance - Can play any video game made befrore 2010 on max settings - 1000 (ten) series - Expensive (thanks bitcoin miners...) - Great for VR! - Video Rendering -Quadro Series - Gaming and Rendering - Titan X - Maxwell based chip same as 900 series cards - Titan XP - Pascal based chip same as 10 series cards -AMD (Team Red) Underdog does the same thing but slighly worse and cheaper. (except video rendering) - Gaming - RX 400 series - Cheap - Hot - RX 500 series - Cheap - Ok at VR and deacent gaming frame rates. - Not bad but not particularly great either. - Video Rendering - Fire Pro series - Gaming and Rendering - Vega series -Good luck finding one to buy lmao Case (Fancy clothing for your parts!) - Similar to human clothing you want it to do a few main things really well with compromises for each extreme. - Durability - Steel - Incredibly durable - Creates Farady cage for components - Heavy af - Magnets, just magnets.... - Rust over time - Aluminium - Light - East to bend for modding or "physical maintenance" - Less likely to rust - Huzzah for Farady cages! - Plastic - Just dont - no electrical Ground - no faraday cage - Light AF! - Breath (Airflow) - positive internal airflow! - larger fans push the same amount of air with less speed/noise - Looks - Window? - RGB - Cool Paint? - Fit all your parts - graphics card length/ clearacne - support for liquid cooling raiators? - How many spots for HDD/SSDs - Motherboard format - Cable management! Power Supply (FIGHT MILK) - Rule of thumb: BUy Powersupply that outputs 1.5 times the wattage that you need. - You can walk further than you can you can run. - The PSU can casually output 50-75% power for much longer than at 90-100% (without failure) - If you never demand enough wattage for it to get hot the fan doesnt have to turn on therefore making it quieter. - Modular means you can remove/replace the cables from the PSU. Reputible Brands: Corsair, EVGA Optical Drive (motorized cup holder) - You can download most things today so I'd suggest against it unless you really NEED to watch/write DVD's/CD's Operating System (software that makes everything work) Windows (Always Updates) - Compatible with just about everything - Easy to learn to code on! - POS inital browser - Likely to get virus's Linux (Penguins are cute) - Unique - takes less resources to run - Barebones - Incredibly personalizable! - Compatibility issues with just about everything MacOS (Linux but more annoying) - It is legal! - Great for art and your grandma that doenst know how to use computers! - User friendly - Compatibility issues with various hardware - Confusing/Limiting coding structure Peripherials (cables everywhere!) - Keyboard (higer Polling rate is better) - Mechanical (key is pressed at an exact stroke length every time - Mouse (Higher Polling rate is better) - more buttons = better? - DPI (Dots Per Inch) - In theory, if a mouse has 1600 DPI, then, if you move your mouse one inch (2.54 cm), the mouse cursor will move 1600 pixels - Higher DPI the faster your cursor is able to be moved. - Monitor - In theory the human eye cant see faster than 60 frames per second. - Keep in mind Pixel ratio! - 4k screen that is 22inches will have more pixels in a square inch than a 4k screen that is 28 inches. - Interface? - DVI (Analog) - thumbscrews..... - can do two monitors with one port! - support for 4k - VGA (Analog) - thumbscrews... - max resolution is 1440p - Display Port (digital) - nice button clip - supports 4k - HDMI (Digital) - 1.2 or higer supports 4k - DAC/Speakers/Headphones - Dont even get me started - Microphone - Dont get me started PT.2 Other (other) - UPS (uninterruptible power supply) Just a battery that allows your computer to have some time if the power ever goes out so that you have time to save your work. - Cable Organization materials! - Zipties - velcro - LED LIGHTING! - Manditory - Extra/Better fans - More pressure, less woosh - IFIXIT Pro Tech Toolkit - becasue who buys just one torx wrench. - Cute kitten mousepad - Yes, it has to be a cat. Dont argue
This is a very general entry into building computers and what you should buy/look for. If you have any questions/comments send me an e-mail! -Zac Holley-
Check out Part 2 of our first Skycoin Official AMA with Synth
Enjoy Part 2 of 2 of the Skycoin Official AMA with Synth for March, 2018. Part 1 is posted here.
How will skywire stop centralization such as massive skywire node forwarding servers, like with the current internet?
There will be more competition between pools in Skycoin than there is in Bitcoin. If that problem occurs, then we will deal with it, we have strategies and models in place to handle this potential scenario.
How will it stop whales building humongous skyminer pools in massive cities such as New York that will forward all the nodes in that city?
If a whale wants to come in and invest 1 billion dollars, to take control of the internet service for a whole city, then it will only make Skycoin grow faster. If it becomes a problem like what is happening for Bitcoin right now, then we have plans in place to handle the issue. The miner pools can only be so abusive in Skycoin, because if the pools are too abusive, then other people will switch to smaller pools that give them a better deal.
How do you solve mining for bandwidth? What is to stop an attacker putting two routers next to each other to print money?
This is of the reasons why Skycoin will work and we do not think we have any viable competitors. We know how to solve this problem. The short answer is that we are not paying users for bandwidth. Users are paying each other. So if you put two routers next to each other in a loop, then you are paying yourself for your own bandwidth! So you are not printing money. It is the same as moving money from one of your wallets, to the other wallet. Skycoin does not “print money”. There is zero inflation. It is a closed loop economy. Our mathematical models show that if the network is not running in closed loop, that you can always game the system and eventually botnets will take over all of the rewards. There is another way we found, which uses a bandwidth credit system and later we can build futures and derivatives markets. Since bandwidth is scarce, but is wasted if not used our algorithm allows a certain amount of fraud (acceptable loss ratio) to be factored in but mathematically guarantees that the fraud stays below a certain threshold. There is a maximum amount or upper bound a node can get away with, before it detected and the other nodes stop working with the node. Basicly, eventually the nodes have a reputation system and nodes prefer other nodes who follow the rules over nodes that try to engage in bandwidth fraud. We have a simple working solution for the testnet, then we will start building up the full solution, which will also improve the network performance a lot by directing most of the rewards at trustworthy nodes with a high uptime, lower latency and higher bandwidth capacity. The node reputation system will take a bit of work, but will allow us to do a lot of new thing with QoS and routing.
Since the people using Skywire resources depend on those resources to report what happens to the outside world, how do you stop adversarial actors from defrauding users using information asymmetry between the users and the blockchain? How do you do this without an enormous amount of overhead?
Adversarial actors are a major problem in any system where anything of value is concerned. If you do not have a solution for fraud, then bots will come in and steal all the money. Imagine you are running a poker site with 100,000 humans on it. Then someone floods the poker site with 1 million bots (who are better at poker than humans). The bots are going to steal all the money from your users and they will leave (because they are only losing now and the game is not balanced anymore). If you tell people “I will give you money for running this computer program”, there are people who control 15 million computers and they will just run the program on their botnet. All of the money will goto the bots. Skywire solves the bot problem by a sort of peer-to-peer whitelisting protocol. We do not let people flood the network with bots. Each node maintains a peer list and if you want to peer a human has to add the peer on both ends by hand, so it’s harder for a botnet to come in and try to take over. People, because they are social, will peer with people they know personally (their own social network or communities). It’s designed so that people with high quality, hand curated peer lists will have a significant advantage over someone who peers with 10 million slow botnet computers, running on laptops running windows XP. Also people who own dedicated hardware will also have much better performance metrics and will be rewarded more than botnet computers. The overhead for the record keeping is only 2% to 6% of the total bandwidth in the network, depending on how long the sessions are and the specifics. So the overhead is at the same level as for the existing internet.
Why did you use Orange Pi’s, that have their NIC on a USB 2.0 bus, for the hardware in the Skynodes?
Ideally, for security, the NIC should not have DMA (Direct Memory Access). USB 3.0 is a nightmare. USB 2.0 is bad and USB 1.0 is actually better (more secure, but slower). The NIC drivers or firmware usually have a lot of dangerous security problems. We are designing a custom PCB and there are several security, cost, design issues that do not have a clear best solution. The NIC is on the USB 2.0 bus, primarily because that is what the chip supports and because of cost.
What is to stop the cable lobbyist and the FCC who have already proven they will go against the will of the people from banning skywire? Couldn't they stop people from getting access to the backhaul and outright outlaw the entire concept? When I asked on the Telegram everyone dismissed the concern and said 'its impossible to stop us, look at the darknet'. And while that is true, for skywire to work don't you need widespread normie adoption? What percentage of people would actually run this if they banned it?
There are many, extremely wealthy and powerful groups that are being squeezed out by the FCC and the internet monopolies. There are some surprising large and powerful players that will support (publicly or clandestinely) any project that gives them some breathing room from the telecom squeeze out. We want them to try to ban Skywire. That means we are winning. You have to understand the context of the FCC and the cable companies. The cable companies were forced to be very aggressive and remove net neutrality and start using mafia extraction tactics against companies like Netflix and Google, because of earnings pressure. The cable companies all have declining revenue because people are using the internet for video and are “cord cutting”. The CEOs and management are desperate to keep their stock prices up and slow down the earnings decline. The CEOs of the cable companies are under extreme pressure to increase earnings in the short term, but are using tactics that will create a lasting long term backlash. The CEOs will increase earnings, they will see their stock prices go up, they will cash out their options and retire to the Hamptons. The backlash will be the next CEOs problem. Skywire is global and the FCC only matters in the US. In Europe there is much more diversity in ISPs and you wont see the type of battle and resistance they will put on in the US. The cable companies are dying. They are the dinosaurs whining and moaning before the meteor impact. Fighting technology innovations like Skywire is part of the process of the demise of these telecom monopolies, but it is not something to worry about. If they are attacking us, it means we are winning. We will be ready.
