Can Bitcoin Survive Quantum Computers? Crypto Briefing

MegaTrend

[link]

An Addition To The Bitcoin Wiki Page On Quantum Computing And Mosca’s Theorem Of Risk Determination Applied To Blockchain.

An Addition To The Bitcoin Wiki Page On Quantum Computing And Mosca’s Theorem Of Risk Determination Applied To Blockchain. submitted by QRCollector to CryptoCurrency [link] [comments]

An Addition To The Bitcoin Wiki Page On Quantum Computing And Mosca’s Theorem Of Risk Determination Applied To Blockchain.

An Addition To The Bitcoin Wiki Page On Quantum Computing And Mosca’s Theorem Of Risk Determination Applied To Blockchain. submitted by QRCollector to QRL [link] [comments]

Explain the math behind cracking a public key. Is it really safe?

The reason I ask the question is because I was reading about the new google super computer and quantum computers. I know they say 2 to power of 256 is huge but that is using basic technology? The number is basically around:
1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 is this really that safe? How long would it take a standard laptop to figure this out and based on how many equations per second?
If quantum computers are used this could be possible and make crypto crash right?
submitted by satnakia to BitcoinBeginners [link] [comments]

The Hype Over Quantum Computers, Explained

The Hype Over Quantum Computers, Explained submitted by bitsteiner to Bitcoin [link] [comments]

Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.

Flatten the Curve. Part 48. Source Here
It's getting crazier day by day now, so are you following the Boy Scout motto?
On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”
Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it.
But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.
'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.
Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.
The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here
Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you.
Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
PACOM? Why isn't that command group responsible for the South China Sea?
Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.
Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Nah. I'm just fear mongering and Doomscrolling again.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]

Just wondering- how will drug dealers and narcos launder money in the upcoming cashless society!? 🧐🤨

submitted by Mynewnorth to conspiracy [link] [comments]

What'll be the impact of quantum computers on bitcoin mining?

submitted by officialnyabuto to Bitcoin [link] [comments]

How to escape the failing banking system that is enslaving us all...

Bitcoin,
Please take time to learn about Bitcoin, it will have a major impact on our society. Feel free to ask questions!
submitted by Sailmountainer to conspiracy [link] [comments]

Implement Quantum Blockchain Election Voting System in the Philippines

Democratic Approach
We the citizens of this country want a better election voting system and now is the time to shout this voice. I hereby asked the people of the Republic of the Philippines to imply a fair voting system using a new hybrid technology called a quantum blockchain. Blockchain offers a clean and transparent mobile voting process that can be done online for the people to save time and effort in a long pileup of crowds. But this has a downside so we decided to breed it with the future technology called Quantum.

Fairness and Justice
We the concerned entity that resides in this country want justice we heard the wailing and cries of the oppressed. Enough is enough for the corrupt local rulers of this old world and its OLD system. Time to innovate and expand knowledge don't be afraid of the changes. This day we the watchers want to help humanity build a better society a place where peace is well placed. We will build a new Earth with a NEW order for our brethren and for the sake of humanity.

Hybrid Technology Proposal "Quantum Blockchain or QB"
The future will be in your hand's humans not with the corrupt leaders. The change will happen if you unite for one goal. As we leap forward we see that future technology is the solution to this kind of problem. Implementing it within our domain will greatly lessen the aftereffect of a butterfly's wing. Vulnerabilities are a common problem thus stopping us from a digital voting process but what if we combined this with quantum technology? We can now avoid the corruption from malware and everything harmful from a classical computer breach. This can hence save our democracy from hackers and security anomaly.

Conclusion
People should decide for their country, not blind leaders that sit and wait for a change for change start with the hands of their citizens.

Blockchain FAIR Reference:
https://en.wikipedia.org/wiki/Blockchain
https://www.thebalance.com/how-the-blockchain-will-change-how-we-vote-4012008
https://www.computerworld.com/article/3430697/why-blockchain-could-be-a-threat-to-democracy.html
https://www.cbinsights.com/research/report/blockchain-election-security/
https://skemman.is/bitstream/1946/31161/1/Research-Paper-BBEVS.pdf
https://www.zdnet.com/article/blockchain-elections-how-bitcoin-technology-could-secure-your-vote-and-save-democracy/
https://www.cnet.com/news/blockchain-isnt-answer-to-voting-system-woes/



Quantum FAIR Reference:
https://en.wikipedia.org/wiki/Quantum
https://news.bitcoin.com/what-googles-quantum-breakthrough-means-for-blockchain-cryptography/
https://techcrunch.com/2018/04/24/meet-the-quantum-blockchain-works-like-a-time-machine/



Hybrid QB FAIR Reference:
https://hackernoon.com/quantum-computing-and-blockchain-facts-and-myths-l71w28d2
https://www.forbes.com/sites/darrynpollock/2019/09/24/googles-quantum-computing-breakthrough-brings-blockchain-resistance-into-the-spotlight-again/#4bda7a874504
https://arxiv.org/abs/1804.05979
submitted by QNBAI to quantumstarter [link] [comments]

Google and NASA have reached quantum supremacy in a year collaboration. What does it mean for future blockchain security?

As can be read in this article. Although quantum supremacy simply means that at least 1 specific problem has been proven to be solved by a quantum computer that can't be solved (in a realistic timeframe) by any existing classical computer, it is a very important milestone. Many have been skeptical on crossing this milestone at all.
Supremacy does not mean that current cryptography is at risk tomorrow. It does however prove quantum computing is real, and has advantage over classical computers in certain tasks as has always been thought. For blockchain this means that in the future, Shor's algorithm could be used to break ECDSA, the signature scheme that is used in most blockchain. This signature scheme can be upgraded to a quantum resistant signature scheme. It does come with specific challenges though. As opposed to banks, websites, government systems, email services etc, blockchain is decentralized. That makes the following challenges exclusive blockchain challenges:
Consider the full analysis on this subject here
Blockchains that implement quantum resistance from the very beginning, from genesis block, will not face these challenges. See for example QRL which has launched over a year ago.
submitted by QRCollector to CryptoCurrency [link] [comments]

05-24 00:54 - 'Topic: [Quantum computing] Reason: [SHA-256 encryption breaking]' (self.Bitcoin) by /u/Xyopsi removed from /r/Bitcoin within 42-52min

'''
After the years of successful advancements of quantum computing, I have been worrying about Bitcoin and it's future. I've done research about quantum computing and it's capabilities and it's not looking too good for our beloved cryptocurrency because it might have a security flaw. With quantum computing the SHA-256 (that secures Bitcoin) algorithm can be broken later in the future with the advancements with quantum computing. I'm not saying it's going to happen tomorrow but there is a chance that cryptography protocols are going to have to change to ensure the integrity of bitcoin and it's future. This is hypothetical though, not to fear monger or troll but this needs to be a discussion on which people can share opinions about this topic and come up solutions to prevent keys to be solved by in which the government or tech companies like Google, Amazon, etc can crack. I feel that this is important to discuss about and I care about the future of bitcoin and other cryptocurrencies and it's contributers and holders.
Sources used: [link]1
[link]2
[link]3
[link]4
[link]5
Edit: Thanks u/jenny82ishere for fact checking me. The SHA-256 algorithm is not encryption.
'''
Topic: [Quantum computing] Reason: [SHA-256 encryption breaking]
Go1dfish undelete link
unreddit undelete link
Author: Xyopsi
1: b*oc**hainhub.net/bl**/*lo*/cryptogra*hy-**ockc**in-b*tc**n/ 2: www.sci***edai*y.com/news/*a**er*energy/qu*ntum_co****i*g/ 3: www.*oogle.**m/a*p/s/ww*.science*ews.org/ar**cl*/n**-***nt****om*u*ers-can-*pe*ate**ig**r-temperatures/amp 4: en.m.wik*ped**.or*/wiki/**A-* 5: en.bitco*n**t*wi*i/Wall*t_en*ryp*io*
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

