Hi! I'm the solo developer of a social media platform, new religious movement, and religious organization. I've been working on this since early 2019. I've only told a few dozen people about it and I'm looking for feedback. Please ask me anything. Thanks!
A lot of this text was originally to be posted to changemyview because I'm looking to be challenged on my assumptions here, and my approach. I checked with the mods there and I can't find a way not to post it as promotion (which would violate the subreddit rules). The I considered posting it in philosophy and IAmA and it was a similar answer. To be clear: I support their decisions to not allow this post. There's a lot of reasons to be concerned about someone running up and saying "Hey! Do you wanna hear about my religion?" and I have total respect for anyone who says "No." I reached out to casualiama a few hours ago and haven't heard back. If they decide to lock or remove this I support their decision and will try another subreddit. I welcome lots and lots of questions about this project, I believe this project will be helpful, but I am open to having my view about the viability of this project changed. This is a big weird thing and I've been focusing on it alone for long time. This work has probably had a big impact on my objectivity. This didn't used to exist and maybe it doesn't need to. Or maybe it has some irredeemable flaw that I've failed to consider. I don't want to see this get launched if that's the case. The main cost of this project has been my time, and I've learned enough while doing it to justify the time spent on it even if I'm convinced this project isn't viable. I can't make any more progress alone and I need new people to get involved. This can change and it can evolve as it grows because I've tried to build it to be guided by new people. I hope that I've done a good job of building it that way. The fastest way to learn about this in order to ask me questions is by visiting the website. https://churchofearth.org/ (I sure hope that this post does well and I've set up the site well enough to accommodate the traffic.) (This text will contain many links to the website) (I'm really nervous about this)
Why have I done this?
I would describe this effort as coming out of the part of my brain that would be firing if I were an active survivalist/doomsday prepper. In 2019 I became very concerned about the state of the world, especially as I thought about what it will look like for the remainder of my life. It seemed logical to amass skills and resources in order to protect myself and the people around me. I had never focused on my own survival because I've lived a life of privilege, and then I realized that there were scenarios where my privilege would not protect me. During that research phase I came to the conclusion that I couldn't just turn inward. As people turn inward our shared challenges become harder to address. I started looking more into the good work people were doing all over the world. I looked outward for inspiration. There's lots of folks doing lots of amazing work trying to solve our shared challenges. At every level of society, in every region, in big ways and small ways. This is often a very helpful world. I started researching things and became less pessimistic about the future of our world. This doesn't mean there aren't a pile of challenges for us to solve, it means that I'm better able to see the people trying to solve our shared challenges. When I couldn't see them (and wasn't looking for them) the future of our world seemed much worse. I still see the darkness, and it's scary and overwhelming and huge, but now I see more light. This project represents what I was able to build with the skills and experience I had. This project started out as just a social media platform intended to connect people who wanted to help. While I was building that I discovered a faith within myself about the future. The new religious movement is the structure I've built to help grow this faith. It's based on religious humanism, which has been a thing for several hundred years. I stopped working heavily on this project in late 2019, and formally stopped on February 1st of 2020. I started it up again in April of 2020. There's a short post about it here.
Help others and you'll live in a more helpful world.
Improve yourself and you'll improve the world.
Consume less and you'll value what you have more.
People who feel the faith of the Church of Earth are called Helpers. There are no rituals to join this faith, although anyone can make rituals. Anyone can identify themselves as a Helper. Don't judge them by who they say they are, judge them by what they do. In their acts of faith they should be trying to help you, and only if you consent to their help. This faith is optional. No one can be forced to adopt this faith. You can't force a more helpful world on people, you can only help them build it.
The social media platform
The social media platform is built to help people grow this religion. It allows them to focus on activities that relate to the core beliefs of the Church of Earth. People do not need to share this faith to use this platform or use its features. The platform is anonymous. There are no user profiles. Every type of module can inspire almost any other type of module. The modules all have different functionality. This platform is complex software. Social Media Platforms like Facebook and Twitter are designed to be simple and addictive. Those are deliberate design choices intended to serve the goals of the organizations that built them. These goals relate to revenue generation through the use of user data. This organization has different goals, and one of those goals involves promoting hard work. There will be a learning curve with this platform. I'm the only one who has used it so far and I've probably failed to consider a lot of things. This platform will change over time as more skills and knowledge improve its construction. This platform can be considered one of our great works. I can tell you right now people will find a number of bugs on the platform. I am expecting something unexpected, critical, and stressful to happen once people start visiting this site. Please be kind and patient with this platform, and with me. I'm very tired. Upvotes/Downvites/Likes/Dislikes: The purpose of this platform is to help grow a more helpful world. The upvote/downvote button labels are: This is Helpful and This is Not Helpful. Everything added to this platform should be helpful, every post includes fields where you can describe who you're trying to help, and why. There are a limited number of votes that can be given every day. Creating content increases your votes for the day. The platform has the following modules:
Scriptures - journaling functionality intended to allow you to explore a subject. This could be a journal entry about your personal development, or a short story, or some introspection, or anything helpful you can possible think of that would be a lot of text. - Infographic
Sermons - Brief text snippets or links to external resources intended to inspire other users. This module is how we link to other sites, share other content, or say short messages.
Goals - Things you want to get done. You can add to the organizations goals, and the goals for the website. We can all work together. - Infographic
Prayers - Requests for help. If you need something you can ask the platform and hopefully someone will see it and help you. You can list the type of help you need. It's up to you to be realistic about what can be done on this platform. If your prayers aren't getting answered there are other tools to help you solve some problems. - Infographic
Rituals - Things you do alone or in groups to help you accomplish tasks or focus yourselves. Our species uses rituals to greet and communicate with each other. We have rituals that are events, or meals. We have rituals that involve many people singing or performing an action. The Church of Earth has not created any official rituals.
Missions - Events intended to bring people together to offer help in their communities. These can have rituals attached to them so that people know what social structure is expected when they meet.
The Gospel of the Church of Earth All of the content we create can be connected in a big, anonymous web of helpfulness. Any content type can inspire any other content type, except for prayers. Prayers can only be answered (publicly or privately depending on the type of prayer.) Blog posts by the Church of Earth can inspire content from users. The goals of the Church of Earth appear in the same module as the goals of individual users of this platform. Intentions When you post something you have to say who you think you're helping, and why. You also need to select a subcategory like "I am being thoughtful" or "I am being creative" or "I am being inspirational" or "I am being critical". This will help other users understand how to react to you in a way that contributes to meaningful interactions. It's just me right now, so that's pretty funny and awkward The platform is live. Anyone can create content. Accounts can only create one piece of content until their first contribution receives a vote by another user saying "This is Helpful". There are currently no users on the platform. I've created content but there's no one to say if it's helpful so I'm still a pending user. On September 24th, 1 year after I first posted the 3 core beliefs to the site, 5% of all pending users will be selected at random and added to the site. Those people will then be able to use the site, but their profiles will not indicate they were among the First Five. My account isn't any more likely to be added than anyone else. This is an act of faith. It doesn't take a lot of people to make big things happen and we're all capable of amazing things. That is the message this platform has been designed to share. Note: That doesn't mean there won't be an effort to understand the impact of spam comments, or content that violates the terms of service for this site. They'll be transparent though. It's unreasonable to think that people won't do silly things with a site like this on the internet. Silly things are fun. One of the "intentions" of the site is "the be creative".
The religious organization
This organization will have a different look depending on how successful it is. I've built it in the hope it will see a meaningful amount of adoption, but all of that can be scaled down and still be helpful. Even if it's just me feeling this way for the rest of my life I consider it a meaningful improvement to my worldview and personality. I'm fairly confident some unknown quantity of other people will also see the value in this and that we can build something together. The Church of Earth organization is the least planned out because it needs to be developed by people with greater specialization than me. The main points are this:
Governance will be handled democratically, through the Church of Earth platform, and it will include a random selection of top candidates. (This functionality hasn't been built yet)
There will be term limits for everyone. Especially me.
Governance of the organization will include people who do not identify as Helpers.
Compensation of employees will be nonstandard as well. Employees will be given baseline salaries for the region they live in, regardless of their role, and everyone will qualify for bonuses that will be given out by other employees.
Here's an infographic about this. The organization will be structured like a nonprofit and will prioritize pursuing goals that align with the 3 core beliefs of the Church of Earth faith. It will require donations, but the hope is that it will eventually develop revenue to be self sufficient. I have some ideas for revenue generation. They're not super innovative, they're just taking relevant things and doing them in a way that promotes the faith of the Church of Earth as it operates as a nonprofit entity in a capitalist economy. This business model is well developed in North America by other religious institutions. These are the best ideas I've come up with, but none of them can proceed until I find people more qualified than me to do this. It's very likely that I've failed to consider elements of these proposals.
Education: It should be possible to teach many subjects from a religiously helpful perspective. Helping people is a secular act, but the help at the core of the faith of the Church of Earth is not. On top of teaching specific programs from a helpful perspective, there could also be a seminary school where Preachers are trained.
Property Management: The Church of Earth can own property similarly to other non-profits or religious organizations. They can be governed in transparent and helpful ways. This can be as simple as free wifi, or as complex as community gardens and shared maintenance duties in order to build and maintain a small regional community.
The website can be modified to enable a lot of this stuff, including a transparent overview of building finances, public space scheduling and communications. Once we build a template for a type of property and its amenities, we can look for other properties to offer a similar experiences.
The physical structure that represents the Church of Earth in a region is called a Community Guild. These can have rental spaces similar to other community centers or churches, they'll also be hubs for community activity facilitated through the website.
Cryptocurrency: Because the amount of activity that can be accomplished on the platform per day is limited, we can create and assign a cryptocurrency token like Bitcoin whenever someone says "This is Helpful" and maintain a digital economy. Users of the platform can be paid to be helpful, and possibly engage in their faith if that applies to them.
This is by no means developed. There are a lot of hurdles to overcome before this can happen. I am very aware of the fact that what I'm proposing here is that a religious organization can create its own internal economy.