Do you have an estimate for when coin hours will have value and be tradable?
We are working on getting the exchange up, but it will need to wait until the testnet. First we will make coinhours tradable, then we will open them up for exchange.
How, in simple terms, do coin hours prevent spam?
The more they spam, the more scarce and expensive the coinhours become. If someone spams or attacks Skycoin, the Skycoin price will actually go up. Since there are only a finite, scarce number of Skycoin and each Skycoin generates a fixed number of coinhours per hour; then coinhours become scarce and valuable. They put a price on transactions. An attacker or spammer has to ask “Should I just sell my coinhours for money or should I spam and lose money?”. Eventually the spammer will use up all of his coinhours and then will have to buy them from someone else to keep spamming. Eventually they will even drive the market rate of the coinhours up, until the spamming becomes so expensive that they run out of money or give up.
On telegram you wrote coin hours are meant to be volatile if I'm not mistaken. Will this be a problem in the future?
It depends. By shuffling volatility from Skycoin, to the coin hours it makes Skycoin more valuable as a store of value and as a currency for transactions. We want people to spend coin hours. If Skycoin is going up everyday 5% a day, why would you spend it? If we priced the bandwidth in Skycoin, the whole network would shutdown because everyone would just be hoarding their Skycoin instead of spending them! That is why we introduced coinhours. Coinhours solve the problem of hoarding and gives people a currency which they are encouraged to spend. Skycoin is a better store of value because there is no inflation, while coinhours are better for transactions because they have an inflation rate that encourages people to spend them. The market cap of the Skycoin coinhours could actually be higher than the market cap of Skycoin under some conditions. Everyone is very excited to see what the price coinhours settle at. People are betting on the market and cannot wait to trade and speculate on the coinhours (either dumping them before they go down to zero, or hoarding them incase they go up 500x). I was surprised at how excited people are about the coinhours.
Are there any more coins launching on skyledger soon you can talk about?
Kittycash.com, mdl.life, SPACO, solarbankers.com, and more... I have been so busy with Skycoin I cannot even keep up with the new ICOs. We are opening up the platform now and more people will be launching coins that I could possible keep track of. We should probably have a registry to track the Skyledger ICOs.
Will it be easier to launch coins on skyledger in the future? Any other skyledger updates?
Yes. We have a script now for launching new coins! In 30 seconds you will be able to: Create your coin Have your ICO software running to collect money Have the coin automatically listed on an internal exchange (instead of waiting 8 months to get listed on some mega exchange) Have mobile, desktop and hardware wallet support Skyledger is getting a rebranding and its own marketing team. We have several flagship coins in development, that will help alot for Skycoin marketing.
Synth mentioned months ago in the telegram chat that Obelisk was still in development, when and how will the algorithm be tested and release? How are the actual transactions validated if obelisk is not the algorithm used?
We have done several simulations. There are several peer reviewed academic research papers published about it. There are open source simulations in the github repo. The exchanges are worried about us enabling the full consensus algorithm without enough testing. We have to do a lot of testing before we turn everything on. Currently the exchanges forced us to use a masternode dev check-point system. Over time, we are going to make extensive changes to the node and keep minting on the checkpoint system, while rolling out everything. Then after extensive testing, will roll out everything in stages. The testing of the new features and stages, needs to be done on a smaller coin (other Skyledger coins) before being rolled out to Skycoin. Skycoin’s market cap is too large and we have to be cautious about bugs and not rolling out new code before its tested. The dev check-point system is a compromise that allows us to test new consensus algorithms, while protecting the exchanges. If the exchanges lose money from a bug and lose $200,000 in Skycoin then we have to pay them for the lose basicly. The exchanges are all short-staffed because of massive user base growth. They are taking weeks sometimes to upgrade the Skycoin node version, after we release a new version. We have to carefully coordinate our release and upgrade schedules to minimize exchange downtimes. The short answer, is; we can roll out everything in a few weeks (if we had to). Everything is tested and ready to go. However, because of the exchanges are overloaded, we have to roll it out carefully in planned stages, with a months notification for any changes. I think everything will be in place by the end of the year, but the Skywire testnet is taking a lot of development resources, so we will push it back if that means Skywire gets launched faster. Also, then we are always improving things. So even after it “done”, its not really done. It always need more developers working on it and improving everything. We think “one second transaction are fast enough”, then someone comes in with a video game they want to put on blockchain and suddenly we need 200 ms. The demands are endless. When all of this work is done, it will also mean that we have the best blockchain platform. So we need to have a marketing event built around this. It may not make sense to do it in the middle of Skywire launch mania, because we can only handle so many things at once. News like this, we also have to make sure we release it into an upward market, when a lot of people are paying attention to innovations in blockchain technology. It would be wasted if we released big news or features, when people were not paying attention.
What's in store for Skycoin this year?
To many things. Everything. All at once. Its crazy. We are opening a hardware incubator, which is the most exciting thing for me. I think we will not see the real applications of blockchain until we get blockchain into the physical world.
Where do you see this project in 5 years, where in 10 years? (What is your long term goal?)
We are moving so fast. I could not imagine that we did as much as we have, in such a short time. I cannot even keep up with how many things are in development now. The goal this year is to demonstrate real world applications of blockchain technology. To bring blockchain to the physical world and make it tangible. The goal in five years is to make blockchain obsolete and to create what comes after blockchain. We are experimenting with a thing we have started to call the “Fibre”. I do not think innovation will stop at blockchain. The third generation of coins is going to be post-blockchain and want to be a leader in this area.
How long before I can buy a coffee with Skycoin?
As soon as I buy a coffee shop, lol.
When the community try to bring more people to skycoin, specially those with big money, we have to face the fact that the time locked distribution is not auditable (or it is?) is there any strategy to calm the doubts about the distribution method (the developers hold the majority of the coins/ are the only ones able to mint coins)
One of the advantages of blockchain is that all of the transaction are public. So the distribution schedule is auditable. Skycoin’s distribution is completely public. The distribution addresses are also public. So it is very transparent. There is an api endpoint here with the distribution addresses and information updated in real time https://explorer.skycoin.net//api/coinSupply
In your blogs you are talking about the possibility of a ninja announcement that burns 80% tokens. That means it will be only 20 mil sky. So, in which circumstances devs would do that?
If we can find a closed loop, economic model for Skywire, that does not require a 15 or 20 year distribution period. Then we will burn the coins. Then the distribution would be capped at 30 million instead of 100 million. Right now, we need the coins held aside for infrastructure investment, to grow the network and maintain the project. There are some future components, that could eliminate the need for infrastructure fund and enable the network to be self-financing. Even if we get these components in place, what it means is that the infrastructructure fund will just allow us to grow even faster! So we might still not burn the coins. You cannot underestimate what it will mean if we are investing 100 million dollars a year of coins into growth. This is the fuel that drives the growth of the ecosystem, so it does not make sense to “burn” the fuel. If there are more projects we can invest in, to grow faster, then we should do that.
In your opinion, what is the best exchange for buying Skycoin right now, and why? And on what other exchanges will Skycoin be listed, and when?
C2CX is good. Cryptopia is also good but withdrawals are slow. We will be listed on larger exchanges this year, but cannot give details. We signed contracts but the exchanges grew from 1 million users to 8 million users in a few months, so their technical teams are overloaded. Listing a new coin can take 6 months after signing the agreement now. We are doing all we can to expedite the process.
Will the Kittycash platform be advertised across cat loving forums and the like?
LOL.
What will the value of legendary kittys be in 2019?
People are spending 1 or 2 Bitcoin per legendary kitty now. Kitty Cash had to stop selling legendary kitties, because fifty people were trying to buy each kitty and too many people were trying to buy them at once.
When will SKY be listed on new exchanges?
We were listed on four new exchanges this month. Wolfcrypto, Next, and two other exchanges. I cannot even keep track of it. We signed contracts with the largest exchanges, but are still waiting for technical integration and we signed contracts not to disclosure information about specific exchange listings. The exchanges are very overloaded right now, with technical problems from user growth and also from hundreds of coin ICOs that all want to be listed at once. Millions of people per month are registering on the Bitcoin exchanges now and the exchanges are overloaded. It can be a six month waiting list for listing now, after contracts have been signed, so we are just waiting at this point. However, big exchanges are coming soon.
