Bitcoin Mining Guide - Getting started with Bitcoin mining

Anyone still under the illusion of Microsoft having been transformed into a kinder, more mutually beneficial partner, please read this patent.

WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Before reading the following excerpts, keep this sequence of events in mind:
Master Slave (and we're not referring to HDDs here)
Step one: patent technology
Step two: sell slave IoT devices to consumers who readily purchase them especially after being promised that they'll be rewarded in cryotocurrency for their data.
Step three: collect data via Azure on unsuspecting human subjects' fMRI, EEG, body temperatures, EKG, sleep data, digitized health care information, consumer purchasing habits, reading and viewing preferences, social media activity and correlate with activities performed (tasks).
Step four: Use data to refine AI to profile human behavior, predict behavior and refine mind reading capabilities.
This article is actually incorporated in the patent!
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
Step five: Institute centralized global cryptocurrency financial system with no other alternatives in which to transact legally.
https://www.reddit.com/Bitcoin/comments/4nag4b/1988_economist_cover_predicting_a_world_currency/
https://www.economist.com/finance-and-economics/1998/09/24/one-world-one-money
Step six: To understand step six, Read George Orwell's "1984" or review the concept of an individual's freedoms being based not on the concept of natural rights but on their social credit scores.
Thank you Microsoft, Google, Apple, Amazon, Facebook.
Now the patent excerpts:
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy. [0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems. For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process. [0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
decentralized cryptocurrency networks or databases.
[0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150. [0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks. [0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions). An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity). The material (http://news.berkely.edu/20l l/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Applicants * MICROSOFT TECHNOLOGY LICENSING, LLC[US/US]; One Microsoft Way Redmond, Washington 98052-6399, US
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy.
[0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems. For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process.
[0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
decentralized cryptocurrency networks or databases. [0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150.
[0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks.
[0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions).
An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity). The material (http://news.berkely.edu/20l l/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
submitted by snowboardnirvana to MVIS [link] [comments]

Microsoft patents scheme to usher in technocratic fascism via data from IoT sensor devices and centralized cryptocurrency system

WO2020060606 - CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606&tab=PCTDESCRIPTION
Before reading the following excerpts, keep this sequence of events in mind:
Master Slave (and we're not referring to HDDs here)
Step one: patent technology
Step two: sell slave IoT devices to consumers who readily purchase them especially after being promised that they'll be rewarded in cryotocurrency for their data.
Step three: collect data via Microsoft Azure on unsuspecting human subjects' fMRI, EEG, body temperatures, EKG, sleep data, digitized health care information, consumer purchasing habits, reading and viewing preferences, social media activity and correlate with activities performed (tasks).
Step four: Use data to refine AI to profile human behavior, predict behavior and refine mind reading capabilities.
This article is actually incorporated in the patent!
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
Step five: Institute centralized global cryptocurrency financial system with no other alternatives in which to transact legally.
https://www.reddit.com/Bitcoin/comments/4nag4b/1988_economist_cover_predicting_a_world_currency/
https://www.economist.com/finance-and-economics/1998/09/24/one-world-one-money
Step six: To understand step six, read George Orwell's "1984" or review the concept of an individual's freedoms being based not on the concept of natural rights but on their social credit scores.
Thank you Microsoft, Google, Apple, Amazon, Facebook.
Now the patent excerpts:
CRYPTOCURRENCY SYSTEM USING BODY ACTIVITY DATA BACKGROUND [0001] A virtual currency (also known as a digital currency) is a medium of exchange implemented through the Internet generally, not tied to a specific government-backed “flat” (printed) currency such as the U.S. dollar or the Euro, and typically designed to allow instantaneous transactions and borderless transfer of ownership. One example of virtual currency is cryptocurrency, wherein cryptography is used to secure transactions and to control the creation of new units. [0002] Several cryptocurrencies exist. Among these, the most well known is a blockchain-based cryptocurrency. Most blockchain-based cryptocurrency is decentralized in the sense that it has no central point of control.
However, blockchain-based cryptocurrency can also be implemented in a centralized system having a central point of control over the cryptocurrency.
Bitcoin is one of the examples of blockchain-based cryptocurrency. It is described in a 2008 article by Satoshi Nakamoto, named“Bitcoin: A peer-to-Peer Electronic Cash System”.
[0003] A blockchain is a data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifier(s) and destination identifier(s). The transactions are bundled into blocks and every block (except for the first block) refers back to or is linked to a prior block in the blockchain. Computer resources (or nodes, etc.) maintain the blockchain and cryptographically validate each new block and the transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is also easy to verify and is sometimes called a“proof-of-work”. This process is referred to as“mining”. The mining may be a random process with low probability so that a lot of trial and error is required to solve a computationally difficult problem. Accordingly, the mining may require enormous amounts of computational energy.
[0004] It is with respect to these and other general considerations that the following embodiments have been described. Also, although relatively specific problems have been discussed, it should be understood that the embodiments should not be limited to solving the specific problems identified in the background.
SUMMARY
[0005] Some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user as a solution to“mining” challenges in cryptocurrency systems.
For example, a brain wave or body heat emitted from the user when the user performs the task provided by an information or service provider, such as viewing advertisement or using certain internet services, can be used in the mining process. Instead of massive computation work required by some conventional cryptocurrency systems, data generated based on the body activity of the user can be a proof-of-work, and therefore, a user can solve the computationally difficult problem unconsciously. Accordingly, certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process faster.
[0006] Systems, methods, and hardware aspects of computer readable storage media are provided herein for a cryptocurrency system using human body activity data. According to various embodiments of the present disclosure, a server may provide a task to a device of a user which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. A cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system, and award cryptocurrency to the user whose body activity data is verified.
[0007] Examples are implemented as a computer process, a computing system, or as an article of manufacture such as a device, computer program product, or computer readable medium. According to one aspect, the computer program product is a computer storage medium readable by a computer system and encoding a computer program comprising instructions for executing a computer process.
[0008] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. decentralized cryptocurrency networks or databases.
[0021] FIG. 1 illustrates an example environment 100 in which some exemplary embodiments of the present disclosure may be practiced. The example environment 100 includes, but is not limited to, at least one of task server 110, communication network 120, user device 130, sensor 140, and cryptocurrency system 150.
[0022] Task server 110 may provide one or more tasks to user device 130 over communication network 120. For example, task server 110 may be at least one of a web server delivering or serving up web pages, an application server handling application operations between users and applications or databases, a cloud server, a database server, a file server, a service server, a game server implementing games or services for a game, and a media server delivering media such as streaming video or audio. The tasks provided by task server 110 will be discussed in more detail below.
[0023] Alternatively, cryptocurrency system 150 may provide one or more tasks to user device 130. For example, in a decentralized cryptocurrency network, the tasks may be proposed to user device 130 by miners (e.g. compute resources or nodes 210 of FIG. 2). In another example, in a centralized cryptocurrency system, a cryptocurrency server may send the tasks to user device 130.
[0024] Communication network 120 may include any wired or wireless connection, the internet, or any other form of communication. Although one network 120 is identified in FIG. 1, communication network 120 may include any number of different communication networks between any of the server, devices, resource and system shown in FIGS. 1 and 2 and/or other servers, devices, resources and systems described herein. Communication network 120 may enable communication between various computing resources or devices, servers, and systems. Various implementations of communication network 120 may employ different types of networks, for example, but not limited to, computer networks, telecommunications networks (e.g., cellular), mobile wireless data networks, and any combination of these and/or other networks. [0025] User device 130 may include any device capable of processing and storing data/information and communicating over communication network 120. For example, user device 130 may include personal computers, servers, cell phones, tablets, laptops, smart devices (e.g. smart watches or smart televisions). An exemplary embodiment of user device 130 is illustrated in FIG. 6.
[0026] Sensor 140 may be configured to sense the body activity of user 145. As illustrated in FIG. 1, sensor 140 may be a separate component from user device 130 and be operably and/or communicatively connected to user device 130. Alternatively, sensor 140 may be included and integrated in user device 130. For example, user device 130 may be a wearable device having sensor 140 therein. The sensor 140 may transmit information/data to user device 130. Sensor 140 may include, for example, but not limited to, functional magnetic resonance imaging (fMRI) scanners or sensors, electroencephalography (EEG) sensors, near infrared spectroscopy (NIRS) sensors, heart rate monitors, thermal sensors, optical sensors, radio frequency (RF) sensors, ultrasonic sensors, cameras, or any other sensor or scanner that can measure or sense body activity or scan human body. For instance, the fMRI may measure body activity by detecting changes associated with blood flow. The fMRI may use a magnetic field and radio waves to create detailed images of the body (e.g. blood flow in the brain to detect areas of activity).
The material (http://news.berkely.edu/20ll/09/22/brain-movies/) shows one example of how the fMRI can measure brain activity associated with visual information and generate image data.
[0027] Cryptocurrency system 150 may include one or more processors for processing commands and one or more memories storing information in one or more cryptocurrency data structures. In some embodiments, cryptocurrency system 150 may be a centralized cryptocurrency system or network, for example, but not limited to, a server which may be privately run by a third party entity or the same entity that is running the task server 110. In other embodiments, cryptocurrency system 150 may be a publically accessible network system (e.g., a distributed decentralized computing system).
https://news.berkeley.edu/2011/09/22/brain-movies/ Scientists use brain imaging to reveal the movies in our mind
submitted by snowboardnirvana to conspiracy [link] [comments]