What should you know about me?
I wish I could be like Satoshi Nakamoto. That's the pseudonym of the person who created Bitcoin. We don't know for sure who actually created the code. They just worked on it, put it out there, and it went on to become something amazing and complex. I spent a long time trying to figure out how to do that with the Church of Earth. I absolutely love everything about this project but I want to minimize my involvement in it. I also think there will be negative impacts on me, and this organization, if people focus on me instead of the faith. The Church of Earth is about what everyone can do, together. I'm no more special than anyone else. I'm terribly imperfect. I'm also a 39 year old white Canadian guy. While I've faced many struggles I've lived a life of privilege. I don't speak for everyone, or to everyone. No one can. People face problems I couldn't even consider. My ability to help those people directly is limited, but I have the skillset required to build something that would allow others to help them. The world is hard, and harsh, and frustrating, and scary. It's also wonderful and amazing and beautiful. I think that if we all work together we can spend the rest of our lives deliberately building a better world for everyone, in big ways and small ways. Knowing that's happening makes me happy and it motivates me to work harder. I wasn't a religious person until I discovered this faith within myself. This faith has allowed me to focus myself towards something that I believe is helpful to my community. I think it can do the same for others. What do you think? Thanks for reading. Ask me anything, please.
in this post you will learn a little about publicly available information on malscripts what is a trojan.malscript? -a quick google search turns up this result from 2014 (outdated?)
Search Results (Featured snippet from the web) Systems Affected: Windows - Trojan. Malscript is a heuristic detection for Web-based malicious script files that exploit vulnerabilities and/or perform heap spraying.-Sep 3, 2014- -Trojan.Malscript | Symantec- -https://www.symantec.com › security-center › writeup-
-not very clear!... lets try learn some more!!.. *another quick google search gives up some information about other systems not just windows affected -If we add keywords like linux we get varied results such as this (albeit, older but w/e)
so given a couple quick searcheswe can guess a bit -we need: *java *HTML *access to the internet somehow (could be by an offline file touching an online source; this puts the item at risk for "contracting" offline ai or crawling codes) another way would be *write a "safe" code on here on reddit but its gonna take me time since reddit allows this:
if 1 * 2 < 3: print "hello, world!"
this can be achieved by possibly writing a code to a site that had malscripts already deployed such as an embed code, or request in an "iframe"
Alot of people may remember sites such as:
https://www.xanga.com and various other places; *these places allowed HTML editing for themes and overall page layout -sites such as http://www.neopets.com etc. had/have this ability as well. -these sites are great examples of how easy it could be to place an HTML or java malscript that was made to either be good/bad/both; especially now, given our extremely large usage of internet! Sure; #scareme... what can a trojan.malscript do! quick learned facts: -exploits an available resource via internets (lol) -is a form of 'script' (really generic term) that employs heuristic based approach; defined as and asked to google before:
What is a heuristic approach?- -“A heuristic technique, often called simply a heuristic, is any approach to problem solving, learning, or discovery that employs a practical method not guaranteed to be optimal or perfect, but sufficient for the immediate goals.-Feb 5, 2018- -Heuristic Approaches to Problem Solving- | -101 Computing- -https://www.101computing.net › heuristic-approaches-to-problem-solving-
-may perfrom heap spraying which is defined here
A heap spraying attack is a remote code execution exploit that allows the attacker to insert arbitrary code in the system's heap memory space. ... The spray is followed by exploit code that, when inserted into the heap memory, will exploit a weakness or vulnerability, allowing the code to execute on the system.-Aug 11, 2010- -Heap Spraying Buffer Overflow Attacks - Cisco.com- -https://tools.cisco.com › center › resources › security-alerts-announcement-
WAIT! isnt that good...or bad...or OMG wth! #notscared?scared? it really depends 0.o -why is there a malscript in the first place; this is a great place to start asking questions for any individual or business by asking what OS is being used and what version/type/grade/blahblah I use windows xp, windows xp is a "unsupported"(mostly) os - I use it to dissect information. its wonderful! also sucks sometimes when the software is riddled with holes and various other "things" shoutout to Microsoft for updates in DEC 2019! x<.3 Windows xp pro sp3 5.1.2600 x86 smbios2.4 I use AVG anti-virus with highest settings and personal settings that the free version can have get to know my computer better? #thisajoke?? Nah, over the years Ive collected knowledge and some more common answers to basic questions in cyber security, qustions like "what is a malscript"? have simple answers, mostly... things like these 5 objects can be defined as being malscript:
any word processor may or may not be defined as malscript if it can "spell check" your work or place a timestamp
third party input/output mechanism; things such as mouses, sd, usb, cd, internet(s) that crawl for information like web.archive, bitcoin code, cryptocode overall if it has a weakness to malscripted behaviours
there are MULTIPLE other reasons, one such problem is: mass-malware campaigns and adware from older computers attempting to propogate and control older versions of networks that no longer work as expected/coded to seek ^ this type of malscript"poorly planned, and hastily executed or outdated"; can have adverse impacts on the internet as a whole - not just for the computers expected to be impacted. ok, malscripts. so what can #I do? when approaching cyber security its easy to become overwhelmed by the amount of information that is available; to research; to dissect; to use as examples... what the best thing anyone or a group can do?; attempt to make an effort to learn about the item a bit before, using or expecting them to work a certain way; due to a biased info source like ones own also: seek outside sources, but also be careful an use knowledge seeked as knowledge that may or may not be "useful" for the current project or situation... this post was an attempt to gain knowledge and some skills in writing and information sharing. thanks everyone! hope you enjoy my reading material!! Have a Awwww-some new year! ReachOutForBits recommends "useless" backup scanning after securely and safely removing identifiable information before scanning at https://www.virustotal.com before resell of computer or devices ; in order to avoid costly data blunders such as ids/creds cloning phonenumber collection email collection by persistent threats that are EXTREMELY HARD TO DETECT ; even penetrating some hardwares with advanced capabilities such as "sleeping" AI or, Run-mocking AI! think of all the people who said AI will skynet us; maybe AI is just a stepping stone for some BAD F-IN MALWARE that someone has written that needs no C&C mechanism or user interaction at all - not the AI itself persay. this is one form of persistant threat that needs to be identified to ensure non-tainted, verifiable, security information results into the future and beyond... other threats include:
over-patriotic; otherwise defined as "EXTREMIST" - individuals of ANY COUNTRY, ANY RELIGION, ANY CREED, ANY BELIEF or OATH or CONSTITUTIONAL AGREEMENT.
fake bomb threats and faux-emergency calls
PAID INFORMANTS AND THEIR COUNTERPARTS
So called, anons, that gather in groups and communicate between each-other; effectively destroying the meaning of being ANON. singular noun
the types of people(s) that write their own definition at urbandictionary and then proceed to agree together that thats it.
ahha, hah..hahahah...this is funnny....get this:
-they also gather en-masse in attempts to overwhelm and proceed to cause irreprible cost or some form of damage - rarely peaceful anymore.
names like troll are no longer what they were, fictional characters under a bridge; troll is now Pseudonym for prankster(s) @ anycost
Crypto-currency Jackers who have designed tech to prevent proper payments and reward systems (at-source or in-transit) from being implemented; according to consensus.
Outdated, over-sourced(more than 10 downloads) malware
Junk and bloat that often comes preinstalled with no intention of caring whether or not the user will actually "use" it.
this type of item hogs CPU/GPU and introduces ill timed updates that cannot be controlled!
https://codevalley.com/whitepaper.pdf This document treats Emergent coding from a philosophical perspective. It has a good introduction, description of the tech and is followed by two sections on justifications from the perspective of Fred Brooks No Silver Bullet criteria and an industrialization criteria.
Mark Fabbro's presentation from the Bitcoin Cash City Conference which outlines the motivation, basic mechanics, and usage of Bitcoin Cash in reproducing the industrial revolution in the software industry.
Building the Bitcoin Cash City presentation highlighting how the emergent coding group of companies fit into the adoption roadmap of North Queensland.
Forging Chain Metal by Paul Chandler CEO of Aptissio, one of startups in the emergent coding space and which secured a million in seed funding last year.
Bitcoin Cash App Exploration A series of Apps that are some of the first to be built by emergent coding and presented, and in the case of Cashbar, demonstrated at the conference.
How does Emergent Coding prevent developer capture? A developer's Agent does not know what project they are contributing to and is thus paid for the specific contribution. The developer is controlling the terms of the payment rather than the alternative, an employer with an employment agreement. Why does Emergent Coding use Bitcoin BCH?
Both emergent coding and Bitcoin BCH are decentralized: As emergent coding is a decentralized development environment consisting of Agents providing respective design services, each contract received by an agent requires a BCH payment. As Agents are hosted by their developer owners which may be residing in one of 150 countries, Bitcoin Cash - an electronic peer-to-peer electronic cash system - is ideal to include a developer regardless of geographic location.
Emergent coding will increase the value of the Bitcoin BCH blockchain: With EC, there are typically many contracts to build an application (Cashbar was designed with 10000 contracts or so). EC adoption will increase the value of the Bitcoin BCH blockchain in line with this influx of quality economic activity.
Emergent coding is being applied to BCH software first: One of the first market verticals being addressed with emergent coding is Bitcoin Cash infrastructure. We are already seeing quality applications created using emergent coding (such as the HULA, Cashbar, PH2, vending, ATMs etc). More apps and tools supporting Bitcoin cash will attract more merchants and business to BCH.
Emergent coding increases productivity: Emergent coding increases developer productivity and reduces duplication compared to other software development methods. Emergent coding can provide BCH devs with an advantage over other coins. A BCH dev productivity advantage will accelerate Bitcoin BCH becoming the first global currency.
Emergent coding produces higher quality binaries: Higher quality software leads to a more reliable network.