Some thoughts about the activation mechanism for soft forks. In the past we used IsSuperMajority and currently use BIP9 as soft fork activation methods, where a supermajority of hashrate triggers nodes to begin enforcing new rules. Hashrate based activation is convenient because it is the simplest and most straightforward process. While convenient there are a number limitations with this method. Firstly, it requires trusting the hash power will validate after activation. The BIP66 soft fork was a case where 95% of the hashrate was signaling readiness but in reality about half was not actually validating the upgraded rules and mined upon an invalid block by mistake[1]. Secondly, miner signalling has a natural veto which allows a small percentage of hashrate to veto node activation of the upgrade for everyone. To date, soft forks have taken advantage of the relatively centralised mining landscape where there are relatively few mining pools building valid blocks; as we move towards more hashrate decentralization, it's likely that we will suffer more and more from "upgrade inertia" which will veto most upgrades. Upgrade inertia in inevitable for widely deployed software and can be seen for example, with Microsoft Windows. At the time of writing 5.72% of all Microsoft Windows installations are still running Windows XP, despite mainstream support ending in 2009 and being superseded by 4 software generations, Vista, 7, 8 and 10. Thirdly, the signaling methodology is widely misinterpreted to mean the hash power is voting on a proposal and it seems difficult to correct this misunderstanding in the wider community. The hash powers' role is to select valid transactions, and to extend the blockchain with valid blocks. Fully validating economic nodes ensure that blocks are valid. Nodes therefore define validity according to the software they run, but miners decide what already valid transactions gets included in the block chain. As such, soft forks rules are actually always enforced by the nodes, not the miners. Miners of course can opt-out by simply not including transactions that use the new soft fork feature, but they cannot produce blocks that are invalid to the soft fork. The P2SH soft fork is a good example of this, where non-upgraded miners would see P2SH as spendable without a signature and consider them valid. If such an transaction were to be included in a block, the block would be invalid and the miner would lose the block reward and fees. So-called "censorship" soft forks do not require nodes to opt in, because >51% of the hash power already have the ability to orphan blocks that contain transactions they have blacklisted. Since this is not a change in validity, nodes will accept the censored block chain automatically. The fourth problem with supermajority hash power signaling is it draws unnecessary attention to miners which can become unnecessarily political. Already misunderstood as a vote, miners may feel pressure to "make a decision" on behalf of the community: who is and isn't signalling becomes a huge public focus and may put pressures onto miners they are unprepared for. Some miners may not be in a position to upgrade, or may prefer not to participate in the soft fork which is their right. However, that miner may now become a lone reason that vetoes activation for everyone, where the soft fork is an opt-in feature! This situation seems to be against the voluntary nature of the Bitcoin system where participation at all levels is voluntary and kept honest by well balanced incentives. Since miners already have the protocol level right to select whatever transaction they prefer (and not mine those they don't), it would be better if a miner could chose to not participate in triggering activation of something they won't use, but, without being a veto to the process (and all the ire they may have to experience as a consequence). The alternative discussed here is "flag day activation" where nodes begin enforcement at a predetermined time in the future. This method needs a longer lead time than a hash power based activation trigger, but offers a number of advantages and perhaps provides a better tradeoff. Soft forks are still entirely optional to use post activation. For example, with P2SH, many participants in the Bitcoin ecosystem still do not use P2SH. Only 11% of bitcoins[2] are stored in P2SH addresses at the time of writing. Miners are free to not mine P2SH transactions, however, the incentives are such that miners should still validate transactions so they don't accidentally include invalid transactions and cause their block to be rejected. As an additional safety measure for well designed soft forks, relay policy rules prevent non-standard and invalid transactions from being relayed and mined by default; a miner would have to purposefully mine an invalid transaction, which is against their own economic interest. Since the incentives of the Bitcoin system rely on self validation, economic nodes (miners and users) should always remain safe by ensuring their nodes either validate the current rules, or, they can place their network behind a full node that will filter out invalid transactions and blocks at the edge of their network (so called firewall or border nodes). A user activated soft fork is permissive. Miners do not have to produce new version blocks and non-upgraded miners' blocks will not be orphaned as was the case with IsSuperMajority soft forks (e.g. BIP34, BIP66, BIP65-CLTV) which made it a compulsory upgrade for miners. BIP9 "versionbits" soft fork activation method is also permissive in so far as non-upgraded miners are not forced to upgrade after activation because their blocks wont be orphaned. A recent case was the "CSV" soft fork that activated BIP68, BIP112 and BIP113. As such, the CSV soft fork allows non-upgraded miners to continue mining so long as they didn't produce invalid blocks. Miners always retain discretion on which transactions to mine. However, regardless of whether they actively include transactions using the new soft fork feature, or not, the incentive for hash power to upgrade in order to validate is strong: if they do not, they could be vulnerable to a rogue miner willing to waste 12.5BTC to create an invalid block, which may cause non-validating miners to build on an invalid chain similar to the BIP66 incident. Validation has always had a strong requirement. A user activated soft fork is win-win because it adds an option that some people want that does not detract from other peoples' enjoyment. Even if only 10% of users ever wanted a feature, so long as the benefit outweighed the technical risks, it would not be rational to deny others the ability to opt-in. My suggestion is to have the best of both worlds. Since a user activated soft fork needs a relatively long lead time before activation, we can combine with BIP9 to give the option of a faster hash power coordinated activation or activation by flag day, whichever is the sooner. In both cases, we can leverage the warning systems in BIP9. The change is relatively simple, adding an activation-time parameter which will transition the BIP9 state to LOCKED_IN before the end of the BIP9 deployment timeout. You can find the proposal here https://gist.github.com/shaolinfry/0f7d1fd22743bb966da0c0b1682ea2ab References: [1]: https://bitcoin.org/en/alert/2015-07-04-spv-mining [2]: http://p2sh.info/dashboard/db/p2sh-statistics?from=1472043312917&to=1488030912918
My theory: There was collusion, but Trump ripped off Russia in the deal and has us in a more serious situation than we think. A timeline.
I’m not usually a conspiracy theorist, but it all fit together too well to ignore. Feel free to poke holes in this, I’d like to be proven wrong. The cold war never ended, it just moved online. 1991 - The cold war is declared over and the internet rises at a lightning pace. Much like the space program had before it. A cyberspace race. By nature of being the bulk of its inventors, the US is untouchable in cyber espionage. The NSA stockpiles all of the malicious code and secret vulnerabilities they can gather and rather than alert the world to them and help create fixes, they leave them active and turn them into tools for their agents to use against foreign powers. Eventually they also turn their attention inward and start using that software against their own people in a surveillance and manipulation program that dwarfs what the KGB had just been destroyed for doing. 2009 - Edward Snowden discovers the NSA running these programs and is outraged by the violation of rights and hypocrisy. He begins complaining in an attempt to get the system shut down and have our dirty little secret ended without national embarrassment. “I had raised these complaints not just officially in writing through email, but to my supervisors, to my colleagues, in more than one office. I did it in Fort Meade. I did it in Hawaii. And many, many of these individuals were shocked by these programs. They had never seen them themselves. And the ones who had, went, "You know, you're right. ... But if you say something about this, they're going to destroy you". March 2011 – It’s discovered that the US military is developing software to create, spread and control social media sock puppet armies. They promise it’s to use against foreign enemies, we’re told that it’s illegal for them to use against US citizens. https://www.theguardian.com/technology/2011/ma17/us-spy-operation-social-networks March 2013 - James Clapper blatantly lies to congress and denies the existence of the domestic surveillance program entirely. Snowden says this moment is when he realizes his hope is futile and May 2013 he begins releasing evidence of the collected data to expose the program and force it to stop, then waits out the storm in Hong Kong. I believe Snowden had an insurance policy. Along with the surveillance data that he had planned to release, he stole an NSA toolkit that would not be released. A drive full of the nastiest bugs and backdoors the NSA could invent that would be released to the public in the event of his death. The US government wouldn’t dare risk it. July 2013 – The public outrage over what’s been exposed should be astounding…but it’s not. It seems like no one cares. And at this point the NSA knows the toolkit has been stolen, it could destroy us. Desperate times call for desperate measures. The anti-propaganda law is repealed, freeing the US government to use propaganda against its own people. Those sock puppet armies are turned against us and it’s made to look like the majority of the US public doesn’t care about surveillance. Even South Park runs