1234

[ 🎶 Thinking Cap ] This post is framed around results of cypher-based queries for the number 1234 against my custom lexicon files built up over a year of phrase inputs (mostly gleaned from newspaper headlines and their 'quoted phrases', or stream of conciousness inspired by them). There are not very many, but the few there are appear to be instructive. I have used some repetition to aid those with trouble remembering numbers. Perhaps NSFW. (For the confused: see here, here and here)
If you are brand new to this collection of scrolls, I recommend reading (as much as you can of) this before returning here, which will help to justify my particular focus below (the belt).
Did you gnow A=1?
There are 26 letters in the English-Latin Alphabet.
The basic alphabetic gematria code acknowledges that A=1, B=2, C=3, ..., Z=26 (ie. ordinal gematria).
In this basic alphabetic cypher (which is implied if I do not specify):
If you flip the numeric ordering about (ie. look in the mirror: treat 'Z' as 1, down to 'A' as 26), then...
This ("The ABC") is the name of the earliest alphabet primer textbooks for kids.
The first church primers paralleled the introduction of school textbooks known as “the ABC”
The Alphabet is a vessel for messages:
If, instead of the basic alphabetic ordinal cyphers above, we use another cypher some call Agrippa's Key, and some call the 'jewish cipher', which is based on the ancient Hebrew and Greek gematria charts, and maps that scheme to the Latin Alphabet, we can ask a catch-phrase question (written more formally than usual)
What's in a name?
Indeed:
Here we move beyond the three steps of ABC and arrive at the Door of Dalet. Behind it, if we have the write keys, we might discover...
The results of...
Itself the result of...
... of the Masters of the Ages.
Or not.
Many folks shun numbers:
  • "Obnoxious" = 1234 trigonal
  • ... ("number" = 73 = "crazy" ... but "perfect" = "count" = 73)
  • "The Great Learning" = 1234 trigonal
  • ... "Great Knowledge" = 1234 jewish-latin-agrippa
  • ... ( "Great Knowledge" = 449 primes (*) )
  • ... ( .. ... "Mental Contact" = 449 primes )
  • ... ( .. .. "Population" = 449 primes )
  • "Silence is Golden" = 449 primes (ie. Hush in the Library)
  • "Great Knowledge" = 1234 jewish-latin-agrippa
  • ... "Forbidden Word" = 1234 jewish-latin-agrippa
  • ... .. .. ( "Silence is Golden" = 449 primes )
  • "My Call of Duty" = 1234 jewish-latin-agrippa
  • ... "Great Knowledge" = 1234 jewish-latin-agrippa
  • .. ... .. "What is in a name?" = 1234 jewish-latin-agrippa
  • "Silent Warrior" = 1234 english-extended
  • ... ( "Rain" = 322 trigonal ) ( "Number" = 73 alphabetic; "Jake" = "Bard" = 73 primes )
  • ... ( .. "Counting" = 322 trigonal ) ( "Count" = 73 = "Perfect" = "Number" )
  • ... ( .. "To Know" = 322 trigonal ) ( "The Mind" = 73 = "Count" = "Number" )
  • ... ( .. "The Proof" = 322 trigonal )
  • ... ( .. .. "Final Proof" = 322 jewish-latin-agrippa )
Genesis 3:22 (KJV Bible)
And the Lord God said, Behold, the man is become as one of us, to know good and evil: and now, lest he put forth his hand, and take also of the tree of life, and eat, and live for ever:
  • "To Know" = 322 primes
  • "A Magic Number" = 322 primes
  • .. .. ... "Magician" = 322 trigonal
Make it ...
  • "Rain" = 322 trigonal
... for the ...
  • "Girl" = 322 trigonal
Thor and Jane meet again: https://www.youtube.com/watch?v=E0HzpZAgAwY
  • "Full Name" = 322 jewish-latin-agrippa (ie. Count it! ... but you are fool to reveal it)
  • ... .. .. ( "What is in a name?" = 1234 jewish-latin-agrippa )
  • .. .. ... ( ... https://forgottenrealms.fandom.com/wiki/True_name )
  • . .. ... "Counting" = 322 primes
  • ... .. "Count" = 393 jewish-latin-agrippa
  • .. . "Accurate" = 393 primes
  • . "Accountancy" = 393 primes
  • "Counting" = 322 primes
  • "Full Name" = 322 jewish-latin-agrippa
  • ... ( "A Magic Number" = 322 primes )
  • "What is in a name?" = 1234 jewish-latin-agrippa
  • ... "Great Knowledge" = 1234 jewish-latin-agrippa
  • ... .. .. "The Spells of Eden" = 1234 trigonal
The Fruit of the Tree of Knowledge...
  • "Great Knowledge" = 449 primes
  • "Sex Education" = 449 primes
  • ... ( building "Population" = 449 primes )
...And they knew they were naked (ie. eyes opened):
  • "Shame On You" = 1234 trigonal
  • ... "The First Day" = 1234 trigonal
  • ... .. .. "The Spells of Eden" = 1234 trigonal
  • "Sex Education" = 1337 english-extended (ie. Elite codes)
  • "The Spells of Eden" = 1234 trigonal
  • ... "Great Knowledge" = 1234 jewish-latin-agrippa
  • ... .. .. "The Great Learning" = 1234 trigonal
  • .. .. ... "A Great Work" = 1234 jewish-latin-agrippa
  • ... "Speak Loud and Clear" = 1234 trigonal
  • ... .. "Water out!" = 1234 trigonal (ie. 'The Number' ~= 'Pregnant' ~= 'A Baby')
  • ... .. .. "The Spells of Eden" = 1234 trigonal (ie. spell-casting -> spillage -> spoil it)
Serpents, and Tower of Babylon:
  • "What is in a name?" = 1234 jewish-latin-agrippa
  • ... "The Unpatchable Code" = 1234 trigonal (DNA code; written language, (relatively) hard to change)
  • ... .. .. "The Spells of Eden" = 1234 trigonal
  • .. .. ... "The One Source" = 1234 trigonal
  • .. .. ... .. "The Duration of One Year" = 1234 jewish-latin-agripa
  • ... .. .. ... .. "The Source" = 365 primes (ie. days in a year, solar orbit)
ie. Matrix Code - Mother Code Pregnancy Procedure and Cascading Responsibility.
  • "My little Pony" = 1234 jewish-latin-agrippa
If you're lucky:
  • "Birth of Twins" = 1234 english-extended
ie. quantum-entanglement: you cannot give birth to your first alphabetic Son, a strong boy named Aleph, and deny he is '1'. You cannot have your second child, a beautiful maiden, Beth, and deny she is '2'.
Animals on the ark 2 by 2. You cannot order the alphabet, and deny the letters have ordinal indexes (ie. numbers associated with them - significant others)
  • "Boat" = 123 primes
To travel down...
  • "Denial" = 123 primes ...is as easy as ABC.
Again, many folks shun numbers:
Obstetrics is the field of study concentrated on pregnancy, childbirth, and the postpartum period. As a medical specialty, obstetrics is combined with gynaecology under the discipline known as obstetrics and gynecology (OB/GYN) which is a surgical field.
  • "Obnoxious" = 1234 trigonal
  • ... "The Number" = 333 primes
  • ... "Unspeakable" = 333 primes
  • ... "The Unspeakable Number" = 666 primes
  • .
  • "Counting" = 322 primes
  • "Magician" = 322 trigonal
  • ... "Magician" = 156 primes
  • ... "Apple" = 156 primes
  • ... ( the 156th prime number is 911 )
  • ... ( ... "Divine Feminine" = 911 jewish-latin-agrippa )
  • ... ( ... "She is a Beauty" = 911 jewish-latin-agrippa )
  • ... ( ... "Sexy Girl" = 911 jewish-latin-agrippa )
  • ... ( "The Last Proof of Life After Death" = 911 primes )
I have a spell-matching feature that can cross-match multiple cypher results and return the 'closest frequency matches' of all the spells I've ever entered into my gematria tools. At the time of writing the lexicon file is half a megabyte in size (plain text) and contains 37,694 words and phrases.
When I ask for the spellings that most closely match: "live forever", I get the following three results as top matches:
  • 'white liquid', 'into the girl', and 'the dilution' (with 8+ cypher matches)
There are a lot of flowery symbolic or metaphorical phrases that it could have returned, but it seems the Heptapods are rather blunt.
Again:
  • "Divine Feminine" = 911 jewish-latin-agrippa
  • ... .. "Sexy Girl" = 911 jewish-latin-agrippa
From...
Revelation 9:11 King James Version (KJV):
And they had a king [41] over them, which is the angel of the bottomless pit, whose name in the Hebrew tongue is Abaddon [41] , but in the Greek tongue hath his name Apollyon.
This is perhaps a dual - the Abaddon is both Father Beast (and Lord of the Harem, perhaps, given the plural 'them') and the Beastly Progeny (ie. King and Prince):
  • "Pregnant" = 333 jewish-latin-agrippa
  • "The Temple" = 333 jewish-latin-agrippa
  • ... "A Baby" = 333 trigonal
The angelic little baby, retrieved from the bottomless pit, is the apple of mommy and daddy's eyes (even though it is very naughty, ruling over their lives for many years after his or her noxious retrieval from the Underworld).
"I wonder why?" = 474 primes ( "Accountancy" = 393 primes )
  • "Numerology" = 474 primes
  • "Great Pattern" = 474 primes
  • "Object of Lust" = 474 primes ( "Deny Nature" = 419 primes )
  • "The Devil, Woman" = 474 primes (ie. Beauty and the Beast)
  • .
  • ... "The Number" = 333 primes
  • ... .. .. "A Baby" = 333 trigonal
  • "The Great Emergence" = 474 primes
  • "Population" = 449 primes
  • ... "Sex Education" = 449 primes
  • .. .. .. "Surveillance" = 449 primes
  • ("A Pornographic" = 616 englist-extended [ie. "Number" = 616 trigonal ] )
  • ("Pornographica" = 616 eng-ext [ie. "Perfect Number" = 616 jewish-latin-agrippa ] )
  • ... ("The Law" = 616 trigonal )
  • ... ("Garden of Eden" = 616 trigonal )
  • .
  • "To Know" = 322 primes
You cannot unsee it:
  • "Girl" = 322 trigonal <---- pornographic numeric hieroglyph
To each there own:
  • "Tradition" = 393 jewish-latin-agripa
  • "The Perfect Woman" = 1,393 jewish-latin-agrippa
  • "Tradition" = 393 jewish-latin-agripa
  • ... "Count" = 393 jewish-latin-agripa
  • .. .. ... "Accountancy" = 393 primes
Occult Alphabet = English Alphabet = Statistics
  • "Figures Reveal..." = 1234 trigonal
  • .... "Liberal Party" = 1234 trigonal
  • Q: .. "What Rules?" = 1234 english-extendedd
  • A: .. "Just Sign Here"* = 1234 jewish-latin-agrippa
The closest multi-cypher spectrum match against dictionary files (as described here), to the spell "One Thing" is:
  • "enduring" (with 9+ matches)
  • "Tradition" = 393 jewish-latin-agripa
  • ... "Survive" = 393 primes
  • ... .. .."Greyhound race" = 1234 trigonal
  • .. .. ... ... "The Rat Race" = 314 primes (ie. pi; commute in circles)
  • "Great Place" = 1234 square
Viva Las Vegas (ie. V.L.V ):
777 (ie. to win at slots):
  • "A Triple-Seven" = 1234 trigonal | 2,322 squares
The Boeing 777 is a premiere passenger aircraft.
The Boeing 787 is called the Dreamliner (ie "The Call" = 787 squares ... of Morpheus)
The Boeing 747 is Old Faithful, the Jumbo Jet of Time
Air Force One is a 747
  • "Air Force" = 223 primes
  • "Winds" = 223 primes
  • "Goddess" = 223 primes
  • ... "The Law" = 223 primes
  • ... "Air Force" = 223 primes
  • "Winds" = 223 primes
  • .
  • "The Law" = "Goddess" = 223 primes
She steps on "The Scale" = 223 primes ...
...and hopes she is ...
  • "Weightless" = 1234 jewish-latin-agrippa
From an old Alphabet Primer:
... He that ne'er learns his ABC,
... For ever will a Blockhead be.
... But he that learns these Letters fair,
... Shall have a Coach to take the Air.
Are you ready, Icarus?
  • "This is the deal" = 139 = "Occult Alphabet"
  • ... "Competition" = 139 = "Pyramid scheme" = "Ancient Egypt"
Mirror Mirror, upon the wall, who is the Pharaoh over all?
Extra credit:
Read about the taming of Enkidu, in the myth of Gilgamesh:
  • "The Spells of Eden" = 1234 trigonal
  • "Great Knowledge" = 1234 jewish-latin-agrippa
  • ... "Great Knowledge" = 449 primes
  • ... "Sex Education" = 449 primes | 1337 english-extended
  • ... .. .. "Prostitute" = 1234 english-extended
  • .. .. ... .. "Carnival Row" = 1234 english-extended
  • ... .. .. "Prostitute" = 1234 english-extended
  • .. .. ... ... "Presidential Golf Course" = 1234 english-extended
  • "One, Two, Three, and Four" = 227 basic alphabetic (the 'and' was for ... metrical reasons.)
  • ... ( "The Emergence" = 722 trigonal ... ie. pi and reverse pi; circles)
Q: ?
  • "A: The Emergence" = 314 primes (ie. classic Amorican pi)
  • "A: The Emergence" = 1337 squares (ie. "sex education" = 1337 english-extended)
  • "The Alphabetical Epidemic" = 1234 trigonal
  • ... "Not entirely true(?)" = 1234 jewish-latin-agrippa
Enregisterment is often partially, rather than completely, true, sort of like an accent viewed through a funhouse mirror.
I was triggered to made this post due to various recent media 'events', this 'crazy' 'news item' the final straw that broke the gimel's black (I link to old reddit theme because it is objectively better ):
Also, see recent threads:
Relevant numbers & links:
Also, perhaps relevant pings:
Disclaimer:
You might have noticed the game I've long played with the dots used for spacing and indenting lists of spells. They usually follow the pattern of:
  • ... (ie. 3, trinity, the Beatrice of the Matrix Code)
  • ... .. (ie. 32, life, Eve)
  • ... ... (ie. 33, magic, name, a life)
  • . .. ... (ie. 123, alphabetic codes, the ABC, initation)
  • ... .. . (ie. 321, countdown to church society)
  • ... .. .. (ie. 322, to know, the proof is counting)
  • .. .. ... (ie. 223, the law, chapter 1, the scale, goddess, Lucifer, the moon)
  • .. ... .. (ie. 232, scary, number, Satan)
  • ... .. ... (ie. 323, Lucifer, 1 Goddess)
  • ... .. .. ... (ie. 3223, the upward spiral, ascending the tower of babylon)
Sometimes the layout is thematically tied to the associated text.
  • . "Scary" = 232 primes
  • .. "Number" = 232 primes
  • ... "Tell All" = 232 primes
Wiki Index: https://old.reddit.com/GeometersOfHistory/wiki/index
.
EDIT:
Chinese researcher accused of trying to smuggle vials of ‘biological material’ out of US hidden in a sock
Sweeping ban on semiautomatic weapons takes effect in New Zealand
  • "The Semiautomatic Rifle" = 232 basic alphabetic
  • ... "Bullet" = 232 primes
  • ... "Scary" = 232 primes
  • ... .. .. "Number" = 232 primes
  • ... "Scary" = 232 primes
  • ... .. .. "Satan" = 232 jewish-latin-agrippa
  • .
  • "Semiautomatic Rifles" = 1776 trigonal
  • .
  • "The Semiautomatic Rifle" = 232 basic alphabetic
  • ... "Bullet" = 232 primes
  • ... "Number" = 232 primes
Bullet News Bulletsin Bullet points Bullet Bull ET Extraterrestrial Bull Bull God
  • "The Bull God" = 322 primes
.
EDIT: - moments later - :
https://old.reddit.com/occult/comments/eee131/does_anyone_know_what_this_symbol_represents_its/
Does anyone know what this symbol represents, it's familiar to me and puts of a very unique energy and I cannot place it
  • "unique energy" = 322 baconis | 522 primes ("the prime number" = 522 primes)
  • "(a) very unique energy" = 232 basic alphabetic | 2,247 jewish-latin-agrippa
  • ... "very unique energy" = 2023 trigonal (ie. 223 with zephyr)
  • "the very unique energy" = 264 basic alphabetic ("Source" = 264 primes)
The golden ratio is 1.61(8...)
  • ... "unique energy" = 161 basic alphabetic
  • ... "unique energy" = 1601 english-extended
  • ... "unique energy" = 1061 jewish-latin-agrippa
  • ... .. "energizer" = 1061 english-extended
  • ... .. .. "unique energy" = 161 basic alphabetic | 322 baconis
  • .. .. ... "undercurrent" = 161 basic alphabetic | 322 baconis
  • .. .. ... "song of creation" = 161 basic alphabetic | 322 baconis
https://old.reddit.com/GeometersOfHistory/comments/cyr1nq/gematria_of_161_and_322/
EDIT - again, next day (remembering that 'president' ~= 'count' ~= 'accountancy'):
I wrote here, a few days ago:
These are things we can imagine Alphabet Sages might desire to encode and honour - as much for a mnemonic purpose, as for teaching purposes, or for archiving [...] knowledge [...] or purely for the sake of esoterica itself (ie. wizard just likes math, or architecture, and thus honours math and arches, secretely in words using basic algebra and references to certain idioms and golden numbers. Wizard works for King, shows him tricks. King decrees new Bible edition, and new Dictionary version).
Today:
https://www.reddit.com/worldnews/comments/eemt1d/china_orders_christians_to_rewrite_the_bible_fo
China orders Christians to rewrite the Bible for the era of President Xi
China orders Christians to rewrite the Bible for the era of President Xi
  • "Right the Bible" = 369 primes
  • "The Alphabet Code" = 369 primes
  • "Ritual Code" = 1,666 squares
  • "Aright the Bible" = 1,666 squares
  • "The Bible: 1 Right" = 1,666 squares
EDIT - next day again (Christmas Eve) -- re: bullets (first edit above)
https://games.slashdot.org/story/19/12/23/2042253/how-do-bullets-work-in-video-games
How Do Bullets Work in Video Games?
https://arstechnica.com/science/2019/12/lessons-from-scorching-hot-weirdo-planets/
Q&A(stronony) —
Lessons from scorching hot weirdo-planets
The first kind of exoplanet found, Hot Jupiters still perplex and captivate
from The Comte De Gabalis, discourse 1: https://www.sacred-texts.com/eso/cdg/cdg04.htm
He found me to be of a tractable, inquiring, and fearless disposition. A dash of melancholy is lacking in me, else I would make all, who are inclined to blame the Comte de GABALIS for having concealed nothing from me, confess that I was a not unfit subject for the Occult Sciences. One cannot make great progress in them, it is true, without melancholy; but the little that I possess in no wise disheartened him. You have, he told me a hundred times, Saturn in an angle, in his own house, and retrograde; some day you cannot. fail to be as melancholy as a Sage ought to be; for the wisest of all men, as we learn in the Cabala, had like you Jupiter in the Ascendant, nevertheless so powerful was the influence of his Saturn, though far weaker than yours, that one cannot find proof of his having laughed a single time in all his life. The Amateurs must, therefore, find fault with my Saturn and not with the Comte de GABALIS, if I prefer to divulge their secrets rather than to practise them.
https://arstechnica.com/science/2019/12/optical-quantum-computer-goes-big-in-new-quest-for-quantum-supremacy/
Photons are (almost) supreme —
Why I dislike what “quantum supremacy” is doing to computing research
  • "Photonics" = 119 | 47 reduced (ie. Orthodox, Foundation, Master Plan)
  • "Photonics" = 968 trigonal
  • "A+ Photonics" = 969 trigona (ie. Matrix Code)
Q: Light particles?
"A: Bits of Light" = 393 primes (ie. Bits of a Light )
submitted by Orpherischt to GeometersOfHistory [link] [comments]