Summary: pitfalls of paper wallets

Pitfalls and solutions of paper wallets

Creating paper wallets:

Problematic action: Create a paper wallet on a paper wallet service website without disconnecting from the internet. Reason: It's extremely insecure for many reasons, some being 1) the website is hacked with generated private keys sent to the hacker; 2) there may be malware in the browser or in the operating system that sends the private keys to the hacker. Solution: The bottom line is to disconnect the internet before creating the paper wallet. It's not secure enough because 1) the malware can save the private keys and wait for internet connection to send them out; 2) the malware can interfere with the generation process itself and give you a private key that is already known to the hacker, which is called backdooring the random number generator; 3) the private keys may exist on the hard disk therefore may be extracted by malware or after the computer is disposed. Better solution: Download the paper wallet app from an online computer. Copy it to an offline computer via a flash drive. Run it from there. Best solution: Use a live operating system, such as a Linux live CD, to run the paper wallet app. This is not ultimately bullet-proof, especially for high-value targets, because there exist malware that can hide in the BIOS and firmware of your computer and can infect your live operating system. It should be secure enough for average Joes.
Problematic action: Create a paper wallet without serious verifications. Reason: There may be incompatible issues with operating systems and browsers. Solution: Run tests on various operating systems and various browsers before putting BTC in. Make sure the generated private keys are identical. This applies to regular paper wallets and BIP38 paper wallets. Make sure the decrypted BIP38 keys are correct.
Problematic action: Create a brain wallet created by bitaddress.org or other brain wallets without key stretching. Reason: It has been proven insecure. Solution: Use WarpWallet or other brain wallets with key stretching, e.g., scrypt, bcrypt, sha512crypt, pbkdf2, and so on.

Printing paper wallets:

Problematic action: Use a wireless printer. Reason: It's insecure because wireless networks are insecure. Solution: Use a wired printer.
Problematic action: Use an advanced printer, which has internal storage, such as a hard drive. Reason: It is insecure because the private key of the paper wallet printed may be stored on the internal storage, therefore may be recovered if the printer is sold or scrapped. Solution: Use a dumb printer. Or keep the printer locked up and never sell or scrap it. Or smash the printer, including and especially the internal storage.
Problematic action: Leave the printer open for other people to access after printing without turning it off. Reason: It's insecure because the private key printed may still be in the memory of the printer. Solution: Turn the printer off after printing.
Problematic action: Leave the computer untreated after printing. Reason: It's insecure because the printer driver and/or operating system may be keeping copies of the documents you print in some sort of "spool" or print queue. Solution: Use a live operating system, such as a Linux live CD, to print.
Problematic action: Use a shared printer (at work or school, for example). Reason: It's insecure because 1) the printer may have a glitch and someone else may get your printouts; 2) the printing jobs may be centrally logged. Solution: Don't. Use your own printer.
Problematic action: Use a printer to print the private key or the QR code of the private key. Reason: See above. Solution 1: Don't use a printer for private key stuff. Hand-write the private key. Hand-draw the QR code if you and the helping checker are patient enough. Or ignore the QR code since hand-drawing the QR code of the private key may be too time-consuming. Double check. Then check it again, preferably on a different day. Get someone you trust to check it. Then get him/her to check it again, preferably on a different day. (Testing the private key in a wallet app can make it sure. But it comes with risks.) Solution 2: Don't use a printer for private key stuff. Use brain wallet. Write down the passphrase and the relevant information, e.g., the name of the tool used, e.g., WarpWallet, and the instructions. Store it the same way as a paper wallet. Save and store some copies of the tool, in case the future versions become incompatible. (There are pitfalls for creating man-made passphrases. It is beyond the scope of this post. In a nutshell, don't create the passphrase (solely) with your brain, and don't keep the passphrase (solely) with your brain.)

Spending from paper wallets:

Problematic action: Import a paper wallet private key into a wallet app, then spend directly from the paper wallet address.
Mistake: Expect the paper wallet automatically receives/holds changes, similar to a real-life wallet, which may not be the case. Reason: Early wallet apps didn't handle the changes correctly. The changes became the transaction fees of the miners. There is a misunderstanding of how Bitcoin works. There is no account balance of any kind in Bitcoin. There is only Unspent Transaction Outputs (UTXOs). The receiving addresses of changes, which will become the new UTXOs, must be specified when BTC is spent. Otherwise, the changes will automatically become the transaction fees. This depends on the implementation of the wallet app, which should not be trusted.
Mistake: Think nothing is wrong if changes are handled correctly. Reason: It's called address reuse, which is not recommended in Bitcoin because 1) it reduces anonymity of both the sender and all the consecutive receivers; 2) it reduces the security by exposing the public key, which is vulnerable to quantum computing. Addresses are hashes of public keys, which are safe from quantum computing.
Mistake: Destroy the paper wallet after it's imported into an HD wallet, thinking that it has become a part of the HD wallet and it's safe to destroy because the master seed of the HD has been backed up. Reason: It is not a part of the HD wallet. If the paper wallet (the paper) is destroyed and the app is uninstalled, the BTC is gone even if the HD wallet is recovered from its master seed.
The right way: Spend (transact) all BTC in a paper wallet to an address of your wallet app. It is called "sweeping", which is completely different from importing the private key. Spend BTC from there. After all the spending is finished, create a new paper wallet and transact all the remaining BTC to it. Store the new paper wallet. Keep the old one for future reference, or destroy it if you don't want the trace.