an episode in September mocking people’s indifference to the NSA. https://en.wikipedia.org/wiki/National_Defense_Authorization_Act_for_Fiscal_Year_2013#Smith-Mundt_Modernization_Act_of_2012 https://www.techdirt.com/articles/20130715/11210223804/anti-propaganda-ban-repealed-freeing-state-dept-to-direct-its-broadcasting-arm-american-citizens.shtml http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/ A massive domestic spy program is uncovered and they get away with it. Snowden isn’t a national hero, no one cares and in mid June 2013 the US files charges against him. He took a shot at the king and missed. The US rescinds his passport and demands Hong Kong extradite him. He’ll use his stolen toolkit to avoid a death penalty. Russia would have suspected Snowden had this insurance policy. They tell him to spite America, they’ll arrange a flight for him from Hong Kong to Ecuador despite his lack of passport, with just a short layover in Russia. The layover becomes permanent when they refuse to finish the flight due to that lack of passport. Russia tells him he now has a choice, hand over the toolkit or you’ll be killed here and your country won’t care. Russia doesn’t care if his death triggers the release, it’s their intention to do that anyway. He holds out for 39 days in the airport but on August 1st 2013 he caves, is given asylum in Russia and Russia is discretely given the master keys to the internet. The NSA is in an impossible position. They should alert the world that their monster has escaped its cage and help us secure our systems from it. But to do that would be to admit an indefensible extent of surveillance and now manipulation they themselves had carried out for years. The people would overthrow them immediately. In addition, every vulnerability they fix removes it from Russia’s arsenal but also from their own. I suspect they were using some of those vulnerabilities to sabotage the North Korean missile and Iranian nuclear programs. To fix them now would be to let those programs progress unhindered. I suspect this sort of catch-22 is how the Obama administration originally justified the surveillance to itself. And so the US does nothing. Russia now has almost unfettered access on the internet, a backdoor on every computer manufactured before that date. I believe their Kompromat program became limitless. I believe they gathered every secret that existed to be found, on every member of our government and corporate world and what couldn’t be found could be planted. I’ll reference this again on *April 8 2016. * February 2014 - Emboldened by our silence Russia moves to take Crimea 6 months later. We do not stay silent. March 2014 - Obama uses Crimea as a cover to impose crippling sanctions on Russia. It cuts their currency and GDP in half. November 2014 - Sony suffers a massive hack. Supposedly, by North Korea in retaliation over a Seth Rogan movie. It’s embarrassing but mostly inconsequential. North Korea denies involvement, no one believes them. I believe it’s a message from Russia. “We have the weapon and we know how to use it.” February 2015 – Kaspersky Labs, a Russian company, exposes to the world how deeply the NSA’s infiltration has gone. All hard drives have been shipped with an NSA backdoor preinstalled. http://www.businessinsider.com/r-russian-researchers-expose-breakthrough-us-spying-program-2015-2 Through 2015 Microsoft makes an oddly strong push to get us all to update to Windows 10. Even bootleggers can get a free upgrade. A disguised evacuation from the badly compromised XP, 7 and 8? Or pushing a new OS into the world to give the NSA a new playing field to regain an advantage on? I suspect Putin now reaches out to Robert Mercer, financier of data mining company Cambridge Analytica. He offers to make Mercer an American oligarch. Putin will provide the most advanced data gathering tools the NSA could create, Mercer will use them to collect data that lets his candidates target voters with uncanny accuracy and win elections. Kushner later raves about the complexity of their marketing system. https://www.forbes.com/sites/stevenbertoni/2017/05/26/jared-kushner-in-his-own-words-on-the-trump-data-operation-the-fbi-is-reportedly-probing/#619dd401a90f At the same time, Mercer will share that data with Putin who then uses botnets and other illegitimate means to influence the same voters, in the same direction, but without being visibly connected to the candidate. Later there will be controversy over a server in Trump Tower communicating with a Russian bank. I believe this is that sharing. http://www.cnn.com/2017/03/09/politics/fbi-investigation-continues-into-odd-computer-link-between-russian-bank-and-trump-organization/index.html In 2015 Cambridge Analytica first backs Ted Cruz. The most hated man in DC and a proven track record of bringing the system to a grinding halt. The obvious choice. But Trumps bombastic personality and Cruz’s lack of one threatens the plan. In December 2015 when a Quinnipiac poll shows Cruz in second place behind Trump, Cambridge Analytica promptly dumps Cruz and picks up Trump. Sometime later Trump paranoidly projects that the only way Hillary can win is by rigging the election. July 2016 - Trump wins the Republican nomination. August 2016 - A hacker group called The Shadow Brokers makes the news. I believe this is Putin finally flaunting to the world what he’s done. They tell us they’ve stolen a toolkit from The Equation Group, who have been suspected to be the NSA. The files in the toolkit are NSA but only as recent as 2013, a few months after Snowden’s departure. I suspect the file dates were altered just enough to give Snowden deniability. They release half of them to the public as proof. It’s bad, we’re warned that a lot of horrible malware will come from this for years to come. And now that the code is public, those attacks could plausibly come from anyone. The other half is kept encrypted, promised to be worse, and they comically struggle and fail to sell it on the black market. No one seems willing to touch it. November 2016 - Our election is hit by an unprecedented number of attacks. 5 per second 24 hours a day in Illinois. 150,000 total in South Carolina. 39 states altogether. Everyone who was anyone took Putin’s free gift and hit us with it. https://www.engadget.com/2017/07/17/south-carolina-150-000-election-day-hacking-attempts/ Trump wins the election. His first, maybe only job, is to lift the sanctions. Russia needs it done yesterday. Instead, Trump immediately gets into a fight with the media over the size of his inauguration crowd and makes a wild claim of 3 million illegal votes. I believe Cambridge Analytica using NSA tools, had the ability to analyze every American voter’s online habits and predict their vote. I believe they promised Trump a win over Hillary and gave him a very specific vote count. When Hillary wins the popular vote with 3 million more votes, Trump is paranoid that she must have added her own fake votes which threw his prophesized number. And maybe she did. But with no evidence that he can admit to the rest of us, Trump blames it on illegal immigrants and starts demanding voter information so that he can compare the numbers. This eats Trumps fragile ego alive. For eternity his legitimacy will be questioned in history books. Trumps attitude toward Russia sours. “You promised me a win and cost me the popular vote, our deal is void.” Trump does what he’s done to so many of the people he’s worked with before and decides he’s not going to pay his end of the deal. He busies himself putting Gorsuch on the SCOTUS, the beginnings of his wall and an immigration ban, ignoring Russia publicly and privately. The cold war warms up. January 23 – Trump appoints Ajit Pai to head the FCC. He is hell bent on reversing net neutrality laws, making it legal to throttle or block websites to citizens. Later, congress claims this was a direct order from Trump. Along with being able to predict how people will vote based on their browsing habits, they’ll now be able to directly influence those browsing habits. https://techcrunch.com/2017/08/06/10-members-of-congress-rake-fcc-over-the-coals-in-official-net-neutrality-comment/ February 9 – Jeff Sessions is made Attorney General to defend Trump from both an angry Russia and angry Congress. He’ll later recuse himself and Trump will state that if he had known that he wouldn’t have hired him in the first place. February 10 – Russia considers giving Snowden to US as a gift. https://www.cnbc.com/2017/02/10/russia-eyes-sending-snowden-to-us-as-gift-to-trump-official-tells-nbc-news.html February 13 – Trump seemingly is not interested. Michael Flynn’s Russian connections are “discovered” by the White House and he resigns. February 14 – Russia violates a cold war arms treaty and shows that it has been developing cruise missiles. “I can reach you.” It says to Trump. https://www.nytimes.com/2017/02/14/world/europe/russia-cruise-missile-arms-control-treaty.html February 14 – Congress starts to question their too-good-to-be-true win and a republican senator calls for an investigation into ties between Trump and Russia. Most squabble over healthcare. http://www.cnn.com/2017/02/14/politics/kfile-roy-blunt-flynn-investigation/index.html February 27 – Trump makes major cuts to agencies and dumps all $54 billion of it into defense spending. They’re going to need it. https://www.washingtonpost.com/powerpost/trump-to-propose-10-percent-spike-in-defense-spending-massive-cuts-to-other-agencies/2017/02/27/867f9690-fcf2-11e6-99b4-9e613afeb09f_story.html?utm_term=.ed55293971c8 February 28 – Amazon has a major failure and the East coast US suffers an internet outage. http://bgr.com/2017/02/28/internet-outage-amazon-web-services/ March 7 – North Korea finally gets its missiles to survive launch and sends 4 towards a US base in Japan. I suspect Russia has made them aware of the vulnerabilities that had been plaguing their program. The US deploys its own missiles in South Korea. https://www.nytimes.com/2017/03/07/world/asia/thaad-missile-defense-us-south-korea-china.html March 16 – Dan Coats, an anti-Russia senator is appointed by Trump as Director of National Intelligence, James Clappers old position. Kind of poetic really. A concept stolen from Russia, turned into a monster by Clapper, stolen back by Russia and used to remove Clapper, whose successor is now sent to kill it. March 23 – Senate Republicans vote to allow the sale of citizen’s private browser history. Making the kind of data collection and manipulation I suspect Cambridge Analytica of doing, now legal for future