A Glance at the Heart: Proof-of-Authority Technology in the UMI Network

A Glance at the Heart: Proof-of-Authority Technology in the UMI Network

https://preview.redd.it/vhvj6v093df51.jpg?width=1024&format=pjpg&auto=webp&s=00c0c223d9758edec8ed49a8cb9024f96d3ee343
Greetings from the UMI Team! Our Whitepaper describes in detail the key pros and cons of the two mechanisms which the great majority of other cryptocurrencies are based on:
Proof-of-Work (PoW) — mining technology. Used in Bitcoin, Ethereum, Litecoin, Monero, etc.
Proof-of-Stake (PoS) and its derivatives — forging technology. Used in Nxt, PeerCoin, NEO, PRIZM, etc.
As a result of a careful analysis of PoW and PoS, which are designed to fight against centralization, there came a conclusion that they both fail to perform their main mission and, in the long run, they lead to the network centralization and poor performance. For this reason, we took a different approach. We use Proof-of-Authority (PoA) algorithm coupled with master nodes, which can ensure the UMI network with decentralization and maximum speed.
The Whitepaper allows you to understand the obvious things. This article will give you a clear and detailed explanation of the technology implemented in the UMI network. Let's glance at the heart of the network right now.
Proof-of-Authority: How and Why It Emerged
It's been over a decade since the first transaction in the Bitcoin network. Over this time, the blockchain technology has undergone some qualitative changes. It's down to the fact that the cryptocurrency world seeing the emerging Proof-of-Work defects in the Bitcoin network year after year has actively searched for ways to eliminate them.
PoW decentralization and reliability has an underside of low capacity and scalability problem that prevents the network from rectifying this shortcoming. Moreover, with the growing popularity of Bitcoin, greed of miners who benefit from high fees resulting from the low network throughput has become a serious problem. Miners have also started to create pools making the network more and more centralized. The “human factor” that purposefully slowed down the network and undermined its security could never be eliminated. All this essentially limits the potential for using PoW-based cryptocurrencies on a bigger scale.
Since PoW upgrade ideas came to nothing, crypto community activists have suggested cardinally new solutions and started to develop other protocols. This is how the Proof-of-Stake technology emerged. However, it proved to be excellent in theory rather than in practice. Overall, PoS-based cryptocurrencies do demonstrate a higher capacity, but the difference is not as striking. Moreover, PoS could not fully solve the scalability issue.
In the hope that it could cope with the disaster plaguing all cryptocurrencies, the community came up with brand new algorithms based on alternative operating principles. One of them is the Proof-of-Authority technology. It was meant to be an effective alternative with a high capacity and a solution to the scalability problem. The idea of using PoA in cryptocurrencies was offered by Gavin Wood — a high-profile blockchain programmer and Ethereum co-founder.
Proof-of-Authority Major Features
PoA's major difference from PoW and PoS lies in the elimination of miner or forger races. Network users do not fight for the right to be the first to create a block and receive an award, as it happens with cryptocurrencies based on other technologies. In this case blockchain's operating principle is substantially different — Proof-of-Authority uses the “reputation system” and only allows trusted nodes to create blocks.
It solves the scalability problem allowing to considerably increase capacity and handle transactions almost instantly without wasting time on unnecessary calculations made by miners and forgers. Moreover, trusted nodes must meet the strict capacity requirements. This is one the main reasons why we have selected PoA since this is the only technology allowing to fully use super-fast nodes.
Due to these features, the Proof-of-Authority algorithm is seen as one of the most effective and promising options for bringing blockchain to various business sectors. For instance, its model perfectly fits the logistics and supply chain management sectors. As an outstanding example, PoA is effectively used by the Microsoft Azure cloud platform to offer various tools for bringing blockchain solutions to businesses.
How the UMI Network Gets Rid of the Defects and Incorporates the Benefits of Proof-of-Authority Method
Any system has both drawbacks and advantages — so does PoA. According to the original PoA model, each trusted node can create a block, while it is technically impossible for ordinary users to interfere with the system operation. This makes PoA-based cryptocurrencies a lot more centralized than those based on PoW or PoS. This has always been the main reason for criticizing the PoA technology.
We understood that only a completely decentralized product could translate our vision of a "hard-to-hit", secure and transparent monetary instrument into reality. Therefore, we started with upgrading its basic operating principle in order to create a product that will incorporate all the best features while eliminating the defects. What we’ve got is a decentralized PoA method. We will try to explain at the elementary level:
- We've divided the nodes in the UMI network into two types: master nodes and validator nodes.
- Only master nodes have the right to create blocks and confirm transactions. Among master node holders there's the UMI team and their trusted partners from across the world. Moreover, we deliberately keep some of our partners — those who hold master nodes — in secret in order to secure ourselves against potential negative influence, manipulation, and threats from third parties. This way we ensure maximum coherent and reliable system operation.
- However, since the core idea behind a decentralized cryptocurrency rules out any kind of trust, the blockchain is secured to prevent master nodes from harming the network in the event of sabotage or collusion. It might happen to Bitcoin or other PoW- or PoS-based cryptocurrencies if, for example, several large mining pools unite and perform a 51% attack. But it can’t happen to UMI. First, the worst that bad faith master node holders can do is to negligibly slow down the network. But the UMI network will automatically respond to it by banning such nodes. Thus, master nodes will prevent any partner from doing intentional harm to the network. Moreover, it will not be able to do this, even if most other partners support it. Nothing — not even quantum computers — will help hackers. Read our post "UMI Blockchain Six-Level Security" for more details.
- A validator node can be launched by any participant. Validator nodes maintain the network by verifying the correctness of blocks and excluding the possibility of fakes. In doing so they increase the overall network security and help master nodes carry out their functions. More importantly, those who hold validator nodes control those who hold master nodes and confirm that the latter don't violate anything and comply with the rules. You can find more details about validator nodes in the article we mentioned above.
- Finally, the network allows all interested users to launch light nodes (SPV), which enables viewing and sending transactions without having to download the blockchain and maintain the network. With light nodes, any network user can make sure if the system is operating properly and doesn't have to download the blockchain to do this.
- In addition, we are developing the ability to protect the network in case 100% of the master nodes (10,000 master nodes in total) are "disabled" for some reason. Even this is virtually impossible, we've thought ahead and in the worst-case scenario, the system will automatically move to PoS. By doing so, it will be able to continue processing transactions. We're going to tell you about this in our next publications.
Thus, the UMI network uses an upgraded version of this technology which possesses all its advantages with drawbacks eliminated. This model is truly decentralized and maximum secured.
Another major drawback of PoA-based cryptos is no possibility to grant incentives to users. PoA doesn't imply forging or mining which allow users to earn cryptocurrency while generating new coins. No reward for maintaining the network is the main reason why the crypto community is not interested in PoA. This is, of course, unfair. With this in mind, the UMI team has found the best solution — the unique staking smart-contract. It allows you to increase the number of your coins up to 40% per month even with no mining or forging meaning the human factor cannot have a negative impact on the decentralization and network performance.
New-Generation Proof-of-Authority
The UMI network uses an upgraded version of PoA technology which possesses all its advantages with drawbacks virtually eliminated. This makes UMI a decentralized, easily scalable, and yet the most secure, productive, profitable and fair cryptocurrency, working for the sake of all people.
The widespread use of UMI can change most aspects of society in different areas, including production, commerce, logistics, and all financial arrangements. We are just beginning this journey and thrilled to have you with us. Let's change the world together!
Best regards, UMI Team!
submitted by UMITop to u/UMITop [link] [comments]