Destroying paper wallets:

Problematic action: Destroy a paper wallet after it is used. Reason: You may need to prove you had control of that address some day, e.g., for taxation purpose. In the case of a chain split, you may have a balance on the other chain. Solution: Don't ever destroy a paper wallet. Keep it on file. Mark it with the relevant information, e.g., "Used in April 2017". Unless you don't want to be tied to the address.

Pitfalls not specific to but more likely happen to paper wallets:

Problematic action: Google a famous wallet app, click the first link or the sponsored link, download/install it, and use it, without serious research. Reason: It's insecure because the wallet app may be a scam. Solution: Do thorough research prior to deciding which wallet app to use. Find the official site prior to downloading/installing it.
Additions and corrections are welcome.
Edit: multiple editing for additions, corrections, and clarifications.
Disclaimer: Although I set off to make this article in order to use paper wallet safely, I ended up not using it. Some of the solutions are collected from the internet. Some are my untested ideas. Use the article at your risk.
submitted by exab to Bitcoin [link] [comments]

Introduction to Dalilcoin

Dalilcoin is a cryptocurrency and p2p network with support for publishing formalised mathematics. The code is based on a fork of Qeditas (qeditas.org). Like Qeditas, the initial distribution is an airdrop based on Bitcoin balances from May 2015 (Bitcoin block 350,000). The testnet for Dalilcoin started running on March 29, 2018, and the mainnet is expected to start in April or May 2018. The code is on github (github.com/aliibrahim80/dalilcoin).
Unlike most cryptocurrencies, Dalilcoin is not intended to support general payments. Instead the primary purpose is to allow people to publish documents creating definitions and proving propositions. Before a proposition has been proven, users can put a bounty on the proposition to encourage someone to prove it (or prove its negation). The publisher of a document can (and must) create ownership assets (deeds) to indicate ownership of the new objects defined and new propositions proven in the document. The owner can optionally allow later documents to import the object (without redefining it) or import the proposition (without reproving it). Such imports may require "rights" to be purchased from the corresponding owner's address. (Owners also have the option to allow objects and propositions to be freely imported without purchasing rights, or completely disallow such imports.) Deeds are also transferable.
Following Qeditas, the primary currency units are called fraenks. The smallest currency units are called cants. There are 100 billion cants in each fraenk. As in Bitcoin, there will never be more than 21 million Dalilcoin fraenks. The initial 14 million fraenks come from the airdrop corresponding to the Qeditas snapshot from 2015. The remaining 7 million fraenks will be distributed as rewards for creating blocks, using the same reward schedule as Bitcoin (where Dalilcoin's first block will correspond to Bitcoin's 350,000th block). The initial reward will be 25 fraenks for 70,000 blocks. It will then halve every 210,000 blocks.
More details about the currency and support for theorem proving can be found in the Qeditas white paper (qeditas.org/docs/qeditas.pdf).
The most significant change Dalilcoin made after forking from Qeditas is the consensus algorithm. Dalilcoin uses a combination of Proof of Burn and Proof of Stake, with the Proof of Burn relying on a second more established blockchain (Litecoin). In order to make limited use of valuable Litecoin block space, Dalilcoin will have very slow blocks. On average there should be 4 blocks per day, or one block every 6 hours. This will only require 4 corresponding Litecoin transactions per day. Due to the slow block time, there will only be approximately 100 fraenks produced as rewards per day and the first halving will take place after roughly 47 years.
Consensus Algorithm
Qeditas was designed to use Proof of Stake and Proof of Storage. There are a number of criticisms of Proof of Stake, and Dalilcoin addresses some of these by combining Proof of Stake with Proof of Burn. Everytime a Dalilcoin block is staked, the staker must create a transaction published to the Litecoin network. The Litecoin transaction must have a hash that begins with the two bytes 0x4461 (ASCII "Da") so that Dalilcoin nodes listening to the Litecoin network only need to examine the small percentage of Litecoin transactions whose txid begins with 4461. (To prevent transaction malleability, Dalilcoin stakers should only be spending from SegWit addresses.) The first output in this Litecoin transaction must be an OP_RETURN containing a push of at least 64 bytes. The first 32 bytes must be the hash of the previous Litecoin burn tx (or all 0s in the case of the first burn tx for the Dalilcoin Genesis Block) and the next 32 bytes must be the hash of the next Dalilcoin block (the one being created). In general the OP_RETURN will push more than 64 bytes with the extra bytes being used as a nonce to ensure the Litecoin tx has a hash beginning with 0x4461. The OP_RETURN output will also burn some litecoins (possibly burning 0 litecoins). The number of litoshis burned is multiplied by 1 million and added to the number of cants held by the staked asset. The resulting value is multiplied by Dalilcoin's coinage and used to determine if the staker has a "hit" and is allowed to stake a block. (To be more precise, Dalilcoin's staking code computes how many litoshis would need to be burned in order to stake with a given asset during a given second. If the amount to be burned is sufficiently low, a block is minted.)
The stake modifier for the next Dalilcoin block is determined by hashing the previous burn tx and the hash of the Litecoin block header in which the burn tx was published. This is essentially using Litecoin miners as random number generators to choose the next Dalilcoin stakers. (Of course, Litecoin miners are rewarded for this by the fees in the burn txs.)
Any node that has access to the Litecoin block chain will be able to use the information in the Litecoin burn transactions to know the current state of the Dalilcoin block tree. The primary question that remains is how one determines the current "best" block. The usual way is to compute some cumulative weight (e.g., cumulative Proof of Work) and choose the block with the highest such value. Here we can rely on Litecoin to make the most important choices, as it can act as a way to determine when one Dalilcoin block was minted before another.
Suppose a Dalilcoin Block B1 was minted with a Litecoin burn tx at (Litecoin) height H1. Next suppose a Dalilcoin Block B2 (successor to B1) was minted at height H2>H1. If someone mints an alternative Dalilcoin Block B2' (successor to B1) and publishes the burn tx at height H2' > H2, Dalilcoin will consider B2 to be the best block, with two exceptions.
First, the minter of B2' could reorganize the Litecoin block chain so that H2' < H2. To avoid this possibility, we rely on the security of the Litecoin block chain.
Second, no one might build a successor to B2 for a week (based on both the Litecoin block count and the median times in Litecoin blocks). If no one built a successor to B2 in one week, but a successor to B2' (possibly B2' itself) is less than a week old, then it becomes the best block. This second case has the consequence that if no one mints a Dalilcoin block for a week, the Dalilcoin block chain will no longer be live, and it would require a hard fork to reactivate.
In the rare case that two Dalilcoin blocks were minted close enough in time that both burn txs are included in the same Litecoin block, Dalilcoin will consider both equally good and wait for the next block to resolve the tie.
The coin age factor for staking assets is also novel, and is dependent on the properties of the currency asset being staked. Assets from the initial distribution (with birthday 0) start with a maximum age of 1089 (33 squared). Unlocked currency assets with a positive birthday have coinage factor n squared, where n increases every 16 blocks (roughly 4 days) until n is 33 (after roughly 4 months). Currency assets can also be locked until a certain block height L. For locked currency assets that are not block rewards, the asset has maximum age of 1089 until 8 blocks before the asset unlocks. After the asset has passed the lock height, it ages slowly, with age n squared with n increasing roughly once every 4 months until n is 33. Block rewards must always be locked for at least 512 blocks (about 4 months). In the case of block rewards, starting after 32 blocks (8 days) the asset becomes available for staking and ages in the same manner as an unlocked asset ages (increasing n every 3 days). When a reward is 8 blocks from being unlocked, it is not available for staking. After the lock height has passed, a reward begins gaining coinage using the slow formula, with n increasing every 4 months until n is 33.
The consensus algorithm for the Dalilcoin testnet is the same, except the Litecoin testnet is used instead of the mainnet.
Initial Distribution
As mentioned above the initial distribution of 14 million fraenks corresponds to Bitcoin balances as of Bitcoin block 350,000. In a system partly based on Proof of Stake, there is a danger in having the vast majority of the currency left as an untouched airdrop for an indefinite period of time. On the other hand, those who wish to participate in the network should have a sufficient amount of time to find out about the network and claim their part of the airdrop. The compromise position Dalilcoin has taken is to have the full 14 million fraenks available for Bitcoin holders from the time of the snapshot to claim for roughly 6 months (730 Dalilcoin blocks) after which the value of the unclaimed airdrop distribution will halve. Such a halving will continue every 730 blocks for roughly 27 years, at which time the unclaimed portion of the initial distribution will have no value. This means if you had 2 bitcoins at the time of the snapshot, you can claim 2 fraenks for the first 730 Dalilcoin blocks. If you do not claim these 2 fraenks, you will be able to only claim 1 fraenk for the next 730 Dalilcoin blocks, and so on.
One of the cryptographically responsible aspects of Qeditas was the use of Bitcoin signed endorsements to claim airdropped fraenks. Dalilcoin also supports endorsements. Anyone who has the private key for a Bitcoin address that had a nonzero balance can claim their part of the airdrop without importing their private key to the Dalilcoin software. Instead users can sign a message with their Bitcoin private key that "endorses" a different Dalilcoin address to be able to sign Dalilcoin transactions for the airdrop address. Conclusion
Dalilcoin is a very different kind of cryptocurrency project, targeting formalised mathematics instead of payments. The consensus algorithm makes use of an established secure blockchain (Litecoin's). The block time is far too slow to be useful for payments. Instead Dalilcoin blocks can be seen as something between a cryptocurrency ledger and an academic journal. Four blocks per day is very slow for a cryptocurrency, but very fast for journal issues.
The testnet is running now and the mainnet should be running soon. In a future article I will give more detailed instructions on how to run a node. In the meantime, feel free to clone the git repo or download the latest release, compile the code and try to connect to the testnet network. If you have trouble, ask questions here on the Dalilcoin subreddit (or, if you are desperate enough, read the README file in the repo).
submitted by aliibrahim80 to dalilcoin [link] [comments]