use. https://www.buzzfeed.com/hamzashaban/the-republican-controlled-senate-votes-to-strip-internet?utm_term=.duwxxZYeY5#.sygwwvZkZj March 30 – Michael Flynn offers to testify on Russia. April 4 – 4 days after Tillerson had told Assad he could stay in power, Assad appears to drop chemical weapons on his own people. Assad denies it. The receiving hospital is also hit with conventional weapons in an effort to kill surviving witnesses. I believe it was Russia embarrassing the US. April 7 – In response Trump hits a nearly empty airfield with 59 Tomahawk missiles. We’re told that it was retaliation against Syria and that Russia was warned beforehand and evacuated. I don’t believe they were. I believe Trump picked the most empty airfield shared by both Syria and Russia where damage would be minimal and bombed it without warning to either of them in an attempt to scare Russia. Russia condemns the strike and suspends air cooperation with the US. The airfield returns to operations the same day. April 8 - The Shadow Brokers post an open letter to Trump that begins *“Respectfully, what the fuck are you doing?” * and telling him to remember his base, remember who got him elected. Again, I believe this is Putin speaking directly to Trump. He hints at the dirt he either has or can plant on McCain and Lindsay Graham, if only Trump will ask. The things he hints at are extreme. It is at this point that I now suspect Putin has gained this kind of information on a vast majority of our government and business world. Even if the blackmail victims are willing to face the shame to alert us to what’s happening, they’re warned that if the operations is exposed, everyone’s secrets will be released. The country would suddenly need a special election for half of its government and half of its corporations would crumble. It would be chaos. Mutually assured destruction. All anyone caught by Putin can do, is furrow their brow and be deeply disturbed. In this same letter the Shadow Brokers ask Trump why he hasn’t yet filed charges against all powerful entities in the US. “Doing so, you could be seizing all their IT systems, freeze their financial assets, arrest key leadership.” This was a key step in Putin’s rise to power. I believe that even if Trump and Putin are having a couples squabble, Putin still needs Trump to remember this step. They release more of the NSA code as punishment. https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1 The emergency siren system in Dallas is set off. https://www.usatoday.com/story/news/2017/04/08/hacker-triggers-all-156-emergency-sirens-dallas/100212412/ April 12 – Tillerson is sent to Moscow to meet with Putin to discuss tensions “over the Syria strike”. They are unable to come to agreements. April 13 –Trump drops the Mother of All Bombs on Afghanistan for Russia to see. April 14 - The Shadow Brokers dump more NSA exploits. Included in this batch is EternalBlue, one of the most destructive exploits that’s been seen in years. April 14 – North Korea, whose missiles can now fly in a more or less straight line, threatens a preemptive strike on the US. The US threatens a strike back. Trump gets out of town and heads to Mar-a-Lago just in case. http://thehill.com/policy/international/328796-north-korean-official-warns-of-preemptive-strike-of-its-own http://www.nbcnews.com/news/world/u-s-may-launch-strike-if-north-korea-reaches-nuclear-n746366 http://www.cnn.com/2017/04/14/politics/donald-trump-north-korea-mar-a-lago/ April 15 – North Korea unveils an ICBM that can theoretically hit all of the United States. I believe that in exchange for stopping America’s sabotage of their nuclear program, NK is acting as Russia’s nuclear attack dog. He’s long wanted to be the one to do it. Now he’ll have Russian defense if he does. April 21 - The power grids in New York, LA and San Francisco fail, it’s blamed on mechanical failure. https://www.inverse.com/article/30635-everything-we-know-la-nyc-sf-power-outages May 9 – Comey is fired by Trump as he works on the Russian investigation. Trump justifies it by quoting and mocking Chuck Schumer with a tweet… *“Cryin' Chuck Schumer stated recently, "I do not have confidence in him (James Comey) any longer." Then acts so indignant.” * May 12 – The Wanna Cry ransomware scares the world. Built from the previously released EternalBlue exploit, it begins in Russia and races across the globe, locking computers and demanding a bitcoin ransom. It looks to be a catastrophic infection. Our hospitals are particularly crippled by it. The name mocks Trumps own words days before. May 13 – By dumb luck a kill switch is left in the Wanna Cry code and British security researcher Marcus Hutchins disables it by registering a $10 website domain. What should have been a ransom in the billions of dollars tops out at $130,000. https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html After the attack, Kaspersky Labs will identify North Korea as being the attacker. North Korea will deny it. Later, Kaspersky will be cut out of the defense budget and banned from US government computers. Later still, Kaspersky will file an antitrust lawsuit against Microsoft, claiming that Windows 10 removes Kaspersky software from users computers when they upgrade. https://www.cyberscoop.com/kaspersky-banned-us-dod-ndaa-russian-influence/ https://www.theverge.com/2017/6/6/15745164/kaspersky-antitrust-complaint-microsoft-european-commission May 27 – British airways has a massive system failure which they blame on outsource employee ineptitude. I suspect this is a warning to Theresa May in response to England preventing Wanna Cry. “Stay out of this.” http://www.mirror.co.uk/news/uk-news/british-airways-caused-bank-holiday-10520182 June 7 – Amazon goes down. https://www.theverge.com/2017/6/7/15759046/amazon-product-pages-down-outage-offline-503 June 19 – A cyber analyst finds an unsecured Amazon server owned by GOP voter targeting firm Deep Root Analytics with almost all American voters records and analytics that predict who they will vote for and why. This confirms my suspicions that Cambridge Analytica used the same method to influence the presidential election. I believe that since the March 23 legalization of the selling of citizens browser histories, the GOP has been building its own voter prediction software in order to win the 2018 elections without help from Russia’s stolen data. http://www.zdnet.com/article/security-lapse-exposes-198-million-united-states-voter-records/ June 19 – All major cellular carriers go down. http://www.cbsnews.com/news/cell-phone-internet-outages-reported-across-the-u-s/ June 19 – Microsoft Skype goes down. https://techcrunch.com/2017/06/20/skype-outage-causing-connectivity-issues-company-says-its-a-global-incident/ June 27 – The Petya ransomware, built on EternalBlue, the second iteration of Wanna Cry, hits the world but seems targeted at Ukraine. Paying the ransom in this case does not unlock the data, Petya is tailored for maximum damage. https://en.wikipedia.org/wiki/2017_cyberattacks_on_Ukraine June 30 – Microsoft Office 365 goes down. https://www.exoprise.com/2016/07/01/office-365-email-outage-june-2016/ July 3 – Chase bank goes down. https://www.washingtonpost.com/news/business/wp/2017/07/03/chase-bank-website-down-ahead-of-independence-day/?utm_term=.2135e79c6c8b July 3 – NASDAQ suffers an attack. http://www.wired.co.uk/article/nasdaq-hack-july July 4 – USS Hornet and much of Alameda California are hit by a power failure, 4th of July events are canceled. http://www.eastbaytimes.com/2017/07/04/alameda-power-outage-knocks-out-july-4-celebration-at-uss-hornet/ July 27 – HBO suffers the largest Hollywood hack in history. https://www.cnbc.com/2017/08/02/largest-hollywood-hack-in-history-may-have-compromised-hbo.html July 30 – East coast power grid goes down. https://www.nytimes.com/2017/07/30/us/outer-banks-evacuation-power.html Putin is livid. August 3 - Marcus Hutchins, the man who saved us from Wanna Cry, is arrested by Trumps new CIA director on unrelated charges while he is in the US for a conference. He now faces 40 years in prison. https://www.theguardian.com/technology/2017/aug/03/researcher-who-stopped-wannacry-ransomware-detained-in-us August 3 – Trump is finally forced to sign the Russian sanctions bill, making his position official. Putin will not be paid for services rendered. August 5 – Trump schedules a vacation to be out of Washington DC for much of the next month. http://www.cnn.com/2017/08/04/politics/donald-trump-vacation-obama/index.html I am nervous about August.
I had like 3 friends ask me how to build a PC in the past week so I made this to help them. Feel free to use or send me an e-mail if you want the txt file
(Reddit Edit: Help my improve the document with productive comments on what I got wrong or messed up! Im only human lol Also a lot of this is supposed to be kinda humorous. I didn't think I had to say that but, hey, its the internet. I appreciate the positive and productive comments! ) Beginners basic guide to building your own PC as of early 2018 (EDIT: Sorry for being a MSI/Corsair Fanboy) Heres a collection of thoughts to consider when building your own personal PC As always Id personally use PCPartPicker.com to configure your parts and for further thoughts on compatibility. First off building a computer is 100% based around what you plan to use the computer for.
Here are a few uses and generic ideas of what to go for. Audio Editing: Lots of small tasks that need to be completed quickly without lag. - Fast Processor( >4GHZ) - Fast RAM (MHZ) -At least 16 gigs! - Fast Storage, SSD manditorily - M.2 or PCI for best performance. - Shitty Graphics card, graphics card there only to keep the cpu from doing other tasks when working. - Can be a few generations or years old. - Many screens for lots of plug in windows to be open Video Editing: Lots of large to render and files to read. - Multi core processor the more the merrier - SSD for fast read/write of large video files. - Insane graphics card, AMD graphics cards are debatibly better but the nvidia Quadro series are specific for video rendering. Gaming: No more than 4 cores intense graphics card - 92% of games are not coded for more than 4 cores so why spend the extra money for it. - SSD for quick load screens - Nvidia cards, 10 series, the higher the number the better. Titan cards for MAXIMUM OVERDRIVE! Coding: quick processor for lots of small tasks. Ergonomic peripherials? - Dear god please dont use a mechanical keyboard so that your coworkers dont kill you. Home office: Everything can be a few gens behind so you can get the best power per dollar spent. - Sorry that Gateway doesnt exist anymore. I guess try Dell...