1. Who/what is Code Valley? Aptissio? BCH Tech Park? Mining and Server Complex? Code Valley Corp Pty Ltd is the company founded to commercialize emergent coding technology. Code Valley is incorporated in North Queensland, Australia. See https://codevalley.com Aptissio Australia Pty Ltd is a company founded in North Queensland and an early adopter of emergent coding. Aptissio is applying EC to Bitcoin BCH software. See https://www.aptissio.com Townsville Technology Precincts Pty Ltd (TTP) was founded to bring together partners to answer the tender for the Historic North Rail Yard Redevelopment in Townsville, North Queensland. The partners consist of P+I, Conrad Gargett, HF Consulting, and a self-managed superannuation fund(SMSF) with Code Valley Corp Pty Ltd expected to be signed as an anchor tenant. TTP answered a Townsville City Council (TCC) tender with a proposal for a AUD$53m project (stage 1) to turn the yards into a technology park and subsequently won the tender. The plan calls for the bulk of the money is to be raised in the Australian equity markets with the city contributing $28% for remediation of the site and just under 10% from the SMSF. Construction is scheduled to begin in mid 2020 and be competed two years later. Townsville Mining Pty Ltd was set up to develop a Server Complex in the Kennedy Energy Park in North Queensland. The site has undergone several studies as part of a due diligence process with encouraging results for its competitiveness in terms of real estate, power, cooling and data.
TM are presently in negotiations with the owners of the site and is presently operating under an NDA.
The business model calls for leasing "sectors" to mining companies that wish to mine allowing companies to control their own direction.
Since Emergent Coding uses the BCH rail, TM is seeking to contribute to BCH security with an element of domestic mining.
TM are working with American partners to lease one of the sectors to meet that domestic objective.
The site will also host Emergent Coding Agents and Code Valley and its development partners are expected to lease several of these sectors.
TM hopes to have the site operational within 2 years.
2. What programming language are the "software agents" written in. Agents are "built" using emergent coding. You select the features you want your Agent to have and send out the contracts. In a few minutes you are in possession of a binary ELF. You run up your ELF on your own machine and it will peer with the emergent coding and Bitcoin Cash networks. Congratulations, your Agent is now ready to accept its first contract. 3. Who controls these "agents" in a software project You control your own Agents. It is a decentralized development system. 4. What is the software license of these agents. Full EULA here, now. A license gives you the right to create your own Agents and participate in the decentralized development system. We will publish the EULA when we release the product. 5. What kind of software architecture do these agents have. Daemons Responding to API calls ? Background daemons that make remote connection to listening applications? Your Agent is a server that requires you to open a couple of ports so as to peer with both EC and BCH networks. If you run a BCH full node you will be familiar with this process. Your Agent will create a "job" for each contract it receives and is designed to operate thousands of jobs simultaneously in various stages of completion. It is your responsibility to manage your Agent and keep it open for business or risk losing market share to another developer capable of designing the same feature in a more reliable manner (or at better cost, less resource usage, faster design time etc.). For example, there is competition at every classification which is one reason emergent coding is on a fast path for improvement. It is worth reiterating here that Agents are only used in the software design process and do not perform any role in the returned project binary. 6. What is the communication protocol these agents use. The protocol is proprietary and is part of your license. 7. Are the agents patented? Who can use these agents? It is up to you if you want to patent your Agent the underlying innovation behind emergent coding is _feasible_ developer specialization. Emergent coding gives you the ability to contribute to a project without revealing your intellectual property thus creating prospects for repeat business; It renders software patents moot. Who uses your Agents? Your Agents earn you BCH with each design contribution made. It would be wise to have your Agent open for business at all times and encourage everyone to use your design service. 8. Do I need to cooperate with Code Valley company all of the time in order to deploy Emergent Coding on my software projects, or can I do it myself, using documentation? It is a decentralized system. There is no single point of failure. Code Valley intends to defend the emergent coding ecosystem from abuse and bad actors but that role is not on your critical path. 9. Let's say Electron Cash is an Emergent Coding project. I have found a critical bug in the binary. How do I report this bug, what does Jonald Fyookball need to do, assuming the buggy component is a "shared component" puled from EC "repositories"? If you built Electron Cash with emergent coding it will have been created by combining several high level wallet features designed into your project by their respective Agents. Obviously behind the scenes there are many more contracts that these Agents will let and so on. For example the Cashbar combines just 16 high level Point-of-Sale features but ultimately results in more than 10,000 contracts in toto. Should one of these 10,000 make a design error, Jonald only sees the high level Agents he contracted. He can easily pinpoint which of these contractors are in breach. Similarly this contractor can easily pinpoint which of its sub-contractors is in breach and so on. The offender that breached their contract wherever in the project they made their contribution, is easily identified. For example, when my truck has a warranty problem, I do not contact the supplier of the faulty big-end bearing, I simply take it back to Mazda who in turn will locate the fault. Finally "...assuming the buggy component is a 'shared component' puled from EC 'repositories'?" - There are no repositories or "shared component" in emergent coding. 10. What is your licensing/pricing model? Per project? Per developer? Per machine? Your Agent charges for each design contribution it makes (ie per contract). The exact fee is up to you. The resulting software produced by EC is unencumbered. Code Valley's pricing model consists of a seat license but while we are still determining the exact policy, we feel the "Valley" (where Agents advertise their wares) should charge a small fee to help prevent gaming the catalogue and a transaction fee to provide an income in proportion to operations. 11. What is the basic set of applications I need in order to deploy full Emergent Coding in my software project? What is the function of each application? Daemons, clients, APIs, Frontends, GUIs, Operating systems, Databases, NoSQLs? A lot of details, please. There's just one. You buy a license and are issued with our product called Pilot. You run Pilot (node) up on your machine and it will peer with the EC and BCH networks. You connect your browser to Pilot typically via localhost and you're in business. You can build software (including special kinds of software like Agents) by simply combining available features. Pilot allows you to specify the desired features and will manage the contracts and decentralized build process. It also gives you access to the "Valley" which is a decentralized advertising site that contains all the "business cards" of each Agent in the community, classified into categories for easy search. If we are to make a step change in software design, inventing yet another HLL will not cut it. As Fred Brooks puts it, an essential change is needed. 12. How can I trust a binary when I can not see the source? The Emergent Coding development model is very different to what you are use to. There are ways of arriving at a binary without Source code. The Agents in emergent coding design their feature into your project without writing code. We can see the features we select but can not demonstrate the source as the design process doesn't use a HLL. The trust model is also different. The bulk of the testing happens _before_ the project is designed not _after_. Emergent Coding produces a binary with very high integrity and arguably far more testing is done in emergent coding than in incumbent methods you are used to. In emergent coding, your reputation is built upon the performance of your Agent. If your Agent produces substandard features, you are simply creating an opportunity for a competitor to increase their market share at your expense. Here are some points worth noting regarding bad actor Agents:
An Agent is a specialist and in emergent coding is unaware of the project they are contributing to. If you are a bad actor, do you compromise every contract you receive? Some? None?
Your client is relying on the quality of your contribution to maintain their own reputation. Long before any client will trust your contributions, they will have tested you to ensure the quality is at their required level. You have to be at the top of your game in your classification to even win business. This isn't some shmuck pulling your routine from a library.
Each contract to your agent is provisioned. Ie you advertise in advance what collaborations you require to complete your design. There is no opportunity for a "sign a Bitcoin transaction" Agent to be requesting "send an HTTP request" collaborations.
Your Agent never gets to modify code, it makes a design contribution rather than a code contribution. There is no opportunity to inject anything as the mechanism that causes the code to emerge is a higher order complexity of all Agent involvement.
There is near perfect accountability in emergent coding. You are being contracted and paid to do the design. Every project you compromise has an arrow pointed straight at you should it be detected even years later.
Security is a whole other ball game in emergent coding and current rules do not necessarily apply. 13. Every time someone rebuilds their application, do they have to pay over again for all "design contributions"? (Or is the ability to license components at fixed single price for at least a limited period or even perpetually, supported by the construction (agent) process?) You are paying for the design. Every time you build (or rebuild) an application, you pay the developers involved. They do not know they are "rebuilding". This sounds dire but its costs far less than you think and there are many advantages. Automation is very high with emergent coding so software design is completed for a fraction of the cost of incumbent design methods. You could perhaps rebuild many time before matching incumbent methods. Adding features is hard with incumbent methods "..very few late-stage additions are required before the code base transforms from the familiar to a veritable monster of missed schedules, blown budgets and flawed products" (Brooks Jr 1987) whereas with emergent coding adding a late stage feature requires a rebuild and hence seamless integration. With Emergent Coding, you can add an unlimited number of features without risking the codebase as there isn't one. The second part of your question incorrectly assumes software is created from licensed components rather than created by paying Agents to design features into your project without any licenses involved. 14. In this construction process, is the vendor of a particular "design contribution" able to charge differential rates per their own choosing? e.g. if I wanted to charge a super-low rate to someone from a 3rd world country versus charging slightly more when someone a global multinational corporation wants to license my feature? Yes. Developers set the price and policy of their Agent's service. The Valley (where your Agent is presently advertised) presently only supports a simple price policy. The second part of your question incorrectly assumes features are encumbered with licenses. A developer can provide their feature without revealing their intellectual property. A client has the right to reuse a developer's feature in another project but will find it uneconomical to do so. 15. Is "entirely free" a supported option during the contract negotiation for a feature? Yes. You set the price of your Agent. 16. "There is no single point of failure." Right now, it seems one needs to register, license the construction tech etc. Is that going to change to a model where your company is not necessarily in that loop? If not, don't you think that's a single point of failure? It is a decentralized development system. Once you have registered you become part of a peer-to-peer system. Code Valley has thought long and hard about its role and has chosen the reddit model. It will set some rules for your participation and will detect or remove bad actors. If, in your view, Code Valley becomes a bad actor, you have control over your Agent, private keys and IP, you can leave the system at any time. 17. What if I can't obtain a license because of some or other jurisdictional problem? Are you allowed to license the technology to anywhere in the world or just where your government allows it? We are planning to operate in all 150 countries. As ec is peer-to-peer, Code Valley does not need to register as a digital currency exchange or the like. Only those countries banning BCH will miss out (until such times as BCH becomes the first global electronic cash system). 18.