Skywire Testnet FAQ Update (July, 2018)

Please keep in mind that this will be an evolving FAQ and a living document as we progress through our testnet, so check back here often for updates.

General Information

What is the objective of the Skywire Public Testnet?

There are several goals we will accomplish with the Skywire Public Testnet. The testnet will be split into several phases. The version running today is the internal version of our testnet, aimed to validate its function and performance. The coming revision will publicize the network, as well as establish a fair economic model reward mechanism for running nodes. This will be based upon analysis of node utilization during testing. This testing will provide us valuable information to design a robust mathematical model for the mainnet so that all nodes on the mainnet will be automatically incentivized under a fair economic model.

What is the function of this version?

Once a user sets up an operational node, they will be able to search for other nodes and be connected to users around the world, breaking down borders and barriers to access global information.
Note that any computer can become a node on the network, however, only whitelisted Skyminers (all Official and selected DIY) will be participating in the economic model testing program, and eligible for rewards.

What kind of Skyminers will be whitelisted for the Testnet?

There are three main categories of Skyminers:
The initial whitelist will include the Official Skyminers that have shipped to users around the globe. These will become the baseline for early DIY Skyminers. Since we are entering into uncharted skies, we want to initially reduce any variables possible and test the network in a controlled manner.
We have already been scaling out to include high quality DIY Skyminers with equivalent specifications, and eventually any Skyminer (official or DIY) that reaches the minimum specifications required. Those minimum specifications will be determined during the testnet and released to the Skyfleet community as they become available so stay tuned.

What will be the whitelisting process be like?

First, the Skywire core team will collect the public keys for each node within each Official Skyminer. Since there are 8 nodes in a Skyminer, each will have 8 public keys. These Official Skyminers will be whitelisted once public keys are provided to the Skywire core team.
Here is a link to the whitelist submission page
DIY Skyminers will be reviewed manually and approved weekly (approximately 50 per week) following the completion of the whitelisting process for the Official Skyminers.

Can DIY Skyminers join the whitelist?

While Official Skyminers will be on the whitelist by default (upon submission and receipt of their public keys), DIY Skyminers will be allowed to join the whitelist based on the benchmark set by the Official Skyminer’s hardware configuration. DIY Skyminers will be required to provide detailed specifications and photos, submitted to the corresponding team for review. Qualified DIY Skyminers will be added into the testnet whitelist. Please remember that only selected DIY miners will be whitelisted. You may refer to the Skywire community on Telegram or the community Skywug forum for more discussions around this topic.
The first generation Offiicial Skyminer hardware configuration is as follows:
8 hardware nodes made up of 8 Orange Pi Prime PCB boards
8+1 100Mbps router (custom 16-port OpenWRT in production)
16GB RAM (8 x 2GB DDR3)
ARM Cortex-A53 CPU
Hexa-core Mali450 GPU
LAN Bandwidth: 8 x 1000Mbps
64-bit Linux (Alpine Linux)

What kind of hardware will be able to participate in the Testnet?

Any computer can be added to the Skywire Public Testnet, set up as a node, and use the functions of Skywire. However, only a limited number of machines will be whitelisted (including Official Skyminers and some DIY Skyminers as noted above) and receive rewards during the testing stage.
Machines not on the whitelist will still be able to participate in the network and access the full service of the network, however they will not receive rewards.

Is a dedicated router part of the required spec? For example, if someone builds a miner that meets spec with 8 nodes and a switch, but just has it connected directly to their home/ISP Router will they be whitelisted?

They could be whitelisted. Official miner is just a benchmark and DIY Skyminer doesn’t require the exact same setup as the benchmark.

Is there any difference between Official Skyminers and DIY Skyminers?

In the current testnet, only ONE miner is allowed to be whitelisted per IP address. In the future when rewards is proportional to the bandwidth you are producing for the network, any rewards is directly tied to the bandwidth you are producing so you may have any number of miners as you want with a single IP address.

How do I setup the software for my Official Skyminer?

We have simplified the process of setting up a Skyminer by creating a Skywire software package image for users to directly flash to their SD cards. The image contains all the standard functions that the nodes will need to get started with Skywire, such as the operating environment, static IP address, auto-start function, etc.
Please visit the Skywire Github for a detail tutorial on the software set up process.

How do we join the Testnet?

Those who have previously installed a version of Skywire can update directly in the software. (Note: if the update fails, please reinstall it by following the instructions on Github: https://github.com/skycoin/skywire).
Please remember that only whitelisted miner will receive rewards at this stage. However, you can still access the same VPN functions with Skywire along with everyone else!

What do we do after installation?

It is simple! All you have to do is keep the node online so that other Skywire nodes can connect to yours, as we perform network tests and do all the heavy lifting from our end. Grab a drink, sit back, relax and enjoy using the new internet :).

Economics

What will be the reward mechanism for running nodes?

At the moment, whitelisted miners will require a minimum of 75% up time per month to receive that month's rewards. The reward ratio will be set carefully going forward. We will first need a rigorous dataset as a point of reference and will be adjusting the rate continuously throughout the process as the economic model gets established.
It is important to note that in the current testnet, Skycoin is rewarded independent to bandwidth production of your miner. In the future, Coin Hours will be earned instead of Skycoin depending on the bandwidth you are providing to the Skywire network.