Post-Quantum signature scheme library

Introduction

Quantum Processing Units (QPU) grow increasingly, it won't take long anymore until classical cryptography is in danger. What are the consequences? Your encrypted communication with the internet in the current state will belong to history. Anybody will potentially be able to fake signatures and therefore impersonate you. And one last example, our beloved Bitcoin and Ethereum coins are in danger if the account holding them has one outgoing transaction or if anybody catches your not yet executed transaction.
Annealing quantum processors (create multi-dimensional energy term and collapse into lowest energy) from D-Wave have already up to 5000 Qubits, 2030 Qubit QPUs are already publicly available in the "Leap" Cloud from D-Wave. Circuit-based Quantum processors (QPUs with their own quantum instruction set) have already up to 72 Qubits, 15 Qubits QPUs are already publicly accessible in IBMs QPU cloud "IBM Q Network". The end of classical public key cryptography is already visible in an unpleasantly close distance.
Various post-quantum cryptographic algorithms already exist, which are currently being evaluated by NIST. One signature scheme is called "Winternitz one-time signature" (WOTS) and it allows to securely create one signature. In combination with a merkle tree, many signatures can be created. This scheme is called XMSS.

The project

A year ago I have created a clean python project during university, which contains a WOTS abstract base class and WOTS/WOTS+ implementations based on this class. It is completly configurable and easy to use (example down below). It was created using the official RFC 8391 (at that time). It is also fully documented (including the basic math) and tested. I hope that one day it can be seen as the default python WOTS/XMSS library, but for that I need your help. If you are interested, I'd love to see you join the project and make it great. You can browse the issues to get an anchor point where to start or you can suggest new issues and work on them (after approval). The repository can be found at: https://github.com/sea212/winternitz-one-time-signature . The documentation can be found at: https://winternitz-one-time-signature.readthedocs.io/en/latest/introduction.html
If you are looking for a security/cryptography project (for example for an university course), you can browse the issue to get some ideas.

Examples

Creating and verifying a signature is easy as that:
import winternitz.signatures # Create signature and verify it with the same object wots = winternitz.signatures.WOTS() message = "My message in bytes format".encode("utf-8") sig = wots.sign(message) success = wots.verify(message=message, signature=sig["signature"]) print("Verification success: " + str(success)) # Output: Verification success: True 
Retrieve the public key:
import winternitz.signatures # Create signature and verify it with the same object wots = winternitz.signatures.WOTS() key = wots.pubkey 
Remotely verifing signatures is also simple. To simplify this example, the whole sig dictionary is transmitted and I assume that the hashalgorithm is already imported with that name (see documentation for a clean example). The communication partner can import the data and verify your signature in the following way:
import winternitz.signatures # Create signature and verify it with the same object wots_other = winternitz.signatures.WOTS(w=sig["w"], sig["hashalgo"], digestsize=sig["digestsize"], pubkey=key) success = wots_other.verify(message=message, signature=sig["signature"]) print("Verification success: " + str(success)) # Output: Verification success: True 
It's easy as that. Begin now to use this easily usable library in adequate situations and be ahead of time :)
QPUs: https://en.wikipedia.org/wiki/List_of_quantum_processors
Leap cloud: https://cloud.dwavesys.com/leap/
IBM Q Network: https://www.ibm.com/quantum-computing/network/overview
NIST post-quantum cryptography evaluation: https://csrc.nist.gov/projects/post-quantum-cryptography
RFC 8391: https://tools.ietf.org/html/rfc8391
submitted by sea212H to Python [link] [comments]

Subreddit Stats: CryptoTechnology top posts from 2017-12-23 to 2020-01-20 15:51 PDT

Period: 758.36 days
Submissions Comments
Total 956 13660
Rate (per day) 1.26 18.01
Unique Redditors 584 3144
Combined Score 21553 44566