For example the Cashbar combines just 16 high level Point-of-Sale features but ultimately results in more than 10,000 contracts in toto.
It seems already a reasonably complex application, so well done in having that as a demo. Thank you. 19. I asked someone else a question about how it would be possible to verify whether an application (let's say one received a binary executable) has been built with your system of emergent consensus. Is this possible? Yes of course. If you used ec to build an application, you can sign it and claim anything you like. Your client knows it came from you because of your signature. The design contributions making up the application are not signed but surprisingly there is still perfect accountability (see below). 20. I know it is possible to identify for example all source files and other metadata (like build environment) that went into constructing a binary, by storing this data inside an executable. All metadata emergent coding is now stored offline. When your Agent completes a job, you have a log of the design agreements you made with your peers etc., as part of the log. If you are challenged at a later date for breaching a design contract, you can pull your logs to see what decisions you made, what sub-contracts were let etc. As every Agent has their own logs, the community as a whole has a completely trustless log of each project undertaken. 21. Is this being done with EC build products and would it allow the recipient to validate that what they've been provided has been built only using "design contributions" cryptographically signed by their providers and nothing else (i.e. no code that somehow crept in that isn't covered by the contracting process)? The emergent coding trust model is very effective and has been proven in other industries. Remember, your Agent creates a feature in my project by actually combining smaller features contracted from other Agents, thus your reputation is linked to that of your suppliers. If Bosch makes a faulty relay in my Ford, I blame Ford for a faulty car not Bosch when my headlights don't work. Similarly, you must choose and vet your sub-contractors to the level of quality that you yourself want to project. Once these relationships are set up, it becomes virtually impossible for a bad actor to participate in the system for long or even from the get go. 22. A look at code generated and a surprising answer to why is every intermediate variable spilled? Thanks to u/R_Sholes, this snippet from the actual code for: number = number * 10 + digitgenerated as a part of: sub read/integeboolean($, 0, 100) -> guess
; copy global to local temp variable 0x004032f2 movabs r15, global.current_digit 0x004032fc mov r15, qword [r15] 0x004032ff mov rax, qword [r15] 0x00403302 movabs rdi, local.digit 0x0040330c mov qword [rdi], rax ; copy global to local temp variable 0x0040330f movabs r15, global.guess 0x00403319 mov r15, qword [r15] 0x0040331c mov rax, qword [r15] 0x0040331f movabs rdi, local.num 0x00403329 mov qword [rdi], rax ; multiply local variable by constant, uses new temp variable for output 0x0040332c movabs r15, local.num 0x00403336 mov rax, qword [r15] 0x00403339 movabs rbx, 10 0x00403343 mul rbx 0x00403346 movabs rdi, local.num_times_10 0x00403350 mov qword [rdi], rax ; add local variables, uses yet another new temp variable for output 0x00403353 movabs r15, local.num_times_10 0x0040335d mov rax, qword [r15] 0x00403360 movabs r15, local.digit 0x0040336a mov rbx, qword [r15] 0x0040336d add rax, rbx 0x00403370 movabs rdi, local.num_times_10_plus_digit 0x0040337a mov qword [rdi], rax ; copy local temp variable back to global 0x0040337d movabs r15, local.num_times_10_plus_digit 0x00403387 mov rax, qword [r15] 0x0040338a movabs r15, global.guess 0x00403394 mov rdi, qword [r15] 0x00403397 mov qword [rdi], rax For comparison, an equivalent snippet in C compiled by clang without optimizations gives this output: imul rax, qword ptr [guess], 10 add rax, qword ptr [digit] mov qword ptr [guess], rax
Collaborations at the byte layer of Agents result in designs that spill every intermediate variable. Firstly, why this is so? Agents from this early version only support one catch-all variable design when collaborating. Similar to a compiler when all registers contain variables, the compiler must make a decision to spill a register temporarily to main memory. The compiler would still work if it spilled every variable to main memory but would produce code that would be, as above, hopelessly inefficient. However, by only supporting the catch-all portion of the protocol, the code valley designers were able to design, build and deploy these agents faster because an Agent needs fewer predicates in order to participate in these simpler collaborations. The protocol involved however, can have many "Policies" besides the catch-all default policy (Agents can collaborate over variables designed to be on the stack, or, as is common for intermediate variables, designed to use a CPU register, and so forth). This example highlights one of the very exciting aspects of emergent coding. If we now add a handful of additional predicates to a handful of these byte layer agents, henceforth ALL project binaries will be 10x smaller and 10x faster. Finally, there can be many Agents competing for market share at each of classification. If these "gumby" agents do not improve, you can create a "smarter" competitor (ie with more predicates) and win business away from them. Candy from a baby. Competition means the smartest agents bubble to the top of every classification and puts the entire emergent coding platform on a fast path for improvement. Contrast this with incumbent libraries which does not have a financial incentive to improve. Just wait until you get to see our production system. 23. How hard can an ADD Agent be? Typically an Agent's feature is created by combining smaller features from other Agents. The smallest features are so devoid of context and complexity they can be rendered by designing a handful of bytes in the project binary. Below is a description of one of these "byte" layer Agents to give you an idea how they work. An "Addition" Agent creates the feature of "adding two numbers" in your project (This is an actual Agent). That is, it contributes to the project design a feature such that when the project binary is delivered, there will be an addition instruction somewhere in it that was designed by the contract that was let to this Agent. If you were this Agent, for each contract you received, you would need to collaborate with peers in the project to resolve vital requirements before you can proceed to design your binary "instruction". Each paid contract your Agent receives will need to participate in at least 4 collaborations within the design project. These are:
Input A collaboration
Input B collaboration
Construction site collaboration
You can see from the collaborations involved how your Agent can determine the precise details needed to design its instruction. As part of the contract, the Addition Agent will be provisioned with contact details so it can join these collaborations. Your Agent must collaborate with other stakeholders in each collaboration to resolve that requirement. In this case, how a variable will be treated. The stakeholders use a protocol to arrive at an Agreement and share the terms of the agreement. For example, the stakeholders of collaboration “Input A” may agree to treat the variable as an signed 64bit integer, resolve to locate it at location 0x4fff2, or alternatively agree that the RBX register should be used, or agree to use one of the many other ways a variable can be represented. Once each collaboration has reached an agreement and the terms of that agreement distributed, your Agent can begin to design the binary instruction. The construction site collaboration is where you will exactly place your binary bytes. The construction site protocol is detailed in the whitepaper and is some of the magic that allows the decentralized development system to deliver the project binary. The protocol consists of 3 steps,
You request space in the project binary be reserved.
You are notified of the physical address of your requested space.
You delver the the binary bytes you designed to fill the reserved space.
Once the bytes are returned your Agent can remove the job from its work schedule. Job done, payment received, another happy customer with a shiny ADD instruction designed into their project binary. Note:
Observe how it is impossible for this ADD Agent to install a backdoor undetected by the client.
Observe how the Agent isn’t linking a module, or using a HLL to express the binary instruction.
Observe how with just a handful of predicates you have a working "Addition" Agent capable of designing the Addition Feature into a project with a wide range of collaboration agreements.
Observe how this Agent could conceivably not even design-in an ADD instruction if one of the design time collaboration agreements was a literal "1" (It would design in an increment instruction). There is even a case where this Agent may not deliver any binary to build its feature into your project!
24. How does EC arrive at a project binary without writing source code? Devs using EC combine features to create solutions. They don't write code. EC devs contract Agents which design the desired features into their project for a fee. Emergent coding uses a domain specific contracting language (called pilot) to describe the necessary contracts. Pilot is not a general purpose language. As agents create their features by similarly combining smaller features contracted from peer, your desired features may inadvertently result in thousands of contracts. As it is agents all the way down, there is no source code to create the project binary. Traditional: Software requirements -> write code -> compile -> project binary (ELF). Emergent coding: Select desired features -> contract agents -> project binary (ELF). Agents themselves are created the same way - specify the features you want your agent to have, contract the necessary agents for those features and viola - agent project binary (ELF). 25. How does the actual binary code that agents deliver to each other is written? An agent never touches code. With emergent coding, agents contribute features to a project, and leave the project binary to emerge as the higher-order complexity of their collective effort. Typically, agents “contribute” their feature by causing smaller features to be contributed by peers, who in turn, do likewise. By mapping features to smaller features delivered by these peers, agents ensure their feature is delivered to the project without themselves making a direct code contribution. Peer connections established by these mappings serve to both incrementally extend a temporary project “scaffold” and defer the need to render a feature as a code contribution. At the periphery of the scaffold, features are so simple they can be rendered as a binary fragment with these binary fragments using the information embodied by the scaffold to guide the concatenation back along the scaffold to emerge as the project binary - hence the term Emergent Coding. Note the scaffold forms a temporary tree-like structure which allows virtually all the project design contracts to be completed in parallel. The scaffold also automatically limits an agent's scope to precisely the resources and site for their feature. It is why it is virtually impossible for an agent to install a "back door" or other malicious code into the project binary.
BEWARE all ICOs and ICO issuers!!!!! Part 1 To see article with images, please visit Medium post. Luvdub Coin recently made a public announcement for our airdrop and in less than 1 week, received submissions ranging in the thousands despite our intense KYC-AML procedure. At this time, I felt compelled to write an article due to the alarming frequency of fraudulent activity and stolen data our verification team has witnessed in these past few days. This article will be broken into 2 posts. 1) Why ICO participants should AVOID ICOs unless they ABSOLUTELY TRUST the issuer. 2)What ICO issuers need to be aware of. This is by all means not a comprehensive list and I do not suggest that you rely solely on this article to make any decision that may have an impact on your privacy, security, or life. I, nor anyone at Luvdub Coin or Luvdub Nation Inc. can be held responsible for what you do with the information provided. You are the only person who can make sure your data and privacy is safe. Why ICO participants should AVOID ICOs unless they ABSOLUTELY TRUST the issuer. It seems that a majority of the stolen data come from Southeast Asia (Vietnam, Thailand, etc.), South Asia/Middle East (India, Pakistan, etc.), Africa, South America, and Russia. This does not mean that other countries aren’t affected but the statistics skew towards these regions. I IMPLORE you to avoid ICOs unless you absolutely, 100% positively know who you’re dealing with. If you choose to disregard my warnings and would still like to participate in ICOs/airdrops, here are some things to consider.