Do we get extra rewards for maintaining >75% up-time?

No you will not. Everyone who maintain >75% up-time will receive the same rewards.

What is the mining rewards?

For the first month, the rewards was set as 96 SKY per official miner and 6 SKY per node up to 48 SKY for DIY miners. As we figure out the most optimal economics to incentivise a global meshnet of hardware infrastructure for this new internet, this number will change depending on the growth of our network.

Does Skyminer mine Coin Hours?

Coin Hours is a separate currency produced by Skycoin. Each Skycoin produce 1 Coin Hour every hour. Coin Hour will be used in the future to pay for transactions in the Skycoin economy such as Skywire and Kitty Cash accessories. Once we move onto the main net, Skyminer will produce Coin Hour instead.

How often does the whitelist uptime monitoring refreshes?

It refreshes at the beginning of every month.

Do we need to be whitelisted once we move to the mainnet?

No. Anyone is free to join and start earning by contributing valuable resources (bandwidth, storage and computation) once we are on the mainnet.

Technical

When I visit 192.168.0.1 on my browser, I see my own home's router instead of the miner's router. How do I fix this?

There is a conflict in the LAN configuration between your home's router and the Skyminer's router. You need to change the miner's router IP to another IP address OR you can change the miner's router into your own network switch

Is Skycoin node the same as Skywire node?

No. They are a completely separate and independent decentralised network. Skywire node is responsible for sending, receiving and transmitting data. Skycoin node is only for validating transactions and the state of the blockchain much like Bitcoin nodes.

Do I need to leave my computer on once I have configured my Skyminer properly?

No you do not. As long as your home's internet modem is still turned on and providing bandwidth to the router and CPU boards on your Skyminer, your own personal computer doesn't need to be left on. That's the idea of having an independent purpose-built Skyminer.

My Skyminer was turned off because my power went out, will I need to re-register on the whitelist and lose my rewards?

No. All you need is to maintain a >75% up time as shown on the discovery address (http://discovery.skycoin.net:8001/)

Will I need to reflash if my miner was shut off?

No you will not. Installing Skywire on a Pi is like installing a program on your personal computer. You don't need to reinstall the program every time you turned off your computer.

Will changing the router affect my node's public key?

No it will not. The public key is attached to the software installed on the Pi. If you reinstall the program (eg. reflashing) then you will have a new set of public keys. If you have reflashed after submitting your public keys on the whitelist, you have to contact us to change you public keys otherwise you will not receive your rewards.

I can't log on to the router of my official Skyminer.

Ensure all the networking cables are attached correctly, turn off any wifi and VPN on your computer, ping 192.168.0.1 via the Windows or Mac command prompt interface. If you are able to ping your router than please wait 2 minutes and try again. Contact our community managers for support for more help on the Skywire Telegram

I have set my Skyminer's router's address on WLAN as 192.168.2.104. However, when I tried to access 192.168.2.104:8000 via another computer I am unable to connect?

Port 8000 is an address set for the Manager node's board. It isn't part of the router's address. If you haven't set up the port forwarding correctly, when you try to access from another LAN network (outside of the Skyminer's own LAN), you will not be able to connect to the miner's router. If you are uncertain about how to set up portfowarding rules, contact our helpful Skywire community managers for more support.

What cables do I need for the Miner's WAN port?

The same as your home's internet cable. We recommend CAT 5e or better cables.

I successfully used Skywire to access the internet by using the bandwidth provided by another peer. However after a while, I was unable to continue using the connection and have to reconnect, why is that?

This is normal. If there is a period of bandwidth inactivity, the connection will disconnect automatically. Another reason is that the peer you have connected to is providing a sub-par connection.

How do I know what my mining nodes' IP addresses are?

Enter the Skywire manager interface installed on the Manager node, turn on 'Terminal', and enter the prompt "ifconfig" in the command prompt. It will return with the IP of that exact node you are accessing.

The green lights on all 8 boards are lit. Why do I only see 7 nodes on my Skywire Manager interface?

First check if all 8 lights are lit on the miner's router. If not then check all connections are properly installed. Then use the "ifconfig" method mentioned above to identify exactly which board is not connected. Restart and reflash that SD card and try again.

If someone else has connected to my node, can I be hacked by them?

No they can't. Due to the restrictions set up in the software code, peers are not able to visit anywhere outside of the node they are connected to.
__

Where can we learn more about Skywire and join the discussions?

Chinese community:
Follow Skycoin China official Wechat Account - “SkycoinFans”, and join our Wechat discussion group
Join Skywire Chinese Telegram community: https://t.me/SkywireCN
Global community:
Join Skywire official Telegram community: https://t.me/skywire
Join Skywug forum: https://skywug.net/forum/Forum-Skywire
submitted by ChocolateyLab to skycoin [link] [comments]

[ANN] Developer Announcements - September 2017

All messages are taken from the official Linx Slack with permission of the developer to share here
Previous threads:
[ANN] Developer Announcements - August 2017
September 5
Dev: Temporary Block Stats on the mining pool are now working again. https://mylinx.io/blocks/ It now shows the last 100 blocks found by the pool instead of the last 50 too.
Dev: We will be updating the pool software to something a lot more detailed in the near future but right now we have our hands full working on other aspects so please bear with it for the moment ;)
Dev: Hey guys, just a little primer about Linx and how we operate for the newcomers to the Slack. Linx isn't a token, it is a limited supply mineable currency that is released steadily over time as the blocks are mined. We chose this route for two main reasons:
1) We didn't want our currency reliant on another platform and any potential issues that could arise from being tied to a third party platform.
2) We believe coins should ideally have some real value from the moment they are minted. This initial value is derived from the computing power and money spent on generating the coins in the first place (which is why we chose the Scrypt algorithim for the PoW), along with a limited supply of coins. To simply issue 1 billion tokens and expect people to see value in them on based on a whitepaper of ideas is not something that sat well with us. This is no different to a bank printing money backed by nothing - the very thing that Satoshi tried to free us from when he gave the world Bitcoin.
We are confident that Linx will find it's future value from it's real-world uptake and usage and not from a bag of magic beans.Linx isn't an ICO, there was no crowd funding and we have never tried to entice anybody into investing, other than by keeping the community aware of our current developments and giving you a rough guide of where we plan to take this project.
We don't disclose the details of our roadmap or forthcoming projects for several reasons:
If you see the potential in what we are doing here, then it's a pleasure to have you onboard. We value your support for what we're sure is going to be a very exciting ride
September 12
Dev: Hey guys, we understand that you want to know what's going on but please bear in mind what we have said from the start. The current crypto community isn't our target market. It’s really great that people in the crypto world are supporting the project in its early stages, but it was never our aim to be just another coin that only finds it’s value as a trading token on the exchanges.
Our plan has always been to deliver something fresh and exciting with real use to an entirely new audience.
That said, there are several areas that we are working on right now, some of which you already know about. These include : the next release of the source code along with a redesigned QT wallet, a new mining pool and a new block explorer that will allow you to search by addresses and TX IDs so you can verify paper wallet deposits.
Most importantly we are building the Linx platform, which will be the heart of the project as far as users of the currency (new and existing) are concerned. We are also working with our first retail partner with regards to Linx payment integration.
There is no fixed timescale in place for any of the above, but we are working to get everything out there as soon as possible. Please remember that Linx was launched just 3 months ago and we are working non stop to achieve more in the first 6 months than other cryptocurrencies have done in years.
Linx is currently available on a limited amount of exchanges to allow for circulation from the miners to early adopters. Some of you have expressed concern about the price fluctuations, but at this early stage in the project any price swings at such low levels are not really a concern to us.
It is completely understandable if you don't feel comfortable holding Linx until you see current developments put in to action. As said previously, this is why we did not go down the ICO route.
Hope this has answered some of your questions & we wish you all a great week.
September 21
Dev: As you will be aware, we disabled the Linx Web Wallet recently so we could run tests against potential risks.
We take the security of your holdings very seriously.
We have concluded, that at this current time, web wallets as a model for storing cryptocurrencies have potential vulnerabilities that we are not happy to expose our users to.
With our current plans, Linx is about to be introduced to a significant amount of new users with very little or no previous crypto experience. We want Linx to be a smooth, pleasurable and most importantly safe way for all users to transact and store currency.
We know that most of you are already fully aware of the risks of holding large amounts of your currencies in web wallets and have alternative storage as recommended, but new Linx users may not be.
is very important to us that we protect all users as much as possible, and to this end, we have decided that the Linx web wallet will remain offline for the foreseeable future or until we feel confident that the potential risks with web wallets have been eliminated.
All users of the Linx web wallet with positive balances will be contacted directly to arrange transfer of their funds*.
If you don’t already have an alternative wallet you can download a version for your operating system directly from us. If you need help installing or using your new wallet please don’t hesitate to get in touch with us and we’ll guide you through it.
Kind regards,
Team Linx
*If you did not supply an email address when you signed up, please contact us.
September 27
Dev: Notice regarding the Linx Web Wallet : All Linx Web Wallet users with a positive balance were notified by email on the 20th September with instructions of how to receive their coins. Please check your spam folder if you think this may be relevant to you and you didn't receive it. If you have any questions drop us an email.
September 28
Dev: Pool update : Running tests at the moment but the brand new Linx Mining Pool, complete with detailed stats, should be open for business soon. We'll let you know when it's ready!
submitted by CryptoSaul to LINXcoin [link] [comments]