Parts (Expensive Legos)
CPU (tells things to go places and outputs data) Basically three main routes to go for: Intel, AMD, or ASIC. Intel - Gaming, Data center, Hackintosh Pros: Cooler, Faster speed (GHZ), short small tasks faster Cons: $$$$, less cores AMD - Gaming, Personal Computing, Large task processing Pros: Lots of cores, better price per performance, faster processing of large tasks Cons: Hot chips, large chips?, compatibility issues with MacOS. ASIC - "Application-specific integrated circuit" Pros: Does the task that they are made to do insanely efficently, great for mining. Cons: Literally does nothing else. Holy hell these are expensive, very hot (fans will get loud) CPU Cooler (Im a big fan) Most come with an in box cooler that are ok but please buy aftermarket. In Box - the free shitty cooler that comes with the processor. Pros: Free. Cons: Ugly, makes chip run hot, hard to clean Air cooler - oldest type of cooler but new designs are highly efficent. Pros: Only cooler that has the possibility of being 100% quiet, most likely cheaper Cons: large, if cooler isnt large enough for the chips thermal output the fans will be loud. Liquid - Custom pipes are beautiful, AIO is easy to install and offers similare performance. Pros: Looks cool, great temperatures, "quiet" Cons: Water pump has possibility of being loud, possible spills Phase Change - uses the technology of refridgerators to cool the chip Pros: Can overclock until the chip breaks. (whats colder than cold? ICE COLD!) Cons: Loud (compressor noise), Large pipes, just why.... Motherboard (the convienacnce store of computer parts) Really just about what type of I/O you want. - MAKE SURE FORM FACTOR FITS YOUR CASE! (or vice versa) - Look for PCI lanes for expansion. - How many graphic cards do you have? - PCI based interfaces? - PCI SSD? - PCI DAC? - PCI WIFI? - USbs? Network? Audio? - How many lanes of RAM? - DOES IT FIT YOUR PROCESSOR!?! (really tho) - M.2? - How many sata interaces? Good Brands: MSI, ASUS, Gigabyte Bad Brands: AS(s)Rock, Dell Memory (Dory) - The more the merrier - No less than 8gb for a functional windows machine (16 gb to never have a problem) - Use all the lanes your computer has to offer! the more lanes to access the faster the data can travel! -Imagine drinking a milkshake. If the straw is wider you can drink more of the milkshake than a skinny straw. - Faster MHZ for faster data access but give minimal performance differances - Please get ram with heat spreadders unles youre building a server with high airflow. - Make sure the type (DDR3 or DDR4) of RAM matches what your processomotherboard call for. Good Brands: Corsair, G.Skill, Ballistix Storage (Grandpa that remembers everythign about how things used to be but takes forever to learn a new tasK) Speed or massive storage? slower is cheaper. Golden ratio of speed/storage/price is 250-500 gb SSD and a 1+ tb disk drive. *Max speeds listed are for a single drive not RAID* Hard Disk Drives (HDD) - Cheapest and slowest - read/write speeds of < 0.5gb/s - 7200+ RPM or GTFO - Higher Speed drives can access data faster. - Do not move while powered up. physical parts will break. - Larger Cahche = faster Read/Write Speeds Pros: Cheap, Holds massive amounts of data Cons: Slower than molasses in a frezer Reputible Brands: Seagate, WD Solid State Drives (SSD) - necessity for quick boots and fast load screens (can only be re-written to so many times) - SATA based (2.5 inch)- Read/Write speeds capped @ 6 gb/s Pros: Most economical, form factor fits with old computers, Cons: "Slow" compared to other ssd's (but stil 12 times faster than a HDD) - M.2 based - Read/Write speeds capped @ 10 gb/s Pros: Size of a sick of gum! High End but not too expensive to be out of reach. Cons: Expensive for any size over 500 gb - PCI based - Read/Write speeds capped @ 20 gb/s for PCI3, x4 Pros: HOLY BANDWIDTH BATMAN! Faster than that little creepy ghost thats always in the corner of you eye Cons: You might have to take out a loan to buy one. *takes up a x4 PCI Lane* Reputible Brands: Samsung! Corsair, Plextor, Intel, Kingston, Crucial Video Card (that one kid that has thick glasses and is really good at math) - A regular old PCI card that handles all of the video rendering and output for your computer. - ASIC PCI cards. - The PCBs and chips are patented by two main companies but the differances come from line up and varying manufacturer cooling devices. - The more memory the better -NVIDIA (Team Green) Great for gaming, has specific card series for intensive rendering. Lazy driver updates. - Gaming - 900 series - Cheap - Low performance - Can play any video game made befrore 2010 on max settings - 1000 (ten) series - Expensive (thanks bitcoin miners...) - Great for VR! - Video Rendering -Quadro Series - Gaming and Rendering - Titan X - Maxwell based chip same as 900 series cards - Titan XP - Pascal based chip same as 10 series cards -AMD (Team Red) Underdog does the same thing but slighly worse and cheaper. (except video rendering) - Gaming - RX 400 series - Cheap - Hot - RX 500 series - Cheap - Ok at VR and deacent gaming frame rates. - Not bad but not particularly great either. - Video Rendering - Fire Pro series - Gaming and Rendering - Vega series -Good luck finding one to buy lmao Case (Fancy clothing for your parts!) - Similar to human clothing you want it to do a few main things really well with compromises for each extreme. - Durability - Steel - Incredibly durable - Creates Farady cage for components - Heavy af - Magnets, just magnets.... - Rust over time - Aluminium - Light - East to bend for modding or "physical maintenance" - Less likely to rust - Huzzah for Farady cages! - Plastic - Just dont - no electrical Ground - no faraday cage - Light AF! - Breath (Airflow) - positive internal airflow! - larger fans push the same amount of air with less speed/noise - Looks - Window? - RGB - Cool Paint? - Fit all your parts - graphics card length/ clearacne - support for liquid cooling raiators? - How many spots for HDD/SSDs - Motherboard format - Cable management! Power Supply (FIGHT MILK) - Rule of thumb: BUy Powersupply that outputs 1.5 times the wattage that you need. - You can walk further than you can you can run. - The PSU can casually output 50-75% power for much longer than at 90-100% (without failure) - If you never demand enough wattage for it to get hot the fan doesnt have to turn on therefore making it quieter. - Modular means you can remove/replace the cables from the PSU. Reputible Brands: Corsair, EVGA Optical Drive (motorized cup holder) - You can download most things today so I'd suggest against it unless you really NEED to watch/write DVD's/CD's Operating System (software that makes everything work) Windows (Always Updates) - Compatible with just about everything - Easy to learn to code on! - POS inital browser - Likely to get virus's Linux (Penguins are cute) - Unique - takes less resources to run - Barebones - Incredibly personalizable! - Compatibility issues with just about everything MacOS (Linux but more annoying) - It is legal! - Great for art and your grandma that doenst know how to use computers! - User friendly - Compatibility issues with various hardware - Confusing/Limiting coding structure Peripherials (cables everywhere!) - Keyboard (higer Polling rate is better) - Mechanical (key is pressed at an exact stroke length every time - Mouse (Higher Polling rate is better) - more buttons = better? - DPI (Dots Per Inch) - In theory, if a mouse has 1600 DPI, then, if you move your mouse one inch (2.54 cm), the mouse cursor will move 1600 pixels - Higher DPI the faster your cursor is able to be moved. - Monitor - In theory the human eye cant see faster than 60 frames per second. - Keep in mind Pixel ratio! - 4k screen that is 22inches will have more pixels in a square inch than a 4k screen that is 28 inches. - Interface? - DVI (Analog) - thumbscrews..... - can do two monitors with one port! - support for 4k - VGA (Analog) - thumbscrews... - max resolution is 1440p - Display Port (digital) - nice button clip - supports 4k - HDMI (Digital) - 1.2 or higer supports 4k - DAC/Speakers/Headphones - Dont even get me started - Microphone - Dont get me started PT.2 Other (other) - UPS (uninterruptible power supply) Just a battery that allows your computer to have some time if the power ever goes out so that you have time to save your work. - Cable Organization materials! - Zipties - velcro - LED LIGHTING! - Manditory - Extra/Better fans - More pressure, less woosh - IFIXIT Pro Tech Toolkit - becasue who buys just one torx wrench. - Cute kitten mousepad - Yes, it has to be a cat. Dont argue
This is a very general entry into building computers and what you should buy/look for. If you have any questions/comments send me an e-mail! -Zac Holley-
Moving towards user activated soft fork activation | shaolinfry | Feb 25 2017
shaolinfry on Feb 25 2017: Some thoughts about the activation mechanism for soft forks. In the past we used IsSuperMajority and currently use BIP9 as soft fork activation methods, where a supermajority of hashrate triggers nodes to begin enforcing new rules. Hashrate based activation is convenient because it is the simplest and most straightforward process. While convenient there are a number limitations with this method. Firstly, it requires trusting the hash power will validate after activation. The BIP66 soft fork was a case where 95% of the hashrate was signaling readiness but in reality about half was not actually validating the upgraded rules and mined upon an invalid block by mistake1. Secondly, miner signalling has a natural veto which allows a small percentage of hashrate to veto node activation of the upgrade for everyone. To date, soft forks have taken advantage of the relatively centralised mining landscape where there are relatively few mining pools building valid blocks; as we move towards more hashrate decentralization, it's likely that we will suffer more and more from "upgrade inertia" which will veto most upgrades. Upgrade inertia in inevitable for widely deployed software and can be seen for example, with Microsoft Windows. At the time of writing 5.72% of all Microsoft Windows installations are still running Windows XP, despite mainstream support ending in 2009 and being superseded by 4 software generations, Vista, 7, 8 and 10. Thirdly, the signaling methodology is widely misinterpreted to mean the hash power is voting on a proposal and it seems difficult to correct this misunderstanding in the wider community. The hash powers' role is to select valid transactions, and to extend the blockchain with valid blocks. Fully validating economic nodes ensure that blocks are valid. Nodes therefore define validity according to the software they run, but miners decide what already valid transactions gets included in the block chain. As such, soft forks rules are actually always enforced by the nodes, not the miners. Miners of course can opt-out by simply not including transactions that use the new soft fork feature, but they cannot produce blocks that are invalid to the soft fork. The P2SH soft fork is a good example of this, where non-upgraded miners would see P2SH as spendable without a signature and consider them valid. If such an transaction were to be included in a block, the block would be invalid and the miner would lose the block reward and fees. So-called "censorship" soft forks do not require nodes to opt in, because >51% of the hash power already have the ability to orphan blocks that contain transactions they have blacklisted. Since this is not a change in validity, nodes will accept the censored block chain automatically. The fourth problem with supermajority hash power signaling is it draws unnecessary attention to miners which can become unnecessarily political. Already misunderstood as a vote, miners may feel pressure to "make a decision" on behalf of the community: who is and isn't signalling becomes a huge public focus and may put pressures onto miners they are unprepared for. Some miners may not be in a position to upgrade, or may prefer not to participate in the soft fork which is their right. However, that miner may now become a lone reason that vetoes activation for everyone, where the soft fork is an opt-in feature! This situation seems to be against the voluntary nature of the Bitcoin system where participation at all levels is voluntary and kept honest by well balanced incentives. Since miners already have the protocol level right to select whatever transaction they prefer (and not mine those they don't), it would be better if a miner could chose to not participate in triggering activation of something they won't use, but, without being a veto to the process (and all the ire they may have to experience as a consequence). The alternative discussed here is "flag day activation" where nodes begin enforcement at a predetermined time in the future. This method needs a longer lead time than a hash power based activation trigger, but offers a number of advantages and perhaps provides a better tradeoff. Soft forks are still entirely optional to use post activation. For example, with P2SH, many participants in the Bitcoin ecosystem still do not use P2SH. Only 11% of bitcoins2 are stored in P2SH addresses at the time of writing. Miners are free to not mine P2SH transactions, however, the incentives are such that miners should still validate transactions so they don't accidentally include invalid transactions and cause their block to be rejected. As an additional safety measure for well designed soft forks, relay policy rules prevent non-standard and invalid transactions from being relayed and mined by default; a miner would have to purposefully mine an invalid transaction, which is against their own economic interest. Since the incentives of the Bitcoin system rely on self validation, economic nodes (miners and users) should always remain safe by ensuring their nodes either validate the current rules, or, they can place their network behind a full node that will filter out invalid transactions and blocks at the edge of their network (so called firewall or border nodes). A user activated soft fork is permissive. Miners do not have to produce new version blocks and non-upgraded miners' blocks will not be orphaned as was the case with IsSuperMajority soft forks (e.g. BIP34, BIP66, BIP65-CLTV) which made it a compulsory upgrade for miners. BIP9 "versionbits" soft fork activation method is also permissive in so far as non-upgraded miners are not forced to upgrade after activation because their blocks wont be orphaned. A recent case was the "CSV" soft fork that activated BIP68, BIP112 and BIP113. As such, the CSV soft fork allows non-upgraded miners to continue mining so long as they didn't produce invalid blocks. Miners always retain discretion on which transactions to mine. However, regardless of whether they actively include transactions using the new soft fork feature, or not, the incentive for hash power to upgrade in order to validate is strong: if they do not, they could be vulnerable to a rogue miner willing to waste 12.5BTC to create an invalid block, which may cause non-validating miners to build on an invalid chain similar to the BIP66 incident. Validation has always had a strong requirement. A user activated soft fork is win-win because it adds an option that some people want that does not detract from other peoples' enjoyment. Even if only 10% of users ever wanted a feature, so long as the benefit outweighed the technical risks, it would not be rational to deny others the ability to opt-in. My suggestion is to have the best of both worlds. Since a user activated soft fork needs a relatively long lead time before activation, we can combine with BIP9 to give the option of a faster hash power coordinated activation or activation by flag day, whichever is the sooner. In both cases, we can leverage the warning systems in BIP9. The change is relatively simple, adding an activation-time parameter which will transition the BIP9 state to LOCKED_IN before the end of the BIP9 deployment timeout. You can find the proposal here https://gist.github.com/shaolinfry/0f7d1fd22743bb966da0c0b1682ea2ab References: -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20170225/e6ed76b3/attachment-0001.html original: https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2017-February/013643.html
Year 1990 - Three years after Rickrolling , Capcom releases the game CARRIER AIR WING for CPS1 systems. A classical side-shotter with a nice plot and pretty straight-forward to play. pew pew pew
Year 2015 - A Quarter Century after.. the G.O.A.T. contest start! You must beat your friends earning more score and show your feline reflexes at retrogames.