Just because a site has a Green trust lock to display that they are serving content over TLS (Transport Layer Security) doesn’t mean you should trust the site. All it means is that people from outside the network cannot peer into the information being transmitted. This is still better than having no encryption at all but if the website owner mishandles your information or are outright looking to steal your data, you are SCREWED! Also realize that you can get SSL security (green trust lock/https)for free using a CDN provider.
If you’re going to hand your money/cryptocurrency anywhere, the highest level of authentication is to go with a Positive EV SSL Certificate (Extended Validation Certificate). This means the website owner has to provide their company details to a third party and get authenticated which would then show their name in the URL browser. Bear in mind, the custodians of the site/ICO are still responsible for your funds/personal information. You still must perform your due diligence regardless because having a Positive EV SSL Certificate doesn’t mean that they can’t mess up or steal your data. *Cough* Yahoo *Cough*
Oh, but they have over 20k Telegram members! It must be real! This number means squat! People can buy Telegram users, Facebook likes, Twitter retweets, etc. What really matters is the level of activity on their social media channels. Check their reddit, their BitcoinTalk, their Telegram channel activity. If it appears that the ICO issuer is spamming their own channels with posts and nonsense, then they’re hiding something. Be very wary of ICOs that are constantly updating with a countdown or having casual conversation. When you’re having a busy ICO, your time is limited between development, community management, regulation, legal matters, etc.
But, they have pictures of developers and investors! This is nonsense. Anyone can put up pictures with positions that they feel makes their project looks great. The only real way to tell if it’s a legitimate team is to have an outside source verify their credentials. And no, this doesn’t mean Linkedin with their bought connections but checking any professional licenses or reviewing previous projects. For example, if a Doctor is on the team, I would refer to their country’s agency that provides the professional license to cross reference their name or if they are a developer, I would go and review their previous work. Maybe the ICO company has been incorporated for a few years and can be searched using a government database or the ICO founders have performed several speaking engagements for large crowds.
If they only have a white paper, I would be highly skeptical. Unless their code is open source or they disclose snippets in which you are able to verify, I would be extremely cautious. Don’t let all the fancy images of their “vision” fool you either. Think, if an ICO talks more about the possibilities instead of the product, I would stay away. Show me the product/design!!!
"But I get 25% off if I buy in the first 2 days!" This is a HUGEEEEEEEEE red flag. DO NOT, I REPEAT, DO NOT participate in any ICOs that offer you a huge discount/free tokens at decreasing intervals. That means getting 25% free tokens when you buy on day 1 & 2, 20% free tokens day 3 & 4, 15% tokens day 5 & 6, etc. This is a marketing tactic used to pressure you into purchasing early. Think about it. If their ICO/token is going to be valuable, why would they discount it by so much? If you were buying in bulk(private sale), Ok, maybe that might be a good reason for a percentage of free tokens/discounts but when you’re time bound? You’re dealing with marketers who are going to run away with your money and give you worthless junk in return. DO NOT DEAL WITH THESE PEOPLE.
If an ICO says here’s a little competition, who can be the best!?! The top 5 will get a prize?!?! Stay AWAYYY WITH A TEN FOOT POLE!!!! Who wins in this competition? No one but the ICO issuer because they were able to harness your competitive spirit with your hopes/dreams of being wealthy all while handing you worthless junk. Developers should be focused on their product, not marketing BS just to extract as much value from you. Don’t give away your money. You might as well donate it to charity to make the world a better place.
Any ICO issuer who deals with residents within the European Union must comply with GDPR (General Data Protection Regulation). Essentially, this means that they must require consent from their users, provide users’ with the right to have their data erased, limit data handling, disclose breaches, and a plethora of other rules. If the ICO has no mention of their private practices, STAY AWAY FROM THEM! Even better, see how they handle individuals in their chat groups. Do they show concern for privacy and data? That’s a tell tale sign.
If an ICO is emailing you constantly over and over with little to no substance, STAY AWAY FROM THEM! There is no reason for an ICO to be constantly messaging you if they have no development progress to be discussed or important ICO dates to be publicized. No, a message from the CEO to say hello! or to speak of some grand utopian vision does not cut it. If you get any mail, it should be worthwhile to you and provide ICO participants with new information or the occasional reminder. When you are spammed, this is how ICOs try to blind you with the allure of the “grand vision”. Did you realize you were constantly getting email, notifications, pinned messages, etc.? You NEED to get out. ASAP
If for whatever reason you do believe in an ICO and wish to participate, please protect yourself at all costs. Consider water marking your photo stating that your photo should only be used for whatever ICO URL. Also consider criss crossing lines across the image to prevent scammers from cropping out your text. Do everything in your power to stay safe. Use VPNs, tertiary emails, different BTC addresses or Eth addresses.
I apologize if I turn some people off but data theft has become too rampant within the current cryptocurrency/ICO environment and we had to do something about it. It is our belief that cryptocurrency can help bring individuals out of poverty and maintain honesty in transactions. However, the current activity of stealing data from innocent victims is detrimental to the mass adoption of cryptocurrency and we all must do something together to fix it. Please help spread the word and let us all make a standard together for all ICO issuers and participants to follow. This has been the first part of my ICO ramble. Check out the second part at What ICO issuers need to be aware of. GET INVOLVED at www.luvdubcoin.com Also check out our other sites: Telegram | Facebook | Github | White Paper | Youtube | Reddit | Twitter | BitcoinTalk | Medium Security Reminder! *Always look for the Luvdub Nation Inc. green security trust lock in your browser before submitting any information online.
Blowing the lid off the CryptoNote/Bytecoin scam (with the exception of Monero) - Reformatted for Reddit
Original post by rethink-your-strategy on Bitcointalk.org here This post has been reformatted to share on Reddit. What once was common knowledge, is now gone. You want a quality history lesson? Share this like wildfire. August 15, 2014, 08:15:37 AM
I'd like to start off by stating categorically that the cryptography presented by CryptoNote is completely, entirely solid. It has been vetted and looked over by fucking clever cryptographers/developers/wizards such as gmaxwell. Monero have had a group of independent mathematicians and cryptographers peer-reviewing the whitepaper (their annotations are here, and one of their reviews is here), and this same group of mathematicians and cryptographers is now reviewing the implementation of the cryptography in the Monero codebase. Many well known Bitcoin developers have already had a cursory look through the code to establish its validity. It is safe to say that, barring more exotic attacks that have to be mitigated over time as they are invented/discovered, and barring a CryptoNote implementation making rash decisions to implement something that reduces the anonymity set, the CryptoNote currencies are all cryptographically unlinkable and untraceable. Two other things I should mention. I curse a lot when I'm angry (and scams like this make me angry). Second, where used my short date format is day/month/year (smallest to biggest). If you find this information useful, a little donation would go a long way. Bitcoin address is 1rysLufu4qdVBRDyrf8ZjXy1nM19smTWd.
The Alleged CryptoNote/Bytecoin Story
CryptoNote is a new cryptocurrency protocol. It builds on some of the Bitcoin founding principles, but it adds to them. There are aspects of it that are truly well thought through and, in a sense, quite revolutionary. CryptoNote claim to have started working on their project years ago after Bitcoin's release, and I do not doubt the validity of this claim...clearly there's a lot of work and effort that went into this. The story as Bytecoin and CryptoNote claim it to be is as follows: They developed the code for the principles expressed in their whitepaper, and in April, 2012, they released Bytecoin. All of the copyright messages in Bytecoin's code are "copyright the CryptoNote Developers", so clearly they are one and the same as the Bytecoin developers. In December 2012, they released their CryptoNote v1 whitepaper. In September 2013, they released their CryptoNote v2 whitepaper. In November 2013, the first piece of the Bytecoin code was first pushed to Github by "amjuarez", with a "Copyright (c) 2013 amjuarez" copyright notice. This was changed to "Copyright (c) 2013 Antonio Juarez" on March 3rd, 2014. By this juncture only the crypto libraries had been pushed up to github. Then, on March 4th, 2014, "amjuarez" pushed the rest of the code up to github, with the README strangely referring to "cybernote", even though the code referred to "Cryptonote". The copyrights all pointed to "the Cryptonote developers", and the "Antonio Juarez" copyright and license file was removed. Within a few days, "DStrange" stumbled across the bytecoin.org website when trying to mine on the bte.minefor.co.in pool (a pool for the-other-Bytecoin, BTE, not the-new-Bytecoin, BCN), and the rest is history as we know it. By this time Bytecoin had had a little over 80% of its total emission mined.
Immediate Red Flags
The first thing that is a red flag in all of this is that nobody, and I mean no-fucking-body, is a known entity. "Antonio Juarez" is not a known entity, "DStrange" is not a known entity, none of the made up names on the Bytecoin website exist (they've since removed their "team" page, see below), none of the made up names on the CryptoNote website exist (Johannes Meier, Maurice Planck, Max Jameson, Brandon Hawking, Catherine Erwin, Albert Werner, Marec Plíškov). If they're pseudonyms, then say so. If they're real names, then who the fuck are they??? Cryptographers, mathematicians, and computer scientists are well known - they have published papers or at least have commented on articles of interest. Many of them have their own github repos and Twitter feeds, and are a presence in the cryptocurrency community. The other immediate red flag is that nobody, and I mean no-fucking-body, had heard of Bytecoin. Those that had heard of it thought it was the crummy SHA-256 Bitcoin clone that was a flop in the market. Bytecoin's claim that it had existed "on the deep web" for 2 years was not well received, because not a single vendor, user, miner, drug addict, drug seller, porn broker, fake ID card manufacturer, student who bought a fake ID card to get into bars, libertarian, libertard, cryptographer, Tor developer, Freenet developer, i2p developer, pedophile, or anyone else that is a known person - even just known on the Internet - had ever encountered "Bytecoin" on Tor. Ever. Nobody.