Top Submitters' Top Submissions

  1. 1166 points, 43 submissions: Neophyte-
    1. "Do you need a Blockchain?" - this paper is fantastic, everyone should read this before evaluating a coin and if requires a block chain to solve a solution the coin is promising to solve. (136 points, 41 comments)
    2. Do any of you foresee a crypto being widely adopted as a general purpose payment coin? nano, btc, btccash etc (take your pick). I think it won't happen for reasons in this post. What do you think? (59 points, 54 comments)
    3. Noticed the huge rise of EOS lately what does it have over NEO and ethereum and to a lesser extent Cardano? I tried researching it, but wasn't sold. (54 points, 55 comments)
    4. Hard Problems in Cryptocurrency: Five Years Later ~Vitalik (46 points, 1 comment)
    5. I had a Q&A with Bruno head architect / CEO of oyster, thought you guys might like it. (45 points, 2 comments)
    6. A good article that explains in simple terms how Eth2 works, how it will be rolled out and migrated from eth1 (42 points, 4 comments)
    7. DAI the stablecoin can now be transferred GAS free (article explaining how it works via new MCD DAI contract). This holds alot of promise for the so called "Web3" (40 points, 8 comments)
    8. Veriblock is consuming 27% of bitcoins block space - what does this mean for bitcoins future? (39 points, 16 comments)
    9. Vitalik: Alternative proposal for early eth1 <-> eth2 merge (38 points, 3 comments)
    10. Is launching a PoW permissionless blockchain still possible today? or would it be too susceptible to a 51% attack? (37 points, 37 comments)
  2. 578 points, 16 submissions: crypto_ha
    1. Why is Ripple considered a cryptocurrency (by many)? (109 points, 63 comments)
    2. So reportedly there are serious vulnerabilities found in EOS’ code. And it seems like those are more than just random software bugs. (97 points, 29 comments)
    3. Guide: How to get started with Blockchain development? (60 points, 6 comments)
    4. A newly found vulnerability in Nano's Android wallet (44 points, 12 comments)
    5. The history and state of Ethereum's Casper research - Vitalik Buterin (39 points, 4 comments)
    6. What is the difference between Sidechain vs Child Chain vs Off Chain? (39 points, 12 comments)
    7. EOS mainnet is official live (finally), but... (36 points, 24 comments)
    8. Bitcoin's "doomsday" economics - Bank of International Settlements (34 points, 23 comments)
    9. How Wall Street’s embrace could undermine Bitcoin (30 points, 9 comments)
    10. Ethereum ERC 1497: DApp Dispute Evidence Standard (24 points, 0 comments)
  3. 513 points, 20 submissions: ndha1995
    1. Ethereum Classic is currently being 51% attacked (103 points, 31 comments)
    2. Why are there so many garbage posts the past 24 hours? (58 points, 10 comments)
    3. Google Unveils 72-Qubit Quantum Processor With Low Error Rates (48 points, 24 comments)
    4. IOTA's Network-Bound PoW consensus, is it feasible? (42 points, 13 comments)
    5. The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime (29 points, 7 comments)
    6. Deep dive into zk-STARKs with Vitalik Buterin's blog posts (26 points, 3 comments)
    7. Tether discussion thread (26 points, 21 comments)
    8. Vitalik Buterin Proposes a Consensus Algorithm That Requires Only 1% to Be Honest (24 points, 8 comments)
    9. Can somebody compare Qtum vs. NEO, technology-wise? (E.g. PoS vs. PoW; smart contract protocols...) (21 points, 15 comments)
    10. Introduction to Non Fungible Tokens (NFTs) (21 points, 9 comments)
  4. 377 points, 16 submissions: turtleflax
    1. Around 13% of DASH's privateSends are traceable to their origin (69 points, 3 comments)
    2. "Big Bang" attack could leverage Monero's dynamic blocksize to bloat the blockchain to 30TB in only 36 hours (52 points, 3 comments)
    3. The case for the obsolescence of Proof of Work and why 2018 will be the year of Proof of Stake (41 points, 29 comments)
    4. Monero vs PIVX: The First Scheduled Privacy Coin Debate Thread on /CryptoCurrency (38 points, 12 comments)
    5. Introducing the Privacy Coin Matrix, a cross-team collaboration comparing 20 privacy coins in 100 categories (26 points, 25 comments)
    6. Do permissioned blockchains have any merits? (25 points, 23 comments)
    7. The State of Hashing Algorithms — The Why, The How, and The Future (21 points, 4 comments)
    8. How Zerocoin Works in 5 Minutes (19 points, 5 comments)
    9. Errors made by Satoshi (17 points, 8 comments)
    10. How Much Privacy is Enough? Threats, Scaling, and Trade-offs in Blockchain Privacy Protocols - Ian Miers (Cornell Tech, Zerocoin, Zerocash) (17 points, 4 comments)
  5. 321 points, 6 submissions: Qwahzi
    1. Technical comparison of LIGHTNING vs TANGLE vs HASHGRAPH vs NANO (133 points, 37 comments)
    2. Addressing Nano's weaknesses (bandwidth usage and disk IO). Nano voting traffic to be reduced by 99.9% by implementing vote by hash, lazy bootstrapping, and reduced vote rebroadcasting (x-post CryptoCurrency) (78 points, 8 comments)
    3. Emergent centralization due to economies of scale (PoW vs DPoS) – Colin LeMahieu (52 points, 37 comments)
    4. Nano community member developing a distributed "mining" service to pay people to do PoW for third-parties (e.g. exchanges, light wallet services, etc) (32 points, 20 comments)
    5. What do you think about OpenCAP, the cryptocurrency alias protocol that mirrors traditional email addresses? (15 points, 12 comments)
    6. Bitcoin would be a calamity, not an economy (11 points, 52 comments)
  6. 256 points, 4 submissions: rockyrainy
    1. Bitcoin Gold hit by Double Spend Attack (51% attack). The Attacker reversed 22 blocks. (179 points, 102 comments)
    2. ZK-starks white paper published (44 points, 16 comments)
    3. [Q] How does a network reach consensus on what time it is? (21 points, 17 comments)
    4. Stateless (no history) Cryptocurrency via snapshots? (12 points, 7 comments)
  7. 244 points, 3 submissions: HSPremier
    1. From a technical standpoint: Why does every blockchain projects need their own coins? (181 points, 50 comments)
    2. What is Reddit's obsession with REQ? (61 points, 43 comments)
    3. What is the technological difference between a privacy coin and a privacy coin platform? Won't a privacy coin platform be more superior than a privacy coin? (2 points, 3 comments)
  8. 234 points, 2 submissions: Realness100
    1. A Guided Reading of Bitcoin’s Original White Paper (202 points, 10 comments)
    2. A Guided Reading of Ethereum's Original White Paper! (32 points, 5 comments)
  9. 185 points, 4 submissions: tracyspacygo
    1. My brief observation of most common Consensus Algorithms (159 points, 49 comments)
    2. What are the main Trends/Challenges for Bitcoin and whole crytpocurrencies industry? (12 points, 33 comments)
    3. Guideline for Newbies: Trying out Bitcoin transactions with TESTNET (7 points, 1 comment)
    4. Most advanced Cryptocurrencies Comparison Table (7 points, 8 comments)
  10. 177 points, 9 submissions: benmdi
    1. What's the best argument against cryptotechnology? I.e. Steelman the cryptocurrency skeptic (43 points, 42 comments)
    2. Would there be interest from this community in crypto resources aimed at developers? If so, what topics? (29 points, 14 comments)
    3. Has the window for bootstrapping a new PoW coin closed? (24 points, 57 comments)
    4. What can we, as a community, learn from the rise & acquisition of GitHub (23 points, 8 comments)
    5. 🍱 Rollup Roundup: Understanding Ethereum's Emerging Layer 2 (19 points, 1 comment)
    6. Video Tutorial: Introducing An Experience Dev To Smart Contract Coding (17 points, 3 comments)
    7. Do we need a blockchain to be decentralized? What questions would you ask a self described fan of decentralization, but blockchain skeptic? (11 points, 19 comments)
    8. ETH Block Rewards And Second Order Effects On Hardware Availability (7 points, 8 comments)
    9. Which Of The Big Tech Companies Is Most Likely To Bring Crypto Mainstream? Here's Why I Think It's Apple (4 points, 7 comments)
  11. 175 points, 9 submissions: galan77
    1. Is the Lightning Network a massive threat to the blockchain? (49 points, 66 comments)
    2. TPS of Lightning Network vs. Sharding, which one does better? (28 points, 7 comments)
    3. Are there any major downsides to sharding? (21 points, 33 comments)
    4. What's the difference between trustlessness and permissionlessness (19 points, 7 comments)
    5. Which consensus algorithm is the best, PoW, PoS, PoAuthority, PoAsset? (18 points, 57 comments)
    6. How can XRP reach 50,000 TPS when they have no sharding and every node has to validate every single transaction. (15 points, 14 comments)
    7. A few questions about the Lightning Network (14 points, 6 comments)
    8. Pascalcoin can do 72,000 tps apparently. Is this legit? The new Nano? (8 points, 39 comments)
    9. How does Ripple's (XRB's) consensus algorithm Proof of Correctness work, are there any downsides? (3 points, 23 comments)
  12. 175 points, 1 submission: ilielezi
    1. Why white papers in crypto world are so unprofessional? (175 points, 88 comments)
  13. 165 points, 6 submissions: CryptoMaximalist
    1. Facebook's Libra (48 points, 55 comments)
    2. “Fake Stake” attacks on some Proof-of-Stake cryptocurrencies responsibly disclosed by researchers from the Decentralized Systems Lab at UIUC (31 points, 9 comments)
    3. Quantum Computing and the Cryptography in Crypto (27 points, 14 comments)
    4. PING and REJECT attacks on ZCash (Patch available) | Stanford Applied Crypto Group (22 points, 1 comment)
    5. Introduction to Cryptography: Part 1 - Jinglan Wang (19 points, 1 comment)
    6. New site howmanyconfs.com shows the amount of time and confirmations of Proof of Work coins to match 6 confirmations on Bitcoin (18 points, 11 comments)
  14. 163 points, 10 submissions: GainsLean
    1. Videos For Developers Who Want To Learn Blockchain In A Practical Way (36 points, 17 comments)
    2. What Do You Want To Learn? (32 points, 20 comments)
    3. Get Involved With The Smart Contract Coding Challenge (25 points, 4 comments)
    4. Solution To $10K Art Prize (25 points, 3 comments)
    5. Blockchain Course Outline Has Been Released - Feedback warranted (22 points, 12 comments)
    6. Introduction To Distributed Systems And Consensus Protocols (9 points, 2 comments)
    7. Are there any closed source crypto wallets? (4 points, 19 comments)
    8. Are there any successful proof of identity projects? (4 points, 8 comments)
    9. SPV Wallets Vs API Wallets (4 points, 1 comment)
    10. 12 Popular Consensus Algorithms - Explained (2 points, 0 comments)
  15. 163 points, 7 submissions: QRCollector
    1. Part 5. I'm writing a series about blockchain tech and possible future security risks. This is the fifth part of the series talking about an advanced vulnerability of BTC. (43 points, 43 comments)
    2. I'm writing a series about blockchain tech and possible future security risks. This is the third part of the series introducing Quantum resistant blockchains. (36 points, 4 comments)
    3. Part 4B. I’m writing a series about blockchain tech and possible future security risks. This is the fourth part of the series explaining the special quality of going quantum resistant from genesis block. (25 points, 21 comments)
    4. Part 6. (Last part) I'm writing a series about blockchain tech and possible future security risks. Failing shortcuts in an attempt to accomplish Quantum Resistance (24 points, 38 comments)
    5. I'm writing a series about blockchain tech and possible future security risks. This is the first part of the series introducing the basic concept of blockchain and what makes it reliable. (23 points, 10 comments)
    6. I'm writing a series about blockchain tech and possible future security risks. This is the fourth part of the series explaining the special quality of going quantum resistant from genesis block. (7 points, 1 comment)
    7. Part 2. I'm writing a series about blockchain tech and possible future security risks. This is the second part of the series: An accessible description of hashing and signature schemes. (5 points, 0 comments)
  16. 162 points, 3 submissions: FashionistaGuru
    1. How do we change the culture around cryptocurrency? (118 points, 54 comments)
    2. Which cryptos have the best new user experience? (30 points, 34 comments)
    3. Why does Apple prevent many crypto apps from entering the App Store? (14 points, 8 comments)
  17. 157 points, 7 submissions: SamsungGalaxyPlayer
    1. Breaking Monero Episodes 1-3: Introduction, Ring Signatures, 0-Decoy and Chain Reactions (45 points, 1 comment)
    2. "No, dPoW Isn't a Perfect Solution" (35 points, 48 comments)
    3. Breaking Mimblewimble’s Privacy Model - Dragonfly Research (27 points, 10 comments)