Introduction
As someone could imagine, we need an emulator for play this game (maybe you are lucky enough to be the owner of the real machine.. but nah.. chances are 0,1%). So let's talk a bit of techie details. There are many emulators that would run nicely the game. These emulators needs a ROM file (An exact copy of the data stored in the original hardware cards inside the arcade machine). Of course, you will need a computer to run the emulator. In this point, We will tell you that your computer needs very few requirements for run the emulator, so don´t be afraid of your machine's specs. I'll recomend you to use this emulator: Kawaks Kawaks is a software designed for Microsoft Windows that would run seamlessly on a wide variety of environments, spanning across all operating system versions since XP. It's higly customizable, but pretty straightforward to get things run. There are others emulators, like Callus, but Kawaks would work better with your graphic card (whatever it be) and the screenshot feature is easier than Callus. We will need to take screenshots, with whatever emulator you use, because this is the way to post your score, right? This point will be discussed later. The second component, is the rom. This file contains the whole game. You don´t need to open or decompress this file, it's ok as is, so you only need to download to a folder on your computer.
First Step
You need to download the emulator and the rom. For emulator, go to winkawaks website. Under "downloads" option at the right column, you can download a zip package called WinKawaks.zip 1.63. For the contest, is enought to extract the executable file called winkawaks.exe to a folder. For rom, you must search using google or similar to a file called cawing.zip (1.4mb). Romnation is a website that offers rom files for direct download. NOTE: Downloading this type of files could be a Copyright Infringement and I am not responsible whatever damage you could do to your system if you download this type of file. If you are not sure what are you doing, please, do not try to complete this guide.
Second Step
After downloading the Rom file put winkawaks.exe and rom file to a folder on your hard drive (we will need this folder ahead, so keep in mind this detail). This is a pretty straightforward process. ATTENTION: Keep the rom zip file as is, decompressing is not needed. After that, you must execute this: WinKawaks.exe This is a portable version of the emulator, so you will not need to install anything on your computer.
Third Step
Ok, I feel your excitement, so double click!. The emulator will show you a message about auto-configure the optimal graphics options. After that, you are in the main screen with the SNK and CAPCOM logo. Let´s do a quick tweak, head your pointer to File Menu, and then: Configure Paths. We will see a bunch of paths, but we are looking specifically at two under labels: ROMS2 and SCREENSHOTS. Clicking on browser buttons will bring you an explorer and you will choose this: ROMS2: Find the directory where you uncompressed the whole thing on Second Step. SCREENSHOTS: Choose your directory where the snapshots will be saved for further use. THIS IS IMPORTANT Because the contest relies on your ability to post those screenshots. We have time restraints, lets play! DAMN!. Point on File Menu -> Load Game. A gorgeus windows open in your eyes with a great lists of fine game for mature adults, but dont feel too excited, we only have one, CARRIER AIR WING, remember?, so let´s do some filtering setting the bulleted options to: Only available and then: Refresh. Does you see the game title? Yes? C'MON Put your speakers to 200% volume and double click! YaY! CONTROLS SO FAR:
Arrows for stay alive with your aircraf.
A for shot small bullets.
S for use big'ole massive destruction weapons.
F3 for insert coin (Mmm, quick advice: You will NOT want to clog the "machine" with your bitcoins, because this will becomes a small issue as we explain later, but go ahead if you want, we don´t want to cut your teenager wings)
F1 to play!!!
I will not explain you how to play, it's self explanable after 20 seconds.. choose your plane and pew pew pew.. And thats all! Nice? yes!
The contest
Ok, After finish the setup and play the game, let's talk about the contest. This will run a whole week starting at XXX and finishing at XXX Every time you die, you will be asked for your initials, and you will see the top chart. In this moment, TAKE A SCREENSHOT WITH THIS KEYS: CTRL + P (Only for Kawaks). This will spawn a PNG file on the directory set on Third Step under the label SCREENSHOTS. This is your entry to the contest. You must send a link to the PNG file (by imgur i.e.) to me and I'll collect all. Win the player with highest score. Resume:
Duration : From 05/10/2015-00:01 To 05/17/2015-23:59
Prize: Highest score will win the right to wear a specially crafted flair priviledge (to be revealed very soon!) until the next comp! Winner will be anounced on 05/18/2015.
Additional Info: You can use whatever emulator of your choice, maybe you'd prefeer callus, or mame.. or play with a modded Xbox.. but I don´t know how to get screenshots on those ways. Additionally, we could accept any format that you are capable of snap the score chart. So set your smartphone ready, right? If you use CALLUS, take in mind that you need to lower your screen deep colour to 16 bits and you will be able to take a screenshot with Windows: PRNT SCREEN key.. Callus is easy, but this is a pain! What if the score chart hides after 2 or 3 seconds? Wait until the intro. The machine will show you the current chart. (Did you remember the alert about clogging the machine with coins? This is because the machine will not show the chart if coins inserted, so you must expend all the coins prior to see the chart again). Can I use my USB pad! well, some pads works, some not..you could try it under the Game menu, Redefine Keys.. and try it. NOTE TO CHEATTERS: Due to the nature of emulators is more than easy to make cheats in game, like spawn more lives, slow down the pace, etc.. So we strongly encourage our participants to not do any cheat. We don´t cheat! right?. Well, in this point I want to say that there are better systems to play due to keyboards, gamepads. We cannont warrant a perfect balance between contestants, so please, don´t take things too serious, NefariousOaf will win, isnt?. Oh, it's possible to "continue" the game using the 2nd player slot, but this will be considered as cheat!, so only one live! Using USB pads will not be considered cheat. Keys works flawlessly, but due to the wide spectrum of hardware available, maybe your keyboard will not work nice, so feel free to ask and I'll try to find a solution, alternative keys, etc.. CONCLUSION: At last! Feel absolutely free to ask me any details involving your set-up, mechanics, whatever.. Special Thanks to jpier for his help! he's a good man. UPDATE at 05/10/2015 Update First Step: Removing direct link download due to copyright concerns. Update Second Step with new details about ROM and Emulator and the way it works. Update Date Format to dd/mm/yyyy to mm/dd/yyyy on Post's dates. Pew pew pew..boom!