Transcript of George Webb Video Series Part 220 "Hillary's Leakers, Hackers, and Henchmen" [@Georgwebb / #HRCRatlne]

  • Day 45.2 Follow Lisa Page, Paul Manafort, and the EB5 Visas - YouTube
    • This is gonna go over comments
    • Again, day 45 part two and these are the comments I talked a lot about McCabe and moving to Chappaqua...
    • And all the power and crews and digging and pedestals and vaults and all the things that change up there
    • I thought geez it just looks like they're moving money out of Indonesia and Malaysia and European banks and offshore banks and and mining all the Bitcoin for Hillary to get--resources for the future
    • Hillary two ready for the getter treasure trove organized in Chappaqua for the big drive to the presidency
    • And it's amazing how when something just fits
    • How a lot of data comes together <<> from the DNC two Chappaqua
    • {{ 135 Castle Road. 15 Old House Lane shown on map unknown owner unknown city unknown state not a dox }}
    • The reason why I believe it moves from DNC to Chappaqua is the to operations are done
    • First operation is looting DCCC
    • The second operation is looting DNC, while there's still other candidates getting money then when you're done and you eliminate Bernie, then you you don't need to do that anymore, and you move the operations to Chappaqua
    • Again, you don't want your hackers being arrested
    • When they're exposed at DNC
    • When they're exposed at DCCC., they're there's an ability to get arrested
    • So it's the same reason why I think for the OIG hack of DHS
    • You come in with a team--I'm not saying Lisa Grafenstine, but somebody like that
    • You come in with a team, you say here's your vulnerability risk, we're gonna look and do all this vulnerability testing, we're gonna get it or download all these files
    • Now oops, I stole the Inspector General's laptop
    • Again, took it over to Hawkshead--and
    • Again, asking Andre Taggart, when the up I would remember when somebody came over to my house with an FBI raid
    • Ask Andre Taggart what day the FBI raid and the NCIS people came over, the Capitol police came over and got that
    • The OIG laptop
    • And I believe it's gonna be, I believe they stole an Inspector General's laptop
    • I'm not saying Lisa Grafenstine, but remember there was four laptops, and 20 Blackberries with government markings, and there was the toner
    • So I'm gonna say right now, I believe that was the DHS's OIG's laptop
    • So again, the Capitol police report would tell us, and there would be no reason to repress that if that wasn't true, correct?
    • So anyway I want to go through this and operations move DCCC DNC then Chappaqua
    • And I wanted to say that a--how does somebody live in New York and then their wife is running for Virginia?
    • I'm saying that McCabe is buying this house for the Awans to live at
    • I'm not saying Andrew McCabe is moving up there
    • I'm saying he's setting up this command center in it and if everything looks like a command center in Chappaqua
    • He's setting it up for the Awans to move up there
    • Now I'm not saying a Seth Rich doesn't come up there or--a satellite person like--Hina Alvi doesn't come up there as well
    • But I think--all these your satellite person
    • But the hacking team is gonna follow Imran okay
    • So anyway DCCC DNC those two operations are done, then you move everything to Chappaqua
    • Just based on metadata
    • And then--you only need to be up there a day or a weekend to buy the house and then you're back with your wife
    • So I think that's what happened
    • There's a lot of action right now inside
    • Now I made a mistake yesterday it wasn't Kislyak that died
    • It was chicken Churkin that died
    • So there's been like nine Russian ambassador's die
    • So he died right about a month later and I could conflated the two
    • So there was a correction there
    • Just to make sure you got that right
    • But I love Corrections
    • Because then people remember corrections better than they do if you said I was right
    • People hate to hear people say I was right
    • People love to hear people say I was wrong {{ 911: those are called trolls or h8rs }}
    • And I've corrected you and I love it
    • So so keep correcting me because it only reinforces a chicken died right after that
    • So it makes me think Chuck it's the guy that they did the deal with read Kissel yakked--it's just one thing after another
    • Now this is an interesting one I did last night with Lisa Page
    • Again, we're down to the people actually making the move
    • So once you get the actors then you can just follow their schedule around and just query their schedule and ask for discovery on their schedule and then ask him a questions around their schedule and Lisa Page as ubiquitous with this Stroeve Peter Strzok and she had this criminal offense over in Ohio and I said ,"hey, that really makes me think about Strongsville
    • Because I was in Strongsville that's where one of the Saipov trucking companies was that was where this creepy school was that was I thought ,"hey, there's this weird European center there that got raided by the FBI
    • So for ten years we have a color-of-law operation where we're bringing people into this Strongsville adoption agency
    • And if you read down a little bit farther, it's got all these kids from all these different countries from this running it for the State Department
    • Now that wouldn't be particularly significant (I'll read a little bit farther into this)
    • That that wouldn't be particularly significant if it wasn't for the fact the State Department says these European adoption consultants EAC European adoption consultants were from Bulgaria blah blah blah all these different countries, and then Ukraine Ukraine Ukraine Ukraine
    • Now I realize it's the last one, but this is the one that's the funnel for the Russian kids
    • What they're doing is they're given Russian kids and Russian families Ukrainian visas
    • So this was the Paul Manafort connection
    • And then and they're coming in and bringing them in through this Strongsville, Ohio
    • And it's out of the way we're nowhere else is this is where one of the Saipov trucking companies is
    • Why do I think the EB-5s are related to this, well a Saipov got 23 EB-5s
    • Saipov has a trucking company here in this in Strongsville
    • So that's why I think that--no other reason
    • Plus here where Stevie-Steve gets his hair cut, I went out there to where Stevie Steve this mass murderer who I thought was involved in killing the trucking folks down in Ohio, down this way a little bit
    • And he's right there he's right at right at this nexus right along with everybody else
    • He's also the guy at the Cleveland Clinic--when these visitors are coming in from UAE and Dubai in and Abu Dhabi
    • He's the one running between the children's center and--you know mentally handicapped kids are dying in their sleep, and then there's these successful heart operations the next day {{ 911: gross }}
    • So it's kind of like Stevie Steve and I went to his barbershop and I went to all these different barber shops and where the people were killed
    • And he just seems to be in the middle of it
    • Everything seems to rotate around Strongsville
    • Now the fact that Peter Strzok'a his dad has this kind of correspondent relationship with all these mullahs in nine different countries in the Arab countries leads me to believe that's the sales network--
    • I just--I know that's a--wild speculation but I just connected all the way from, "hey, all these different countries are the customers and all these Ukrainian kids are--being shopped out and they're meeting them here--somewhere out here at this creepy place"
    • They're meeting and say, 'yeah I want that one,' and then they're getting on the plane and then flying home--from from Cleveland International Airport
    • I'm not I'm not sure, but it's it just that you metadata screams that
    • Why is Lisa Page in a company with Paul Manafort
    • Why is she a partner in a company with Paul Manafort?
    • Why? Why would that be?
    • Now is that a nine or ten years sting I guess