    4. Breaking Monero (and Zcash) Episodes 7-9: Remote Nodes, Timing Attacks, Poisoned Outputs (EAE Attack) (21 points, 2 comments)
    5. "Attacker Collection of IP Metadata" (18 points, 10 comments)
    6. "Tracing Transactions Across Cryptocurrency Ledgers" Using Shapeshift and Changelly (6 points, 4 comments)
    7. Breaking Monero Episodes 4-6: Chain Splits (Key Image Attack), Input Selection Algorithm, Unusual Ringsize (5 points, 2 comments)
  18. 147 points, 1 submission: shunsaitakahashi
    1. Proof-of-Approval: Stake Based, 1 Block Finality & History Attack Defense (147 points, 4 comments)
  19. 146 points, 6 submissions: themoderndayhercules
    1. "The selfish mining fallacy" explained and debunked (60 points, 8 comments)
    2. A Discussion of Stable coins and Decentralized Oracles (35 points, 8 comments)
    3. A Selfish Mining Double Spending attack Simulator (25 points, 2 comments)
    4. Why reputation systems don't work (15 points, 12 comments)
    5. A better incentivization for Swarm (6 points, 0 comments)
    6. When Mises met Szabo - A Discussion of the value of Bitcoin (5 points, 16 comments)
  20. 143 points, 7 submissions: KomodoWorld
    1. Komodo Platform's core developer and founder jl777 has started his own blog on Medium. The blog is aimed for senior developers who want to learn about blockchain. (46 points, 15 comments)
    2. Delayed Proof of Work (dPoW) security explained (36 points, 46 comments)
    3. Proof-of-Gameplay (19 points, 3 comments)
    4. Good guide for getting started with the Custom Consensus tech for Komodo-based blockchains (17 points, 0 comments)
    5. Cross-chain migration of coins with Crypto Conditions - by smk762 (12 points, 0 comments)
    6. A step-by-step example of working with a Crypto Conditions based Oracle - by smk762 (10 points, 0 comments)
    7. Changing consensus rules on the fly with Crypto Conditions (3 points, 0 comments)
  21. 141 points, 8 submissions: Stormy1997
    1. What technical/business advantages does a private blockchain have over a SQL server? (49 points, 79 comments)
    2. Is sharding to scale bad? (24 points, 28 comments)
    3. How would one create a fiat gateway theoretically? (19 points, 19 comments)
    4. Looking for Stellar smart contract/side chain code examples (16 points, 1 comment)
    5. Question - Securing personal information on a centralized server with user-owned keys (13 points, 3 comments)
    6. How do blockchains/smart contracts communicate with oracles? (10 points, 4 comments)
    7. Bandwidth scaling for TPS (8 points, 2 comments)
    8. Best method to transmit detailed data between two parties via existing platforms (2 points, 1 comment)
  22. 141 points, 3 submissions: seventyfiver
    1. Why does Ethereum use Solidity while other ecosystems like NEO stick with popular ones like Java and C#? (94 points, 26 comments)
    2. Chainlink's initial Go implementation went live this morning. Has anyone reviewed the code and can comment on it's quality? (40 points, 3 comments)
    3. What are some great books on cryptoeconomics or blockchain technology? (7 points, 4 comments)
  23. 134 points, 6 submissions: johnny_milkshakes
    1. Sub dedicated to DAG based coins (42 points, 8 comments)
    2. Thoughts on this? (28 points, 38 comments)
    3. This is very interesting (24 points, 19 comments)
    4. Educational presentation by Clara Shikhelman (18 points, 0 comments)
    5. Ethics question. (12 points, 40 comments)
    6. How to scale on chain? (10 points, 30 comments)
  24. 127 points, 4 submissions: sukitrebek
    1. What are you currently obsessed with, and why? (58 points, 150 comments)
    2. Crypto-based social network without a cryptocurrency. (42 points, 23 comments)
    3. How does underlying architecture affect what kinds of applications are possible? (17 points, 3 comments)
    4. Holochain vs. Radix DLT (10 points, 11 comments)
  25. 126 points, 1 submission: RufusTheFirefly
    1. Everytime I try to investigate the technology behind Cardano(Ada), I come across the words "scientific" and "peer-reviewed" over and over but almost no actual details. Can someone fill how this coin actually works and where they are in development? (126 points, 49 comments)
  26. 112 points, 1 submission: rocksolid77
    1. Can we have a real debate about the Bitcoin scaling issue? (112 points, 89 comments)
  27. 110 points, 4 submissions: kelluk
    1. What one can learn from browsing 30 million Ethereum addresses (72 points, 21 comments)
    2. I wanted to categorize all coins/tokens, and this is my proposal (23 points, 33 comments)
    3. Should whitepapers be understood by ordinary people? (10 points, 41 comments)
    4. Querying the Ethereum blockchain: how to & what to? (5 points, 5 comments)
  28. 107 points, 1 submission: NewDietTrend
    1. Outside of currency and voting, blockchain is awful and shouldnt be used. Can anyone explain where blockchain is worth the cost? (107 points, 166 comments)
  29. 105 points, 1 submission: insette
    1. /CryptoTech PSA: there are broadly TWO TYPES of Decentralized Exchanges. Which type are you investing in? (105 points, 55 comments)
  30. 103 points, 3 submissions: dtheme
    1. How to accept crypto payments for digital downloads if you are a small business? Solutions, e-commerce sites are lacking (46 points, 38 comments)
    2. How many 24 letter seeds and "Bitcoin" keys can there be? (34 points, 24 comments)
    3. Is there any reason why the big tech companies are not getting into crypto? (23 points, 36 comments)
  31. 103 points, 3 submissions: dvnielng
    1. Why do so many of these businesses need a token? (Unsure) (61 points, 86 comments)
    2. DAPPS - Only coins that have intrinsic value? Ethereum , Neo? (31 points, 10 comments)
    3. How could blockchain work for expensive purchases/escrow? (11 points, 2 comments)
  32. 101 points, 1 submission: kickso
    1. Is NANO everything it says it is? (101 points, 96 comments)
  33. 98 points, 3 submissions: heart_mind_body
    1. How can we breathe some life into this sub? (56 points, 22 comments)
    2. Can anyone give an example for a technology that provides a "public permissioned blockchain"? (28 points, 16 comments)
    3. Can we do a discussion on ICON and "clusters of private chains connected to a public chain" ? (14 points, 13 comments)
  34. 97 points, 8 submissions: kelraku
    1. Thoughts on Mimblewimble? (23 points, 13 comments)
    2. Has anyone looked at the lelantus protocol? (18 points, 6 comments)
    3. How much control do developers have over the coins (18 points, 6 comments)
    4. Lesser known protocols? (11 points, 17 comments)
    5. Zerocoin and Blockchain Analysis (9 points, 5 comments)
    6. Zerocoin vs Cryptonote (7 points, 14 comments)
    7. Lightning network privacy (6 points, 13 comments)
    8. Integrity of the DAG (5 points, 17 comments)
  35. 96 points, 6 submissions: blockstasy
    1. How to Get to One Million Devs (32 points, 12 comments)
    2. The Decade in Blockchain — 2010 to 2020 in Review (27 points, 4 comments)
    3. Ethereum by the Numbers – The Year of 2019 (26 points, 9 comments)
    4. Knowledge Drop: Mining and the role it plays with the Ethereum blockchain (5 points, 0 comments)
    5. A great article that explains Ethereum’s Muir Glacier Update (4 points, 0 comments)
    6. Youtube Silences Crypto Community (2 points, 6 comments)
  36. 93 points, 3 submissions: OneOverNever
    1. Which is the last WHITE PAPER you've read that's truly impacted you? (77 points, 81 comments)
    2. [CMV] Bitcoin's intrinsic technological value. (14 points, 29 comments)
    3. What are some weak points that still hold XVG back from becoming a top player in crypto? (Technically speaking, not marketing and etc.) (2 points, 19 comments)
  37. 93 points, 3 submissions: ryano-ark
    1. (ARK) ACES Completes Integration of ARK Channels for Two-way Transfers for Easy ICOs When Paired With ARK Deployer (Push-Button-Blockchains) (57 points, 5 comments)
    2. (ARK) ACES Releases Fast (Ansible) Deployments for all ACES Applications. (23 points, 4 comments)
    3. A Future of Cryptocurrencies and Blockchains (13 points, 3 comments)
  38. 92 points, 2 submissions: BobUltra
    1. Our blockchains are all centralized! (51 points, 34 comments)
    2. List of qualities needed to dethrone Bitcoin. (41 points, 43 comments)
  39. 90 points, 1 submission: refreshx2
    1. CMV: It doesn't make sense for (crypto)companies to create coins linked to their tech (90 points, 18 comments)
  40. 89 points, 1 submission: perceptron01
    1. What does Nano do better than Steem? (89 points, 55 comments)
  41. 87 points, 1 submission: Shuk
    1. How does one begin to develop an employable skill in blockchain development? (87 points, 25 comments)
  42. 87 points, 1 submission: conorohiggins
    1. I spent three weeks researching and writing a huge guide to stablecoins. Enjoy! (87 points, 36 comments)
  43. 86 points, 1 submission: Bacon_Hero
    1. ELI5: Why did it take so long for blockchain technology to be created? (86 points, 66 comments)
  44. 85 points, 3 submissions: theFoot58
    1. If crypto now is like 'the Internet' of the past, where are we? (65 points, 53 comments)
    2. If the Internet had its Genesis Block, what would it be? (14 points, 9 comments)
    3. Coin grouping - ruby and CryptoCompare API (6 points, 1 comment)
  45. 85 points, 1 submission: youngm2
    1. Which decentralised exchange has the most promise for 2018? (85 points, 89 comments)
  46. 84 points, 4 submissions: bLbGoldeN
    1. On Mass Adoption of Cryptocurrencies (28 points, 68 comments)
    2. Join the Bloom team for our first tech AMA tomorrow (Tuesday, March 13th) at 7 PM GMT! (23 points, 2 comments)
    3. Join the Decred team for an AMA - Friday, June 1st from 19:00 to 22:00 UTC (17 points, 10 comments)
    4. Join the district0x team for an AMA Monday, April 2nd at 5:00 PM (GMT) (16 points, 0 comments)
  47. 82 points, 2 submissions: SubsequentDownfall
    1. Has a 51% attack ever been witnessed? (45 points, 46 comments)
    2. Is a DAG coin like RaiBlocks able to be private like Monero? (37 points, 40 comments)
  48. 82 points, 2 submissions: guidre
    1. Tron and other source Code (42 points, 24 comments)
    2. Why Will companies adopt blockchain, the user interface is complex and i'm not sure that many companies want all their internal dealings made public. (40 points, 19 comments)
  49. 81 points, 4 submissions: solar128
    1. New Atomic Swap Tools Released (35 points, 4 comments)
    2. Using Blockchain to make a censorship-resistant Reddit (28 points, 14 comments)
    3. Best security practices for addressing Spectre & Meltdown (13 points, 0 comments)
    4. Influence of on-chain governance weighted by wealth - good or bad? (5 points, 2 comments)
  50. 81 points, 2 submissions: Blockchainsapiens
    1. Blockchain study finds 0.00% success rate and vendors don't call back when asked for evidence (47 points, 30 comments)
    2. The elephant in the room: would the public ever use a volatile currency over a stable currency? (34 points, 45 comments)
  51. 81 points, 1 submission: Mycryptopedia
    1. Understanding the Tech Behind RaiBlocks (81 points, 7 comments)
  52. 81 points, 1 submission: davidvanbeveren
    1. Article thoroughly analysing / comparing IOTA and RaiBlocks (x-post /CryptoCurrency) (81 points, 10 comments)
  53. 77 points, 4 submissions: DeleteMyOldAccount
    1. HD Wallets Explained: What they are, and how to make them coin agnostic (28 points, 11 comments)
    2. Bitcoin Cash May 15th fork (23 points, 22 comments)
    3. So you want to build a Bitcoin HD wallet? Part 1 (23 points, 3 comments)
    4. Applications of Blockchain in Supply Chain (3 points, 9 comments)
  54. 76 points, 3 submissions: kryptofinger
    1. Why would anyone bother using any DPOS coins for dapps like Eos over normal systems like AWS? (44 points, 104 comments)
    2. Could a state backed privacy coin work? (22 points, 32 comments)
    3. Thoughts on Elastos? (10 points, 8 comments)
  55. 76 points, 1 submission: francohab
    1. 55% of the Nano representative nodes are "official representatives", presumably held by developers. How big of an issue is that? (76 points, 46 comments)
  56. 75 points, 2 submissions: MerkleChainsaw
    1. The biggest challenge for cryptocurrencies and how to mitigate it (73 points, 37 comments)
    2. Short and long term design tradeoffs in crypto (2 points, 2 comments)
  57. 75 points, 1 submission: jatsignwork
    1. Raiblocks & Spam (75 points, 60 comments)
  58. 74 points, 1 submission: behindtext
    1. Hello, this is Jake Yocom-Piatt. Ask me anything about Decred! (74 points, 49 comments)
  59. 73 points, 2 submissions: TexasRadical83
    1. Why use a new "currency" at all? (40 points, 48 comments)
    2. Why are big price increases for crypto a good thing? (33 points, 41 comments)