Before I start with some conjecture and educated guesswork, I'd like to focus on an indisputable fact that obliterates any trust in both Bytecoin's and CryptoNote's bullshit story. Note, again, that I do not doubt the efficacy of the mathematics and cryptography behind CryptoNote, nor do I think there are backdoors in the code. What I do know for a fact is that the people behind CryptoNote and Bytecoin have actively deceived the Bitcoin and cryptocurrency community, and that makes them untrustworthy now and in the future. If you believe in the fundamentals in CryptoNote, then you need simply use a CryptoNote-derived cryptocurrency that is demonstrably independent of CryptoNote and Bytecoin's influence. Don't worry, I go into this a little later. So as discussed, there were these two whitepapers that I linked to earlier. Just in case they try remove them, here is the v1 whitepaper and the v2 whitepaper mirrored on Archive.org. This v1/v2 whitepaper thing has been discussed at length on the Bytecoin forum thread, and the PGP signature on the files has been confirmed as being valid. When you open the respective PDFs you'll notice the valid signatures in them: signature in the v1 whitepaper signature in the v2 whitepaper These are valid Adobe signatures, signed on 15/12/2012 and 17/10/2013 respectively. Here's where it gets interesting. When we inspect this file in Adobe Acrobat we get a little more information on the signature . Notice the bit that says "Signing time is from the clock on the signer's computer"? Now normally you would use a Timestamp Authority (TSA) to validate your system time. There are enough public, free, RFC 3161 compatible TSAs that this is not a difficult thing. CryptoNote chose not do this. But we have no reason to doubt the time on the signature, right guys? crickets . See these references from the v1 whitepaper footnotes? Those two also appear in the v2 whitepaperth. Neither of those two footnotes refer to anything in the main body of the v1 whitepaper's text, they're non-existent (in the v2 whitepaper they are used in text). The problem, though, is that the Bitcointalk post linked in the footnote is not from early 2012 (proof screenshot is authentic: https://bitcointalk.org/index.php?topic=196259.0) . May 5, 2013. The footnote is referencing a post that did not exist until then. And yet we are to believe that the whitepaper was signed on 12/12/2012! What sort of fucking fools do they take us for? A little bit of extra digging validates this further. The document properties for both the v1 whitepaper as well as the v2 whitepaper confirms they were made in TeX Live 2013, which did not exist on 12/12/2012. The XMP properties are also quite revealing XMP properties for the v1 whitepaper XMP properties for the v2 whitepaper According to that, the v1 whitepaper PDF was created on 10/04/2014, and the v2 whitepaper was created on 13/03/2014. And yet both of these documents were then modified in the past (when they were signed). Clearly the CryptoNote/Bytecoin developers are so advanced they also have a time machine, right? Final confirmation that these creation dates are correct are revealed those XMP properties. The properties on both documents confirm that the PDF itself was generated from the LaTeX source using pdfTeX-1.40.14 (the pdf:Producer property). Now pdfTeX is a very old piece of software that isn't updated very often, so the minor version (the .14 part) is important. . pdfTeX 1.40.14 pushed to source repo on Feb 14, 2014 . This version of pdfTeX was only pushed to the pdfTeX source repository on February 14, 2014, although it was included in a very early version of TeX Live 2013 (version 2013.20130523-1) that was released on May 23, 2013. The earliest mentions on the Internet of this version of pdfTeX are in two Stack Exchange comments that confirm its general availability at the end of May 2013 (here and here). The conclusion we draw from this is that the CryptoNote developers, as clever as they were, intentionally deceived everyone into believing that the CryptoNote whitepapers were signed in 2012 and 2013, when the reality is that the v2 whitepaper was created in March, 2014, and the v1 whitepaper haphazardly created a month later by stripping bits out of the v2 whitepaper (accidentally leaving dead footnotes in). Why would they create this fake v2 whitepaper in the first place? Why not just create a v1 whitepaper, or not even version it at all? The answer is simple: they wanted to lend credence and validity to the Bytecoin "2 years on the darkweb" claim so that everyone involved in CryptoNote and Bytecoin could profit from the 2 year fake mine of 82% of Bytecoin. What they didn't expect is the market to say "no thank you" to their premine scam.
And Now for Some Conjecture
As I mentioned earlier, the Bytecoin "team" page disappeared. I know it exists, because "AtomicDoge" referred to it as saying that one of the Bytecoin developers is a professor at Princeton. I called them out on it, and within a week the page had disappeared. Fucking cowards. That was the event that triggered my desire to dig deeper and uncover the fuckery. As I discovered more and more oddities, fake accounts, trolling, and outright falsehoods, I wondered how deep the rabbit hole went. My starting point was DStrange. This is the account on Bitcointalk that "discovered" Bytecoin accidentally a mere 6 days after the first working iteration of the code was pushed to Github, purely by chance when mining a nearly dead currency on a tiny and virtually unheard of mining pool. He has subsequently appointed himself the representative of Bytecoin, or something similar. The whole thing is so badly scripted it's worse than a Spanish soap opera...I can't tell who Mr. Gonzales, the chief surgeon, is going to fuck next. At the same time as DStrange made his "fuck me accidental discovery", another Bitcointalk account flared up to also "accidentally discover this weird thing that has randomly been discovered": Rias. What's interesting about both the "Rias" and "DStrange" accounts are their late 2013 creation date (October 31, 2013, and December 23, 2013, respectively), and yet they lay dormant until suddenly, out of the blue, on January 20th/21st they started posting. If you look at their early posts side by side you can even see the clustering: Rias, DStrange. At any rate, the DStrange account "discovering" Bytecoin is beyond hilarious, especially with the Rias account chiming in to make the discovery seem natural. Knowing what we unmistakably do about the fake CryptoNote PDF dates lets us see this in a whole new light. Of course, as has been pointed out before, the Bytecoin website did not exist in its "discovered" form until sometime between November 13, 2013 (when it was last captured as this random picture of a college girl) and February 25, 2014 (when it suddenly had the website on it as "discovered"). This can be confirmed by looking at the captures on Wayback Machine: https://web.archive.org/web/*/http://bytecoin.org The CryptoNote website, too, did not exist in its current form until after October 20, 2013, at which time it was still the home of an encrypted message project by Alain Meier, a founding member of the Stanford Bitcoin Group and co-founder of BlockScore. This, too, can be confirmed on Wayback Machine: https://web.archive.org/web/*/http://cryptonote.org ~It's hard to ascertain whether Alain had anything to do with CryptoNote or Bytecoin. It's certainly conceivable that the whitepaper was put together by him and other members of the Stanford Bitcoin Group, and the timeline fits, given that the group only formed around March 2013. More info on the people in the group can be found on their site, and determining if they played a role is something you can do in your own time.~ Update: Alain Meier posted in this thread, and followed it up with a Tweet, confirming that he has nothing to do with CryptoNote and all the related...stuff.
The Bytecoin guys revel in creating and using sockpuppet accounts. Remember that conversation where "Rias" asked who would put v1 on a whitepaper with no v2 out, and AlexGR said "a forward looking individual"? The conversation took place on May 30, and was repeated verbatim by shill accounts on Reddit on August 4 (also, screenshot in case they take it down). Those two obvious sockpuppet/shill accounts also take delight in bashing Monero in the Monero sub-reddit (here are snippets from WhiteDynomite and cheri0). Literally the only thing these sockpuppets do, day in and day out, is make the Bytecoin sub-reddit look like it's trafficked, and spew angry bullshit all over the Monero sub-reddit. Fucking batshit insane - who the fuck has time for that? Clearly they're pissy that nobody has fallen for their scam. Oh, and did I mention that all of these sockpuppets have a late January/early February creation date? Because that's not fucking obvious at all. And let's not forget that most recently the sockpuppets claimed that multi-sig is "a new revolutionary technology, it was discovered a short time ago and Bytecoin already implemented it". What the actual fuck. If you think that's bad, you're missing out on the best part of all: the Bytecoin shills claim that Bytecoin is actually Satoshi Nakamoto's work. I'm not fucking kidding you. For your viewing pleasure...I present to you...the Bytecoin Batshit Insane Circus: . https://bitcointalk.org/index.php?topic=512747.msg8354977#msg8354977 . Seriously. Not only is this insulting as fuck to Satoshi Nakamoto, but it's insulting as fuck to our intelligence. And yet the fun doesn't stop there, folks! I present to you...the centerpiece of this Bytecoin Batshit Insane Circus exhibit... . Of course! How could we have missed it! The clues were there all along! The CryptoNote/Bytecoin developers are actually aliens! Fuck me on a pogostick, this is the sort of stuff that results in people getting committed to the loony bin. One last thing: without doing too much language analysis (which is mostly supposition and bullshit), it's easy to see common grammar and spelling fuck ups. My personal favorite is the "Is it true?" question. You can see it in the Bytecoin thread asking if it's Satoshi's second project, in the Monero thread asking if the Monero devs use a botnet to fake demand, and in the Dashcoin thread confirming the donation address (for a coin whose only claim is that they copy Bytecoin perfectly, what the fuck do they need donations for??).
Layer After Layer
All Tied Up in a Bow
I want to cement the relationship between the major CryptoNote shitcoins. I know that my previous section had a lot of conjecture in it, and there's been some insinuation that I'm throwing everyone under the bus because I'm raging against the machine. That's not my style. I'm more of a Katy Perry fan..."you're going to hear me roar". There were some extra links I uncovered during my research, and I lacked the time to add it to this post. Thankfully a little bit of sleep and a can of Monster later have given me the a chance to add this. Let's start with an analysis of the DNS records of the CN coins. If we look at the whois and DNS records for bytecoin.org, quazarcoin.org, fantomcoin.org, monetaverde.org, cryptonote.org, bytecoiner.org, cryptonotefoundation.org, cryptonotestarter.org, and boolberry.com, we find three common traits, from not-entirely-damming to oh-shiiiiiiit:
There's a lot of commonality with the registrar (NameCheap for almost all of them), the DNS service (HurricaneElectric's Free DNS or NameCheap's DNS), and with the webhost (LibertyVPS, QHosteSecureFastServer.com, etc.)