    • So I guess it's a nine or ten years sting?
    • So anyway good comments sorry about the mistake about Churkin
    • The Lisa Page connection here some people said Lisa Page is a Mossad agent whatever
    • {{ 911: I think therefore I am Mossad }}
    • The Lisa Page connection here to to Paul Manafort is a very strong one
    • And I believe they're EB-5s
    • If like I said if Saipov didn't have a trucking company here
    • And it was Bright auto or something like that
    • And I had a car company I wouldn't say anything
    • He has another one in Cincinnati, which leads me to believe there's gonna be another funnel near Cincinnati
  • Day 45.3 Does Fusion GPS Have a Modus Operandi? - YouTube
    • It's Day 45 and this is part three and
    • Now our Mr. Akhmetshin's gonna come back into the story
    • Akhmetshin this is an ak-47 meeting your shin you remember back on days 260 something like that I was in Washington DC, talking about it Akhmetshin
    • I think it was in even before talking about the peepee dossier even before I had kind of brought Fusion GPS from kind of out behind it
    • So these are these cases right
    • Now what do we know about Akhmetshin?
    • Well he was the guy who went to the Trump Tower meeting I believe
    • Now Andrew McCabe is gonna be meeting with Glenn Simpson a Fusion GPS and a Akhmetshin and Veselnitskaya
    • They're gonna be planning this sneak attack on Donald Trump Jr.
    • They're gonna--they're gonna send them in
    • They're gonna send Veselnitskaya in say by this by this dossier, buy this dossiers, shop this dossier, much like Peter stroke shops the dossier in Congress in December of 2016 to try to do the anti-Trump thing right
    • So they're gonna shop this dossier Dom Trump jr. says yeah maybe--kind of and then somebody behind him says that's crazy
    • We're not gonna do that I think that's Jared Kushner
    • But somebody turns it down says this is crazy maybe it's a lawyer or something and it's not worth anything it throws it out
    • So there's no collusion and it's over with
    • So Akhmetshin's your setup guy
    • So what is he doing in these cases?
    • Well he's filing is what they call an "interested party",
    • And this is basically I'm gonna side with one of the two guys in the party here
    • So in this case there's an oil and there's a mineral case here in Washington DC
    • And then he sides with this one of the parties of the two parties
    • Now are they targeting different people?
    • Are they just picking a professor out of somewhere in one of their schools that supports Hillary to attack some friend of Vlad in Moscow to try to unhook some deal in Moscow?
    • Is that really what they're doing? Who knows
    • But let's look at this New York case, where let's see Ahkmetshin files, again, as an intervener, and just see if that's what's going on
    • Let's see modus operandi--we see a pattern developing
    • This is eggy here...this is a plaintiff it looks like
    • We're gonna see down here it's it's a movant somebody clear
    • They're gonna kick in something in this case and then there's this Zalmayev
    • Well it turns out he is a professor at University of California
    • And it turns out this guy is actually living in Moscow, trying to do Moscow Business Development
    • Let's see if they are attacking them or not
    • Oh here's Ahkmetshin he's gonna add some information in here and then he's also going to countersue
    • Zalmayev is also going to countersue the guy that's that they're attacking
    • Let's see how this goes
    • So we go down here to the docket, we go to the first complaint here, and we go to this, and this is gonna be expensive and you see that already thirty seven dollars
    • And there are thirty three dollars to view this document
    • I think I might have last month was terrible for reading documents it's like a thousand bucks
    • But anyway here it is there's Aggie suing Zalmayev's here
    • What's he saying? Well malicious disnformation campaign
    • What does that sound like? Doesn't that sound like exactly what's happening to Trump right now?
    • Russian corporate raid? Hmm where have I heard that before?
    • International litigation prevented him from personal safety loss of life and liberty harm abandon his claim to a valuable investment
    • It played a key role in the campaign elaborate negative public relations campaign illegitimate efforts
    • Defamatory false injurious statements all this sort of thing false defamatory etc etc etc
    • Now as a journalist, you have to report the news, and I correct whenever I make a mistake
    • So there is a certain amount of responsibility that comes along with that
    • And I try to exercise that every day
    • But this is where you're planting stories where you're paying--where has already been
    • Now identified as paying journalists to plant stories that are false--that's something very different
    • That's a that's a sneak attack
    • That's not journalism
    • That's not absence of malice--
    • That's going in with a preconceived idea to smear somebody, in writing, in publications no less, well-known publications
    • {{ 911bs: Called malinformation. Misinformation's a mistake. Disinformation could be done in a protective way (US spreading disinfo about crop circles), malinformation always is to harm }}
    • So they look like they grab this state of California professor they say ,"hey, I got an idea let's let's bust up a deal in Moscow and here it is"
    • There's the Moscow hotel they're going to bust up deal
    • And then finally what happens after this case is after they go through six years of litigation it basically dies
    • And this is a very very long case you can see here it starts in 2011 about when Fusion GPS starts and goes all the way until last month, when you guys finally just--gives up over end and it's sealed
    • And they seal the seal the case
    • So but then there's all this stuff
    • {{ 911: that's called lawfare }}
    • Now the key question is are our two people are our two FBI people people Lisa Page and Peter Strzok involved in this case or not?
    • Do they ever get involved as Peter Strzok ever get involved in this case with Lisa Page?
    • That's the question of the day
    • I'll put some screenshots in here along the way to show how long I've been talking about Fusion GPS
    • How long I've been talking about Akhmetshin
    • That's where the case is coming to
    • My Fusion GPS case will cite these cases as just more and more examples where Fusion GPS--I believe--aided in the creation of dossiers through illegally-obtained material, potentially, with the Awans, to create dossiers against people
    • Much like the Michael Flynn case, to try to smear someone with information
  • Day 45.4. Collect, Dossier, Reprisals - Need to Come Clean, No Sound and Fury, Documents - YouTube
    • It's Day 45 this is version 4
    • And obviously I put out my amended complaint that they're going to be adding the partners of Peter Strzok and also Lisa Page
    • I also had to add Agent Pettijohn and Agent Whittaker of JTTF to my complaint
    • The strategy has been three levels, the collection level, which is the Awans, the Steele, Russians that he brought into the country
    • The second level is once you collect it all you then do a dossier:
    • You do analysis and figure out the best dirt you have on somebody--the best leverage you have
    • And then the third level is reprisal: you don't collect the information to not do anything with it
    • And that's the FBI level that's Andy McCabe through people like Strzok and Page as well as many many other people
    • There's also parallel FBI investigations at every level as well that have been kind of in the shadows, afraid to come forward, and have been kind of put kind of squelched by Andrew McCabe in JTTF
    • So it's a very small group of about sixty guys in internal to FBI, that just need to retire
    • Just find it find a nice farm and retire
    • Make a lot of money
    • And that will the sun-shining of documents documents documents is the answer
    • To have a dog and pony show up in Congress is all well and good
    • A couple of press releases saying that you're going to open an investigation is all well and good