Bitcoin Core 0.14.1 released | Wladimir J. van der Laan | Apr 22 2017
Wladimir J. van der Laan on Apr 22 2017: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Bitcoin Core version 0.14.1 is now available from: https://bitcoin.org/bin/bitcoin-core-0.14.1/ Or, by torrent: magnet:?xt=urn:btih:0482be8fc8e1c0b02162871e3591efc3d1d34585&dn;=bitcoin-core-0.14.1&tr;=udp%3A%2F%2Fpublic.popcorn-tracker.org%3A6969%2Fannounce&tr;=http%3A%2F%2Fatrack.pow7.com%2Fannounce&tr;=http%3A%2F%2Fbt.henbt.com%3A2710%2Fannounce&tr;=http%3A%2F%2Fmgtracker.org%3A6969%2Fannounce&tr;=http%3A%2F%2Fopen.touki.ru%2Fannounce.php&tr;=http%3A%2F%2Fp4p.arenabg.ch%3A1337%2Fannounce&tr;=http%3A%2F%2Fpow7.com%3A80%2Fannounce&tr;=http%3A%2F%2Ftracker.dutchtracking.nl%3A80%2Fannounce This is a new minor version release, including various bugfixes and performance improvements, as well as updated translations. Please report bugs using the issue tracker at github: https://github.com/bitcoin/bitcoin/issues To receive security and update notifications, please subscribe to: https://bitcoincore.org/en/list/announcements/join/ Compatibility Bitcoin Core is extensively tested on multiple operating systems using the Linux kernel, macOS 10.8+, and Windows Vista and later. Microsoft ended support for Windows XP on April 8th, 2014, No attempt is made to prevent installing or running the software on Windows XP, you can still do so at your own risk but be aware that there are known instabilities and issues. Please do not report issues about Windows XP to the issue tracker. Bitcoin Core should also work on most other Unix-like systems but is not frequently tested on them. Notable changes RPC changes
The first positional argument of createrawtransaction was renamed from
transactions to inputs.
The argument of disconnectnode was renamed from node to address.
These interface changes break compatibility with 0.14.0, when the named arguments functionality, introduced in 0.14.0, is used. Client software using these calls with named arguments needs to be updated. Mining In previous versions, getblocktemplate required segwit support from downstream clients/miners once the feature activated on the network. In this version, it now supports non-segwit clients even after activation, by removing all segwit transactions from the returned block template. This allows non-segwit miners to continue functioning correctly even after segwit has activated. Due to the limitations in previous versions, getblocktemplate also recommended non-segwit clients to not signal for the segwit version-bit. Since this is no longer an issue, getblocktemplate now always recommends signalling segwit for all miners. This is safe because ability to enforce the rule is the only required criteria for safe activation, not actually producing segwit-enabled blocks. UTXO memory accounting Memory usage for the UTXO cache is being calculated more accurately, so that the configured limit (-dbcache) will be respected when memory usage peaks during cache flushes. The memory accounting in prior releases is estimated to only account for half the actual peak utilization. The default -dbcache has also been changed in this release to 450MiB. Users who currently set -dbcache to a high value (e.g. to keep the UTXO more fully cached in memory) should consider increasing this setting in order to achieve the same cache performance as prior releases. Users on low-memory systems (such as systems with 1GB or less) should consider specifying a lower value for this parameter. Additional information relating to running on low-memory systems can be found here: reducing-bitcoind-memory-usage.md. 0.14.1 Change log Detailed release notes follow. This overview includes changes that affect behavior, not code moves, refactors and string updates. For convenience in locating the code changes and accompanying discussion, both the pull request and git merge commit are mentioned.
RPC and other APIs
#10084 142fbb2 Rename first named arg of createrawtransaction (MarcoFalke)
#10139 f15268d Remove auth cookie on shutdown (practicalswift)
#10146 2fea10a Better error handling for submitblock (rawodb, gmaxwell)
You need to pick your focus area. What do you want to do? Penetration testing? Encryption? Malware analysis? Forensics? Underground intelligence? Counter-espionage? Then you need to find mentors and coaches. The easiest way to do this is via online forums dedicated to your focus area. For example, check forum.infosecmentors.com.
SANS has some great online resources for people starting up in this area: check them out.
Good malware analysts will always get a job. And malware isn't going to go away any time soon.
It's not just security companies who are hiring people in this field. Many large companies and telcos have their own CERT teams which hire malware analysts.
It's trivial to modify existing malware so that traditional antivirus programs won't detect it any more. It only takes couple of minutes.
That's why antivirus programs have been moving towards behaviour-based detection models as well as towards reputation-based detection models.
Do note that testing behaviour-based blocking is hard. That's why it's misleading when people post links to sites such as Virustotal as evidence that particular file is 'not detected by AVs'. There's no way to know if a particular antivirus would have blocked the file, unless you would try to run it.
"As far as we can see, this program has never been executed by anyone else anywhere. You are the first person on the planet to run this file. This is highly unusual. We will block this file, even though we can't find any known malware from the file"
The only problem with this scenario are software developers, who compile their own programs. They obviously are the first persons on the planet to run a particular program - as they made it themselves! They can easily whitelist their output folder to avoid this problem though.
People use Tor for surfing the normal web anonymized, and they use Tor Hidden Service for running websites that are only accessible for Tor users.
Both Tor use cases can be targeted by various kinds of attacks. Just like anywhere else, there is no absolute security in Tor either.
I guess the takedown showed more about capabilities of current law enforcement than anything else.
I use Tor regularily to gain access to sites in the Tor Hidden Service, but for proteting my own privacy, I don't rely on Tor. I use VPNs instead. In addition to providing you an exit node from another location, VPNs also encrypt your traffic. However, Tor is free and it's open source. Most VPNs are closed source, and you have to pay for them. And you have to rely on the VPN provider, so choose carefully. We have a VPN product of our own, which is what I use.
Use a VPN provider you trust. Someone who's been in the security business for a long while. Also, aim for a vendor who doesn't store logs of user activity.
The operating systems on our current phones (and tablets) are clearly more secure than the operating systems on our computers. That's mostly because they are much more restricted.
Windows Phones and iOS devices don't have a real malware problem (they still have to worry about things like phishing though). Android is the only smartphone platform that has real-world malware for it (but most of that is found in China and is coming from 3rd party app stores).
It is interesting the Android is the first Linux distribution to have a real-world malware problem.
Companies like Google and Facebook make money by trying to gather as much information about you as they can. But Google and Facebook are not criminals and they are not breaking the law.
There are different problems: problems with security and problems with privacy. Security problems come from criminals who do break the law and who directly try to steal from you with attacks like banking trojans or credit card keyloggers. Blanket surveillance of the internet also affects us all. But comparing these threats to each other is hard.
No, that's not how you break into a system in the real world.
Another timely rebuttal of movie hacking, speaking about the ads for the upcoming Black Hat movie: Link to carbon-dynamics.squarespace.com - this one is written by Dan Tentler.
The idea of a 'good virus' has been discussed to death already years ago. The consensus is that anything good that could be done with self-replicating code could be done better without the replication.
Most mobile malware IS written for Linux, since most smartphones run Linux.
So first and foremost, it's a question of market shares.
After that it's a question of attacker skillsets. If the attackers have been writing Windows malware since Windows XP, they aren't likely to stop and switch easily to OS X or Linux unless they have to. And they don't have to.
Nobody was withholding detection. Everybody detected all Regin-related files they had, and protected the end users. Which one would you rather have us to do? Sign an NDA, get the samples and protect our users? Or not sign the NDA and not protect our users.
Some people will always say this. But they are always the people who haven't really thought it through.
If you have nothing to hide, you can't keep a secret. If you have nothing to hide, show me your search history. If you have nothing to hide, give me your password. If you have nothing to hide, I can't trust you.
Windows mining monitoring and remote management of your AMD and NVIDIA rigs. ... -16GB GTX 1050 GTX 1050Ti GTX 1060 GTX 1070 GTX 1070Ti GTX 1080 GTX 1080Ti RTX 2060 RTX 2070 RTX 2080 RTX 2080Ti GTX 1660Ti Titan XP Titan V P106-100 P106-90 P104-100 P102-100 Titan X Titan RTX RTX 3080 RTX 3090 RTX 3070 GTX ... Get the answers to the frequently ... This is because all Bitcoin mining software will ask you for a Bitcoin address that will be used to send your mining rewards and payouts. Once you create or download a wallet you will be able to get a Bitcoin address from your wallet. ... Best Mining Software For Windows. Braiins OS is part of Satoshi Labs and is the creation of the original ... cpuminer is a multi-threaded, highly optimized CPU miner for Litecoin, Bitcoin, and other cryptocurrencies. Currently supported algorithms are SHA-256d and scrypt(N, 1, 1). It supports the getblocktemplate mining protocol as well as the Stratum mining protocol, and can be used for both solo and pooled mining. Let your computer earn you money with Bitcoin Miner, the free easy-to-use Bitcoin miner. Earn Bitcoin which can be exchanged for real-world currency. Works great at home, work, or on the go. Windows Operating System : Bitcoin Mining Software. Bitcoin Miner. This miner is available on both Windows 8.1 and Windows 10. The software interface is user-friendly, it supports pool mining, there's a mode for power saving and very fast in share submission. The most powerful feature on this Bitcoin mining software is the profit reports.
Noob's Guide To Bitcoin Mining ... UFD Tech 2,254,267 views. 11:37. How to configure a Shared Network Printer in Windows 7 ... How to Lock Folder without using any software Windows 10, 8.1, 8, 7 ... Software Windows 10 Pro 64-bit ... since Titan Xp's are still the fastest non-workstation cards on the planet we decided to move them over to the new machine and demote William to pleb GeForce 970 ... Hola Les traigo En esta Ocasión les traigo un tutorial de como utilizar el Flash Tool de Mediateck esto les va a servir para actualizar la ROM de equipos o R... Jetmining Free Bitcoin Mining Site november 2018 - free bitcoin mining pool Jet Mining bitcoin mining - earn bitcoin for free Join Here: https://goo.gl/jwcsKL Please Like and Subscribe Double your ... One More Thing is de grootste Apple community in de Benelux. De website bestaat uit een redactionele nieuwspagina en een community met meer dan geregistreerd...