Top Commenters

  1. Neophyte- (1649 points, 746 comments)
  2. ndha1995 (583 points, 98 comments)
  3. turtleflax (406 points, 116 comments)
  4. senzheng (326 points, 193 comments)
  5. holomntn (294 points, 40 comments)
  6. manly_ (286 points, 43 comments)
  7. signos_de_admiracion (250 points, 18 comments)
  8. fgiveme (231 points, 77 comments)
  9. crypto_kang (222 points, 45 comments)
  10. jatsignwork (220 points, 37 comments)
  11. GainsLean (218 points, 76 comments)
  12. benthecarman (211 points, 48 comments)
  13. rockyrainy (200 points, 39 comments)
  14. hungryforitalianfood (197 points, 58 comments)
  15. rocksolid77 (190 points, 20 comments)
  16. bannercoin (189 points, 11 comments)
  17. insette (181 points, 47 comments)
  18. DiogenicOrder (175 points, 41 comments)
  19. islanavarino (173 points, 51 comments)
  20. behindtext (172 points, 14 comments)
  21. takitus (171 points, 25 comments)
  22. sukitrebek (170 points, 42 comments)
  23. UnknownEssence (170 points, 31 comments)
  24. crypto_ha (170 points, 26 comments)
  25. AlexCoventry (167 points, 17 comments)
  26. DragonWhsiperer (165 points, 38 comments)
  27. stop-making-accounts (164 points, 57 comments)
  28. KnifeOfPi2 (157 points, 13 comments)
  29. Edgegasm (156 points, 42 comments)
  30. ippond (152 points, 15 comments)
  31. dontlikecomputers (151 points, 61 comments)
  32. QRCollector (150 points, 46 comments)
  33. alexrecuenco (145 points, 18 comments)
  34. BobUltra (144 points, 88 comments)
  35. SpamCamel (135 points, 22 comments)
  36. InterdisciplinaryHum (133 points, 107 comments)
  37. theglitteringone (132 points, 10 comments)
  38. ChocolateSunrise (128 points, 23 comments)
  39. PM_ME_UR_QUINES (125 points, 4 comments)
  40. narwhale111 (122 points, 15 comments)
  41. pepe_le_shoe (121 points, 47 comments)
  42. Darius510 (119 points, 39 comments)
  43. glen-hodl (118 points, 21 comments)
  44. HOG_ZADDY (117 points, 23 comments)
  45. coranos2 (116 points, 44 comments)
  46. etherenvoy (116 points, 15 comments)
  47. johnny_milkshakes (115 points, 55 comments)
  48. galan77 (115 points, 52 comments)
  49. hybridsole (113 points, 40 comments)
  50. funciton (113 points, 8 comments)
  51. Mr0ldy (110 points, 24 comments)
  52. Corm (109 points, 42 comments)
  53. cryptoscopia (109 points, 7 comments)
  54. ReportFromHell (106 points, 39 comments)
  55. broscientologist (105 points, 26 comments)
  56. straytjacquet (104 points, 28 comments)
  57. Quadling (101 points, 24 comments)
  58. BlockEnthusiast (101 points, 17 comments)
  59. thats_not_montana (99 points, 37 comments)
  60. TheRealMotherOfOP (98 points, 27 comments)
  61. yarauuta (96 points, 11 comments)
  62. pegasuspect93 (96 points, 1 comment)
  63. andrew_bao (93 points, 40 comments)
  64. samdotla (93 points, 6 comments)
  65. melodious_punk (91 points, 34 comments)
  66. Mquantum (91 points, 31 comments)
  67. TJ_Hooker15 (91 points, 27 comments)
  68. NoFaptain99 (91 points, 3 comments)
  69. ilielezi (87 points, 10 comments)
  70. Raapop (87 points, 2 comments)
  71. Allways_Wrong (86 points, 36 comments)
  72. bLbGoldeN (86 points, 19 comments)
  73. ResIpsaLoquiturrr (86 points, 15 comments)
  74. kabelman93 (85 points, 29 comments)
  75. no_pants_gamer (84 points, 9 comments)
  76. AnkurTechracers (83 points, 16 comments)
  77. ric2b (83 points, 11 comments)
  78. Big_Goose (83 points, 10 comments)
  79. Lifeistooshor1 (82 points, 21 comments)
  80. vornth (82 points, 11 comments)
  81. Sargos (81 points, 25 comments)
  82. refreshx2 (81 points, 16 comments)
  83. Qwahzi (78 points, 27 comments)
  84. StupidRandomGuy (77 points, 35 comments)
  85. WikiTextBot (77 points, 24 comments)
  86. SnootyEuropean (77 points, 5 comments)
  87. cryptogainz (76 points, 14 comments)
  88. frequentlywrong (76 points, 4 comments)
  89. the_defiant (76 points, 4 comments)
  90. BrangdonJ (75 points, 28 comments)
  91. hendrik_v (75 points, 7 comments)
  92. solar128 (74 points, 18 comments)
  93. foobazzler (74 points, 8 comments)
  94. ginger_beer_m (73 points, 35 comments)
  95. kAhmij (73 points, 25 comments)
  96. DeleteMyOldAccount (73 points, 20 comments)
  97. sn0wr4in (73 points, 9 comments)
  98. Dyslectic_Sabreur (72 points, 5 comments)
  99. X7spyWqcRY (71 points, 8 comments)
  100. Krapser (70 points, 5 comments)

Top Submissions

  1. A Guided Reading of Bitcoin’s Original White Paper by Realness100 (202 points, 10 comments)
  2. From a technical standpoint: Why does every blockchain projects need their own coins? by HSPremier (181 points, 50 comments)
  3. Bitcoin Gold hit by Double Spend Attack (51% attack). The Attacker reversed 22 blocks. by rockyrainy (179 points, 102 comments)
  4. Why white papers in crypto world are so unprofessional? by ilielezi (175 points, 88 comments)
  5. My brief observation of most common Consensus Algorithms by tracyspacygo (159 points, 49 comments)
  6. Proof-of-Approval: Stake Based, 1 Block Finality & History Attack Defense by shunsaitakahashi (147 points, 4 comments)
  7. "Do you need a Blockchain?" - this paper is fantastic, everyone should read this before evaluating a coin and if requires a block chain to solve a solution the coin is promising to solve. by Neophyte- (136 points, 41 comments)
  8. Technical comparison of LIGHTNING vs TANGLE vs HASHGRAPH vs NANO by Qwahzi (133 points, 37 comments)
  9. Everytime I try to investigate the technology behind Cardano(Ada), I come across the words "scientific" and "peer-reviewed" over and over but almost no actual details. Can someone fill how this coin actually works and where they are in development? by RufusTheFirefly (126 points, 49 comments)
  10. How do we change the culture around cryptocurrency? by FashionistaGuru (118 points, 54 comments)

Top Comments

  1. 160 points: holomntn's comment in ELI5: Why did it take so long for blockchain technology to be created?
  2. 121 points: KnifeOfPi2's comment in How do we change the culture around cryptocurrency?
  3. 105 points: theglitteringone's comment in Outside of currency and voting, blockchain is awful and shouldnt be used. Can anyone explain where blockchain is worth the cost?
  4. 102 points: benthecarman's comment in If crypto now is like 'the Internet' of the past, where are we?
  5. 96 points: pegasuspect93's comment in If crypto now is like 'the Internet' of the past, where are we?
  6. 95 points: bannercoin's comment in Realistically, why would anybody expect the startup crypto platforms to beat out the corporate giants who are developing their own Blockchain as a Service (BaaS) solutions? Ex. IBM, SAP, JP Morgan...
  7. 83 points: AlexCoventry's comment in Ethereum private key with all zeroes leads to an account with 5000$ on it
  8. 82 points: deleted's comment in Is blockchain really useful ?
  9. 81 points: signos_de_admiracion's comment in Why white papers in crypto world are so unprofessional?
  10. 78 points: NoFaptain99's comment in Why do so many of these businesses need a token? (Unsure)
Generated with BBoe's Subreddit Stats
submitted by subreddit_stats to subreddit_stats [link] [comments]

Jews have real life time machine(s) and they want me to think that particle accelerators are actually time machines.