All of the CN domains use WhoisGuard or similar private registration services.
Every single domain, without exception, uses Zoho for email. The only outlier is bitmonero.org that uses Namecheap's free email forwarding, but it's safe to disregard this as the emails probably just forward to the CryptoNote developers' email.
The instinct may be to disregard this as a fucking convenient coincidence. But it isn't: Zoho used to be a distant second go Google Apps, but has since fallen hopelessly behind. Everyone uses Google Apps or they just use mail forwarding or whatever. With the rest of the points as well, as far-fetched as the link may seem, it's the combination that is unusual and a dead giveaway of the common thread. Just to demonstrate that I'm not "blowing shit out of proportion" I went and checked the records for a handful of coins launched over the past few months to see what they use. darkcoin.io: mail: Namecheap email forwarding, hosting: Amazon AWS, open registration through NameCheap monero.cc: mail: mail.monero.cc, hosting: behind CloudFlare, open registration through Gandi xc-official.com: mail: Google Apps, hosting: MODX Cloud, hidden registration (DomainsByProxy) through GoDaddy blackcoin.io: mail: Namecheap email forwarding, hosting: behind BlackLotus, open registration through NameCheap bitcoindark.org: mail: no MX records, hosting: Google User Content, open registration through Wix viacoin.org: mail: mx.viacoin.org, hosting: behind CloudFlare, closed registration (ContactPrivacy) through Hostnuke.com neutrinocoin.org: mail: HostGator, hosting: HostGator, open registration through HostGator There's no common thread between them. Everyone uses different service providers and different platforms. And none of them use Zoho. My next check was to inspect the web page source code for these sites to find a further link. If you take a look at the main CSS file linked in the source code for monetaverde.org, fantomcoin.org, quazarcoin.org, cryptonotefoundation.org, cryptonote-coin.org, cryptonote.org, bitmonero.org, and bytecoiner.org, we find a CSS reset snippet at the top. It has a comment at the top that says "/* CSS Reset /", and then where it resets/sets the height it has the comment "/ always display scrollbars */". Now, near as I can find, this is a CSS snipped first published by Jake Rocheleau in an article on WebDesignLedger on October 24, 2012 (although confusingly Google seems to think it appeared on plumi.de cnippetz first, but checking archive.org shows that it was only added to that site at the beginning of 2013). It isn't a very popular CSS reset snippet, it got dumped in a couple of gists on Github, and translated and re-published in an article on a Russian website in November, 2012 (let's not go full-blown conspiritard and assume this links "cryptozoidberg" back to this, he's culpable enough on his own). It's unusual to the point of being fucking impossible for one site to be using this, let alone a whole string of supposedly unrelated sites. Over the past few years the most popular CSS reset scripts have been Eric Meyer's "Reset CSS", HTML5 Doctor CSS Reset, Yahoo! (YUI 3) Reset CSS, Universal Selector ‘’ Reset, and Normalize.css, none of which contain the "/ CSS Reset /" or "/ always display scrollbars */" comments. You've got to ask yourself a simple question: at what point does the combination of all of these fucking coincidental, completely unusual elements stop being coincidence and start becoming evidence of a real, tenable link? Is it possible that bytecoin.org, quazarcoin.org, fantomcoin.org, monetaverde.org, cryptonote.org, bytecoiner.org, cryptonotefoundation.org, cryptonotestarter.org, and boolberry.com just happen to use similar registrars/DNS providers/web hosts and exactly the fucking same wildly unpopular email provider? And is it also possible that monetaverde.org, fantomcoin.org, quazarcoin.org, cryptonotefoundation.org, cryptonote-coin.org, cryptonote.org, and bytecoin.org just happen to use the same completely unknown, incredibly obscure CSS reset snippet? It's not a conspiracy, it's not a coincidence, it's just another piece of evidence that all of these were spewed out by the same fucking people.
The Conclusion of the Matter
Don't take the last section as any sort of push for Monero. I think it's got potential (certainly much more than the other retarded "anonymous" coins that "developers" are popping out like street children from a cheap ho), and I hold a bit of XMR for shits and giggles, so take that tacit endorsement with a pinch of fucking salt. The point is this: Bytecoin's 82% premine was definitely the result of a faked blockchain. CryptoNote's whitepaper dates were purposely falsified to back up this bullshit claim. Both Bytecoin and CryptoNote have perpetuated this scam by making up fake website data and all sorts. They further perpetuate it using shill accounts, most notably "DStrange" and "Rias" among others. They launched a series of cryptocurrencies that should be avoided at all cost: Fantomcoin, Quazarcoin, and Monetaverde. They are likely behind duckNote and Boolberry, but fuck it, it's on your head if you want to deal with scam artists and botnet creators. They developed amazing technology, and had a pretty decent implementation. They fucked themselves over by being fucking greedy, being utterly retarded, being batshit insane, and trying to create legitimacy where there was none. They lost the minute the community took Monero away from them, and no amount of damage control will save them from their own stupidity. I expect there to be a fuck-ton of shills posting in this thread (and possibly a few genuine supporters who don't know any better). If you want to discuss or clarify something, cool, let's do that. If you want to have a protracted debate about my conjecture, then fuck off, it's called conjecture for a reason you ignoramus. I don't really give a flying fuck if I got it right or wrong, you're old and ugly enough to make up your own mind. tl;dr - CryptoNote developers faked dates in whitepapers. Bytecoin faked dates in fake blockchain to facilitate an 82% premine, and CryptoNote backed them up. Bytecoin, Fantomcoin, Quazarcoin, Monetaverde, Dashcoin are all from the same people and should be avoided like the fucking black plague. duckNote and Boolberry are probably from them as well, or are at least just fucking dodgy, and who the fuck cares anyway. Monero would have been fucking dodgy, but the community saved it. Make your own mind up about shit and demand that known people are involved and that there is fucking transparency. End transmission. Just a reminder that if you found this information useful, a little donation would go a long way. Bitcoin address is 1rysLufu4qdVBRDyrf8ZjXy1nM19smTWd.
OnePageX: The Game Changer Through Efficient Simplicity 📷 OnePageX is the short for OnePageExchange. The name pretty much speaks for itself. A cryptocurrency exchange on a single page! OnePageX pretty much triumphs over the complex exchanges with the simplicity of a single page which offers as much as any exchange and even better. Core to the values of OnePageX is the belief that greatness does not have to come at the cost of complexity and so it achieves the prized greatness while still remaining as simple as possible. While remaining as simple as possible and borne out of this simplicity, OnePageX offers the following advantages;
A Simple Interface for Exchange
📷 Far from the intimidating interface of many exchanges, OnePageX offers a relatively easy to navigate interface that makes for easy exchange of cryptocurrencies. OnePageX currently offers the ability to exchange Bitcoin which the most popular cryptocurrency into more than 140 others all on a single page. This simplicity of navigation and interface would sure gain a lot more crypto adopters hence the ability to easily comprehend even by amateurs.
No Registrations Required.
📷 Well, for me and am sure most others, what really turns me off and takes me off a particular web page is when I am asked to sign up for anything. Registrations suck! They really do when you might even have to supply private information such as in the KYC procedure required by most top exchanges. OnePageX removes the need for sign ups and enables a user to quickly exchange his assets. OnePageX achieves this by creating sessions whenever a user initiates an exchange such that such a user only has to bookmark the page or rather copy the link in order to be checking up on his transaction. 3. The Largest Collection of Options Yet Available. When you have an insatiable hunger for the perfect, you can only be better. OnePageX has the biggest collection of cryptocurrencies to which users can exchange their Bitcoin and still plans on adding more with our dear steem too in the works. A large availability of different cryptocurrencies can only rake in more users whose interests are as dynamic. Lets Go To the Crux of the Matter — Exchanging With OnepageX. Exchanging Cryprocurrency through OnePageX is relatively very easy and time saving. It consists of three major steps. These are explained below; 1. VisitOnePageXAnd Choose Assets to Convert In order to use the OnePageX, one has to first of all visit the exchange site. At the very top one would see an image as shown below. Hence OnepageX only supports exchange from bitcoin into other altcoins now. You can simply just enter the amount of bitcoin you want to exchange into an altcoin. 2. After Choosing Assets, Enter A Withdrawal Address After chosing the altcoin one wants to exchange bitcoin into. The next step is to enter the address of the wallet of the altcoin where one wants it to be deposited. However, one should be careful to input the wallet address correctly.3. Clicking On “Start Exchange” to Start the Process After inputing the withdrawal wallet of the desired altcoin one wants to exchange, the next step which is as simple as all of the foregoing is to click the “start exchange” bar. From then, the transaction is initiated and will be completed in a short while. An Unbeatable User Experience 📷OnePageX UX = ;<) When it comes to the vast terrain of the online web, the websites which get the most visits are those that offer users an unforgettable user experience thus making them want to always come back and use the site to carry out their transactions or simply read that news article. On the other hand, sites which give users a tough time navigating such sites by reason of their complexity or incessant and unsolicited ads usually consistently lose even the most commited of their users. OnePageX recognizes the importance of an excellent user experience and so has designed its site to offer users an incredible user experience. A user experience that would make one always want to come back and carry out more transactions. The question is, where else can you exchange crypto in just less that 10 clicks? The answer is nowhere else but OnePageX! The Multi Transaction Function 📷 OnePageX for the sakes of efficiency and user satisfaction allows users to make multiple transactions from one single page. Now the question is, How do i do this? Relax the answer is pretty much simple. All you have to do is bookmark your transaction page and you can always come back to the transaction card for more transactions. Easy and Simple. Enabling Unrivaled Ease of Conversion: The Onebox Widget. 📷 Innovation is what drives the hand of history. OnePageX’s Onebox widget is one such innovation. The Onebox Widget is a snippet code that allows for the conversion of cryptocurrency from any website whatsoever. It surfeits to say that the Onebox is one tool that adds to OnePageX’s efficiency and the ability to quickly exchange cryptocurrency. For those who saw the exchange process as cumbersome, Onebox offers a distinctively different experience of ease and simplicity which will not only drive mass adoption by encouraging many to enter crypto space but would also enable website owners to provide a tool for exchange right on their own sites without having to leave it. Conclusion Once man has set out in any endeavour, his primary aim remains to develop what he does and to bring it to the best standards the best brains can think of at a particular time. It is with this ideology that man has risen from wandering on foot to travelling by air and lighting coal fires to finding electricity. The cryptocurrency exchange sector, is no different. It is a human endeavour which deserves to be developed to the best that can be. Today, OnePageX which is simple, fast, anonymous, is that best that can be. For More Information, Check Out These Sources; · OnepageX Website · OnePageX Steemit · OnePageX Twitter · OnePageX Medium · OnePageX Reddit
BEWARE all ICOs and ICO issuers!!!!! Part 1 https://preview.redd.it/ohbp38gkwp311.png?width=600&format=png&auto=webp&s=f730893079a7b5d5fb2462c6e476dfcf182b0bc4 Luvdub Coin recently made a public announcement for our airdrop and in less than 1 week, received submissions ranging in the thousands despite our intense KYC-AML procedure. At this time, I felt compelled to write an article due to the alarming frequency of fraudulent activity and stolen data our verification team has witnessed in these past few days. This article will be broken into 2 posts. 1) Why ICO participants should AVOID ICOs unless they ABSOLUTELY TRUST the issuer. 2)What ICO issuers need to be aware of. This is by all means not a comprehensive list and I do not suggest that you rely solely on this article to make any decision that may have an impact on your privacy, security, or life. I, nor anyone at Luvdub Coin or Luvdub Nation Inc. can be held responsible for what you do with the information provided. You are the only person who can make sure your data and privacy is safe. Why ICO participants should AVOID ICOs unless they ABSOLUTELY TRUST the issuer. Avoid ICOs? Here are some reasons why you might want to reconsider giving away your personal information for some “Airdrops”. We have the bad, for example: https://preview.redd.it/p60v3qlswp311.png?width=720&format=png&auto=webp&s=3031fa9a797621b9e5789c9c75de5b38ef2caffe We have the, what the eff: https://preview.redd.it/fhuwdwqtwp311.png?width=800&format=png&auto=webp&s=f35508bb5e7b33517f516d93508a93735339878d Then we have the, that could’ve passed if looked over quickly: https://preview.redd.it/g75owbkuwp311.png?width=800&format=png&auto=webp&s=4681a334f0621ad18a02d4e49575f254c828248e The photoshopper: https://preview.redd.it/e8k8aahvwp311.png?width=540&format=png&auto=webp&s=9c2c5a9392f4b42857db0a0ced5dfb3c195f1c2f And finally, the artist: https://preview.redd.it/ei7btsawwp311.png?width=800&format=png&auto=webp&s=2cdb0f93bcea7c7bcfa0b6c21e2f6277b5529d5e Keep in mind, this is just a few of the fraudulent submissions we have received. It is estimated that somewhere between 30–40% are likely to be stolen data. It seems that a majority of the stolen data come from Southeast Asia (Vietnam, Thailand, etc.), South Asia/Middle East (India, Pakistan, etc.), Africa, South America, and Russia. This does not mean that other countries aren’t affected but the statistics skew towards these regions. I IMPLORE you to avoid ICOs unless you absolutely, 100% positively know who you’re dealing with. If you choose to disregard my warnings and would still like to participate in ICOs/airdrops, here are some things to consider. I can’t be completely trusted! Just because a site has a Green trust lock to display that they are serving content over TLS (Transport Layer Security) doesn’t mean you should trust the site. All it means is that people from outside the network cannot peer into the information being transmitted. This is still better than having no encryption at all but if the website owner mishandles your information or are outright looking to steal your data, you are SCREWED! Also realize that you can get SSL security (green trust lock/https)for free using a CDN provider. If I’m going to trust anything, it’s this. If you’re going to hand your money/cryptocurrency anywhere, the highest level of authentication is to go with a Positive EV SSL Certificate (Extended Validation Certificate). This means the website owner has to provide their company details to a third party and get authenticated which would then show their name in the URL browser. Bear in mind, the custodians of the site/ICO are still responsible for your funds/personal information. You still must perform your due diligence regardless because having a Positive EV SSL Certificate doesn’t mean that they can’t mess up or steal your data. *Cough* Yahoo *Cough* But they have the Telegram members! This number means squat! People can buy Telegram users, Facebook likes, Twitter retweets, etc. What really matters is the level of activity on their social media channels. Check their reddit, their BitcoinTalk, their Telegram channel activity. If it appears that the ICO issuer is spamming their own channels with posts and nonsense, then they’re hiding something. Be very wary of ICOs that are constantly updating with a countdown or having casual conversation. When you’re having a busy ICO, your time is limited between development, community management, regulation, legal matters, etc. But they have so many pictures of developers and investors! This is nonsense. Anyone can put up pictures with positions that they feel makes their project looks great. The only real way to tell if it’s a legitimate team is to have an outside source verify their credentials. And no, this doesn’t mean Linkedin with their bought connections but checking any professional licenses or reviewing previous projects. For example, if a Doctor is on the team, I would refer to their country’s agency that provides the professional license to cross reference their name or if they are a developer, I would go and review their previous work. Maybe the ICO company has been incorporated for a few years and can be searched using a government database or the ICO founders have performed several speaking engagements for large crowds. Their paper is white though! If they only have a white paper, I would be highly skeptical. Unless their code is open source or they disclose snippets in which you are able to verify, I would be extremely cautious. Don’t let all the fancy images of their “vision” fool you either. Think, if an ICO talks more about the possibilities instead of the product, I would stay away. Show me the product/design!!! But I get 25% off if I buy in the first 2 days! This is a HUGEEEEEEEEE red flag. DO NOT, I REPEAT, DO NOT participate in any ICOs that offer you a huge discount/free tokens at decreasing intervals. That means getting 25% free tokens when you buy on day 1 & 2, 20% free tokens day 3 & 4, 15% tokens day 5 & 6, etc. This is a marketing tactic used to pressure you into purchasing early. Think about it. If their ICO/token is going to be valuable, why would they discount it by so much? If you were buying in bulk(private sale), Ok, maybe that might be a good reason for a percentage of free tokens/discounts but when you’re time bound? You’re dealing with marketers who are going to run away with your money and give you worthless junk in return. DO NOT DEAL WITH THESE PEOPLE. But the more I do, the more I get!!!! Another marketing gimmick. If an ICO says here’s a little competition, who can be the best!?! The top 5 will get a prize?!?! Stay AWAYYY WITH A TEN FOOT POLE!!!! Who wins in this competition? No one but the ICO issuer because they were able to harness your competitive spirit with your hopes/dreams of being wealthy all while handing you worthless junk. Developers should be focused on their product, not marketing BS just to extract as much value from you. Don’t give away your money. You might as well donate it to charity to make the world a better place. But I can trust them. Can’t I? Any ICO issuer who deals with residents within the European Union must comply with GDPR (General Data Protection Regulation). Essentially, this means that they must require consent from their users, provide users’ with the right to have their data erased, limit data handling, disclose breaches, and a plethora of other rules. If the ICO has no mention of their private practices, STAY AWAY FROM THEM! Even better, see how they handle individuals in their chat groups. Do they show concern for privacy and data? That’s a tell tale sign. They keep emailing me. They must really care! If an ICO is emailing you constantly over and over with little to no substance, STAY AWAY FROM THEM! There is no reason for an ICO to be constantly messaging you if they have no development progress to be discussed or important ICO dates to be publicized. No, a message from the CEO to say hello! or to speak of some grand utopian vision does not cut it. If you get any mail, it should be worthwhile to you and provide ICO participants with new information or the occasional reminder. When you are spammed, this is how ICOs try to blind you with the allure of the “grand vision”. Did you realize you were constantly getting email, notifications, pinned messages, etc.? You NEED to get out. ASAP Only if you believe If for whatever reason you do believe in an ICO and wish to participate, please protect yourself at all costs. Consider water marking your photo stating that your photo should only be used for whatever ICO URL. Also consider criss crossing lines across the image to prevent scammers from cropping out your text. Do everything in your power to stay safe. Use VPNs, tertiary emails, different BTC addresses or Eth addresses. I apologize if I turn some people off but data theft has become too rampant within the current cryptocurrency/ICO environment and we had to do something about it. It is our belief that cryptocurrency can help bring individuals out of poverty and maintain honesty in transactions. However, the current activity of stealing data from innocent victims is detrimental to the mass adoption of cryptocurrency and we all must do something together to fix it. Please help spread the word and let us all make a standard together for all ICO issuers and participants to follow. This has been the first part of my ICO ramble. For the second part, please visit What ICO issuers need to be aware of. GET INVOLVED at www.luvdubcoin.com Also check out our other sites: Telegram | Facebook | Github | White Paper | Youtube | Reddit | Twitter | BitcoinTalk Security Reminder! *Always look for the Luvdub Nation Inc. green security trust lock in your browser before submitting any information online.
PasteCoin is an online application to sell code snippets and receive bitcoin. Website: http://www.pastecoin.com How to send bitcoins from any address by exploiting the coin value Whether or not it's worth investing in, the math behind Bitcoin is an elegant solution to some complex problems. Hosted by: Michael Aranda Special Thanks: Da... Bitcoin is one of the most important inventions in all of human history. For the first time ever, anyone can send or receive any amount of money with anyone ... = Toujours valable en  Premier Tutoriel débutant: 1/4. Voici la première vidéo de la playlist tutoriel de ma chaîne. Cette dernière vise les plus début...