Previous post was deleted by a mod because of rule 4. To give me the impression that not everyone on the internet know who I am perhaps? Well it's not gonna work. The mods here even want me to know that they know who I am which is why the new mod account OB1_kenobi. Anyway re-posting with possibly threatening language removed and some other changes/additions. 🤷🏻‍♂️
All jews know who I am in real life and are "watching" me Truman Show style not just in the present but also in the future. How cool is that? They want me to think that particle accelerators are actually time machines. There is even a documentary called "The World's First Time Machine" suggesting that all they can do with their time machines is receive messages from the future (https://www.imdb.com/title/tt0867212/). As shown in a South Park episode also. They had phones that could be used to call people in the past but they were meant for prank calls only. 🤣
By now I already think that the internet is just AOL. A = me (aMErica?); Me = Satan; "Satan Online" (I am Satan apparently 🤣). So everyone on the internet already know about the existence of time machine(s) and other advanced tech. Also noticed that country names may be fake so everyone in the world may indeed know who I am in real life. But posting this just in case jews also have mass "neuralization" tech as shown at the end of the movie Men In Black 2. Or like that Steve Carell movie (Date Night) where his character gave money to scammers saying that he knew they were scammers but was giving them money anyway, just in case they were not.
The jews may have seen that the "end is nigh" with their time machine(s) and instead of "repenting" they came up with the "Q psyop" to try and save their jew world. 🤣 And it seems like a generational psyop at this point because they even used their time machine(s) in the Charlie Chaplin movie "Modern Times" (see, it even has "time" in it 🤣).
The jews have been "showing off" their time machine(s) to me using their jew media. It seems to me now that ALL media is jew media. TV shows, movies, music, video games, news, books, etc. And it's not just hollywood but also bollywood, tollywood, rollywood and whatever other "woods" there are. They all know who I am in real life apparently. Combined with their remote mind surveillance/control tech (or whatever it is they call it) they can make it seem like the actors in TV shows or movies know what I am thinking/doing while watching a particular scene (sometimes even if I am within earshot). And now that I know, I can even make fun of the actors just by thinking. I also tried looking up some of their death days (in case of old actors in old movies) and letting them know when they are gonna die but they have put up fake death days and causes of death on sites like imdb and wikipedia, and in some cases not mentioning death days at all. For example, when I was a kid I heard that Charlie Chaplin was apparently choked to death by his fellow actors and everyone thought they were acting, whereas in Charlie Chaplin's wikipedia entry it says that he died in his sleep. 🤷🏻‍♂️ I also managed to show some of them what they would look like in the future (jewesses mostly 😁) because of which they even made it difficult to find newer photos of them in imdb or not posting photos at all. 🤣
Oh yes, the jews can look up their actual death days using their time machine(s) but don't because it may be a "Brave Jew World" but it's not that brave. 🤣 Was also reminded of the website deathclock.com and noticed they used their time machine(s) to leave messages for me (the emails sent to the "owner" of the website and his replies were actually meant for me). And whatever happened to stickdeath.com? 🤣 I am guessing the emails posted on that site and the owner's replies were also meant for me. Since they have time machine(s), they know which websites I will be visiting and when, and can leave messages meant for me beforehand on comment sections, forums, etc.
They are also showing off their time machine(s) using video games like GTA V. For example I replayed the "Repossession" mission (https://gta.fandom.com/wiki/Repossession) just after buying a motorcycle last year. The motorcycle just so happens to be a TVS Apache (https://tvsmotor.com) and one of the characters mentions having "Apache" blood. Not sure if the jews wanted me to buy the motorcycle or not but I believe they most likely wanted me to buy the TVS NtorQ (it had bluetooth and everything 🤣). Now that I have already purchased the Apache, they have added bluetooth and electronic fuel injection to the 2020 model and I am stuck with no bluetooth and a carburetor instead. 😒 They also have a scooter called Jupiter (not Saturn 🤣).
Also realized that I am supposed to be the crazy frog (the most annoying thing in the world; Satan is also supposed to be pepe the frog 🤷🏻‍♂️) - https://www.youtube.com/watch?v=k85mRPqvMbE (as foretold by jews 🤣)
When playing Assassin's Creed I noticed the message when the game is launched claiming that the game was "made by a mulitcultural team of various religious faiths and beliefs" and found it odd at the time. Now I realize it's because the game was actually made by a "multicultural" team of jews. Didn't pay much attention to the story but I am sure they used their time machine(s) on that game also. And when playing Forza Horizon 4 recently, they "gifted" me with a "Santa" outfit trying to hint that they know who I am and that Satan is also supposed to be Santa. That's why there was that movie "Bad Santa" I am guessing. 🤣
The first time I thought someone out there definitely has time machines is when I was watching the "Timeless" episode of "Star Trek: Voyager" (https://memory-alpha.fandom.com/wiki/Timeless_(episode) ). I was having salami sandwiches during the following scene and it was technically "lunch".
"Shield Generators?" "Online." "Plasma flow?" "Stable." "Comm. link?" "Secure." "Lunch?" "(pause) Salami sandwiches."
  • Harry Kim and Chakotay, just before entering the slipstream in the Delta Flyer
This happened either in 2016 or 2017 whereas the episode was apparently made in 1998. Didn't even notice the name of the episode at the time and only noticed when I looked it up again and posted about it on the 8chan "qresearch" board. I also thought of the possiblity that I am living in a simulation or something and that the episode was being "generated" or "rendered" live but that was not the case since I later noticed that such things happened even in TV shows that I had already watched before and remembered watching. For example, cartoons like Swat Kats (9/11 is just fake news meant for Satan; same goes for 26/11 I am guessing but Satan didn't pay much attention to it but did theorize that the US was responsible for that also 🤣) and Dexter's Laboratory.
Anyway, only after watching the entire first season of "Quantum Leap" and a few episodes of the second season (there is an episode where the main character says "oy vey, I am the rabbi") did I realize that it's none other than the jews who have time machine(s). I posted about jews having time machine(s) on 8chan for a while and then stopped posting since I had come to the conclusion that everyone already knew since I had been remembering past events and even in real life people (I believe they are jews) were providing hints that they already know about time machine(s) and that they can "see" me. For example even when I am out riding my motorcycle, they bring cars and other vehicles in front of me with license plates like "1CQ" (I see Q?), "14CQ" (I foresee Q?), 12CQ (I too see Q?), etc. Satan is "Q" apparently. The "Q" from LGBTQ (I think it's supposed to be a replacement for P 😐). Yesterday there was a car with a "1AM" license plate and I correctly guessed that they may have seen me stay up till 1 am because of this post. 🤷🏻‍♂️
I believe Satan is also supposed to be "L", "G", "B", and "T". For example, they have a Satan/devil character in South Park but have also been making fun of me using Mr. Garrison (they also use other characters to make fun of me). He was supposed to be gay, but later becomes a "tranny" and also a "lesbian", and then becomes a man again. 🤣 Even when they were making fun of Trump using Mr. Garrison, they were actually making fun of Satan. 🤣 I only thought "cancel south park" because I thought they were making fun of Trump whereas they and even Trump were making fun of Satan. 🤣 Satan still wants South Park cancelled (that's why "tegridy farms" in the latest season I am guessing). Same goes for "The Simpsons" and "Family Guy". They did cancel "Family Guy" once, didn't they? Probably because they knew Satan would want it cancelled in the future because they were being anti-Trump. Satan wanted Trump to win but turns out he is just an actor and that it's a jewess run jew world. That's why they are unwilling to even put out fake news about Hillary being sent to jail (real Satan wants Hillary in jail). 🤣
Time machine(s) are also being used to produce the cartoon Teen Titans Go. Was thinking about pirating the show after finding it pretty funny despite the fact that they were making fun of me and this episode was airing at the time - https://teen-titans-go.fandom.com/wiki/BL4Z3 .
There is also this episode called "Quantum Fun" - https://teen-titans-go.fandom.com/wiki/Quantum_Fun .
It's a sad, rainy day outside in Jump City, and Robin's in a similarly depressing mood. Not bothering to get dressed, he merely wears his bath robe wit a defeated look on his face. The other Titans, noticing that Robin's looking out his temporary sadness curtain again, wonder what's got him down. He explains his worries about their lives not being real—that it's all just a computer simulation. Raven slaps him in anger for bringing this nonsense up again, and the other berate him for watching The Matrix again.
Since time machine(s) exist it's definitely possible that I am living in a simulation. 😢 Santa is also shown in the cartoon, by the way. 🤣
Song from the show making fun of Satan - https://www.youtube.com/watch?v=RvgYOIHtWDA (pyramid scheme money = Bitcoin!)
Anyway, since the jews have time machine(s) I believe now that all religions have been made up by them. Because Satan is also supposed to be Jesus, Shiva, Hanuman, etc. 🤣 They want me to think that particle accelerators are actually time machines and even have a Shiva statue at CERN ("gifted" by "desi" jews 🤣). That's why they were also posting about it on /conspiracy I believe. Like voat (goat), /conspiracy was also made for Satan I am guessing because Satan is a conspiracy nut. After reading fake news about bird flu, swine flu, etc. he thought perhaps some organization like PETA was genetically engineering them. But it turns out jews are "unofficial" cannibals so why would they care about other jews eating animals? Oh, and I believe voat was made so that Satan could "have his say" but someone banned one of Satan's voat accounts because they didn't like what Satan was saying. 🤣
Jews are hiding as Christians (forgot to add it previously 🤣), Hindus, Muslims (not a good disguise 🤣), Sikhs, Buddhists, Scientologists, Satanists (they are actually anti-Satan 🤣), etc. I had noticed people in this region (fake country since it's a jew world; and fake name based on Satan's real life name) with odd looking noses before but didn't know at the time that they were supposed to be jew noses (they are "desi" jews 🤣). I noticed that some of them are using the coronavirus fake news as an excuse to hide their jew noses with masks (that's the theory anyway). I now assume that everyone with any genetic defects whatsoever (like male pattern baldness) are also jews. But I also believe that it's possible that everyone at this point are jews/have jewish ancestry. Pure blood jews (they have the most genetic defects), half blood jews or mud blood jews (Harry Potter terminology). Satan is also supposed to be Harry Potter apparently (lightning shaped scar; mark of the beast 🤣; half blood?). But it's also possible that "goyim" still exist and the jews have simply told them something like "oy vey, goyim, trust the plan, we are trying to save the jew world--I mean world, from Satan". Who knows (they do), maybe things are going according to their "plan". Maybe Satan buying that motorcycle was part of the "plan" all along. 🤷🏻‍♂️
Of course, if everybody knows who I am, then there is also the possibility that I have thought about before that you are all NPCs and I am the only one real living in a completely fake world. That's why there were all those "NPC" memes and fake news about them being "dehumanizing". 🤣 Jews are just acting like the actors in Truman Show (the ones that were pretending to be his friends and family), they are definitely not NPCs even though they have been behaving like NPCs when around Satan. Anyway, I have to wait for "real time" to tell me what's what. "Fake time" (opposite of real time? 🤣) has already told the jews (or whoevewhatever they are) what's going to happen in the future and may have also mind fucked them in the process. 🤣
Anyway, the jews have time machine(s) and therefore other advanced tech (like remote mind surveillance/control tech), they know what's going to happen in the future and may have seen the end of their jew world and think/know that "Satan" is reponsible somehow and apparently I am "Satan". I even remember reading fake news about Trump winning and end times "prophecies" coming true on an "Israeli" (also fake name? Israel is not "real"?) news site.
Of course, I have no memories of being "Satan" or whatever so it's possible the jews did something to wipe my "satanic" memories which may also be the reason that I am somewhat retarded (I even had a "I am retarded?" moment like in the Quantum Leap episode "Jimmy") which the jews like to describe as autism, ass burgers, etc. 🤣 But since they have been reading my thoughts and watching me all these years (with "eye phones" as shown in that Futurama episode?), there may have been coincidences from my side because of which they may have thought that Satan is only pretending to be retarded and knows who he is. Perhaps they were not coincidences. I don't know (मैंने कुछ नहीं पता 🤣). But maybe the jews do because they have REAL LIFE TIME MACHINE(S). ¯_(ツ)_/¯
Last time I am posting. Won't be posting again if deleted. 🤷🏻‍♂️
submitted by rcspy to conspiracy [link] [comments]

Bitcoin and Quantum Computing  Are Quantum Computers a Threat to Bitcoin ? Bitcoin Q&A: Migrating to post-quantum cryptography Is Quantum Computing a threat to Bitcoin? Can quantum computers crack bitcoin? - YouTube Bitcoin Q&A: Is Quantum Computing a Threat? - YouTube

Quantum Resistant Ledger (QRL) Review []. Based upon the understanding that popular existing cryptographic signature schemes (such as ECDSA) in the cryptocurrency space are vulnerable to a sufficiently powerful quantum computer running Shor’s algorithm, QRL is addressing what will be a singular threat to the security of cryptocurrency going forward – the inevitability of quantum computing. I m not the admin. Listed on monitor. : Start: 22 09 2019 [url= [ url] About: QuantumAI.trade is a successful Quantum Computing and A.I-oriented investment company . Our solutions are complex, automated and using the market leading self-learning trad.. As the threat of quantum computing materializes, Bitcoin would be able to adjust gradually by evolving to adopt more quantum-resistant cryptography such as Merkle Schemes, Lamport’s Signature, and Secret Sharing. In the meantime, new versions of Quantum Money are being created, such as public and private quantum money, or semi-quantum money. Long term, the mathematical assurances provided by ... Quantum computing and Blockchain [] QC attacks []. The most dangerous attack by quantum computers is against public-key cryptography. On traditional computers, it takes on the order of 2 128 basic operations to get the Bitcoin private key associated with a Bitcoin public key. This number is so massively large that any attack using traditional computers is completely impractical. A “quantum fridge” keeps qubits at the super-low temperature required for computing, Image from Bloomberg. Quantum computers might also be able to attack Bitcoin at its source by implementing so-called 51 percent attacks by outracing traditional miners during the mining process, but the possibility of breaking private keys is the real threat in the Bitcoin arena.

[index] [1036] [5037] [34166] [25057] [32972] [32784] [24345] [51038] [30316] [30770]

Bitcoin and Quantum Computing Are Quantum Computers a Threat to Bitcoin ?

Watch the latest Bitcoin.com Weekly Update where we touch on Wirecard filing for insolvency, what impact advancements in quantum computing will have Bitcoin, miners selling 9,000 BTC and the ... Is quantum computing a threat to Bitcoin? How can Bitcoin become more secure against a quantum computing attack? Will this upgrade require moving coins to ne... Subscribe for daily crypto videos : https://goo.gl/zm1G9x Bitcoin will be the new store of value and crypto will be the new technology evolution and I want to be a part of that trough this channel ... Quantum Computing is hailed as a technical breakthrough and a lot of people are scared by it. What's the engineering reality? What can it do to Bitcoin? Part 1 of this question. https://twitter ... Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography there is a 20-30 year lifecycle for an algorithm before it gets exceeded by ...

#