    • But these are really just like curtains--putting new curtains on it on a collapsing building
    • What we really need is publication of documents
    • Publish the OIG hack
    • Publish the OPM hack data
    • Publish the IG report in Congress about the 5100 illegal logins
    • Publish the CDW report
    • Published these key documents from key investigations to show that you have good faith
    • Dog-and-pony shows are all well and good and everyone has--to fall on their sword a little bit publicly
    • But that's not really very substantive at all
    • And I'm not gonna just permit Bob Mueller to kind of act like judge and jury when he is a co-conspirator
    • He been a beneficiary as much of the graft as as Comey, McCabe and Rosenstein
    • It's not gonna happen
    • We can't have half well we'll split the Ocean's eleven team up here
    • You've you five guys go over there you be the jury and we five guys will go over here we'll be the judge
    • And then we'll pick one of us amongst us to beat up on
    • It doesn't work like that
    • Everyone should just retire now and move on
    • I'm gonna keep moving on the Uranium One case
    • I've obviously got a lot of new information they're publishing today
    • Keep moving on the reprisal level with Andrew McCabe got new stuff coming in Chappaqua
    • Got new stuff coming from the Mueller Team
    • And how the Mueller team was infiltrated with the Strozek infiltrators
    • So all these things are going to be discoverable
    • So sooner or later if the American people are not savvy enough to demand documents, they're going to get hoodwinked again, like we did in the Hillary investigation server and investigation and the Huma server
    • Lots of smoke all sound and fury signifying nothing
    • We need to move to documents publication of documents documents documents
  • Day 46.1 Need To Eye Dropper a Fusion GPS Dossier? Call Strzok and Page - YouTube
    • I wanna this is Day 46
    • I'm gonna do the comments for the first two videos and I think you'll see how all this is kind of connected now
    • Last night it was great because all the videos I did yesterday were those were the fodder for Carlson Tucker Carlson--The whole hour and that Hannity the whole hour
    • Even Laura Ingraham and Bret Baier have picked up on this as 20 watergates as Kallstrom has said
    • But the first thing is that the mainstream media has to recognize that Strzok and Page are the key to the whole thing
    • They're that the henchman and henchwoman of Andrew McCabe
    • So that was out there last night
    • Now they still have this text message oh they just said nasty text messages about Trump
    • That's where we are today
    • Now I'm going to move everybody a little bit forward again
    • This is Fusion GPS--They're taking the dossier process.
    • You collect it with you Awans
    • You move it to the dossiers with Fusion GPS
    • And then you then you do reprisals with the FBI
    • And this Strzok and Page are that how you do reprisals
    • You forward it as a series of unrelated messages, but you you send a couple of pieces of the dossier over here one day
    • And then a couple more pieces over there
    • And what you're doing is you're you're doing the deep dives
    • You're doing the messages from Flynn to Kislyak
    • You're doing the Jared Kushner messages
    • You're sending them over like you're just picking these up one at a time
    • Like you don't already have this sitting over in a MicroPACT case management system over at Fusion GPS
    • Now I'm not sure if they use MicroPACT at Fusion GPS or what the case management system is
    • But it's going to be a case management system, a lot like Theresa Grafenstine's case management system
    • I'm not saying Theresa Graphenstine's case management system is being used by Fusion GPS, but somebody if you had access to a case management system like Theresa Grafenstine has at Fusion GPS, you could query that system, and then send little bits and pieces of the dossier
    • Like text messages
    • And you could make it look like actual investigative work
    • And if you're a fake enough like Peter Strzok that works out really well because everybody actually thinks you're an FBI agent
    • So the other piece to this is when you find smoke, when you find a conversation between Flynn and Kislyak, you then need a FISA warrant
    • You need a FISA warrant
    • Well you're never gonna go to a three-judge panel actually with the FISA warrant, but let's just say this is Lisa Page here you're gonna go to Lisa Page and say, "hey, Lisa do that FISA write-up and then we're gonna say it's lost paperwork or it never got over to a judge
    • Now if somebody does a warrant like now and does it drill down, then you just run down the street two three three three Constitution in the middle of the night
    • So your favorite judge and he signs off on it and they back-date it
    • And then you're good to go
    • You're gonna find this combination
    • It's not an affair--the reason why there is Zelig
    • I noticed they even use my Zelig there
    • They're the reason why they're Zelig and they're everywhere is because it's a tight system
    • You don't want 18 people involved in this
    • This is what I keep saying it's so few people are involved in this with McCabe
    • These are the two and I'm not this isn't Lisa Page I don't think
    • But this this is how tight it is
    • They're gonna go from place to place to place to place where you need to speed out this Fusion GPS stuff, to make it look like there's an investigation
    • And this has happened over and over again, for the last I would say 20 years
    • Now Lisa Page didn't get involved until 2006
    • There was a lawyer here in town named Megan something that was used before that
    • And I don't think really Lisa Page gets into the full swing until about 2008 2009
    • But--the roles change, but basically you have somebody sweeping up after you and covering you in case somebody finds out you're doing illegal surveillance okay
    • So it's just that simple
    • So that's how that'll come out tonight I think on Carlson and then Hannity picks it up
    • And then Bret Baier says--there's a story going on around here, but I think it's gonna lead to the helicopter and Otay and those helicopter rides they take
    • So I'm only go a little bit of the way you
    • {{ video cuts to long sequence of black}}
  • Day 46.2 Lisa Page, Have You Ever Been To Strongsville, OH? To the EAC? - YouTube
    • It's Day 46 this is part two and
    • Now I'm gonna go into the Strongsville Ohio connection from part two yesterday
    • People are asking me well why is this going so much faster why is this going so much faster
    • It seems like every day
    • Well Task Force is in the DC area and Task Force is helping me now
    • So you met Task Force earlier with the badge...mm-hmm I just wanted to let--that Task Force is helping me at inside professional who's dealt a lot in the law enforcement community
    • And this is about this is about feds coming into a local law enforcement, and basically taking over with their operation
    • And I'm gonna call this a State Department operation
    • And this is going to be an operation I talked about yesterday
    • And it's in Ohio
    • And you can see here that Lisa Page has these offenses of--affair interfering with official business and--doing wacky things with a car--get in front of the police officers and all this
    • You're gonna see all this wackiness
    • Why is Lisa Page doing all this wackiness out instructions
    • I'll play a little bit of it, "hey, this weird European Center there that got raided by the FBI
    • So for ten years we have a colorable operation range color-of-law operation ten years adoption object see if you read down a little bit farther worker it's got all of these kids from all these different countries from this mostly Ukraine
    • Now that would particularly significant
    • Again, a little bit farther into the State Department State Department state or a significant if it wasn't for the fact the State Department says the Sheriff through an adoption options the AC European adoption caucus all work from Bulgaria our handle all these countries and Ukraine Ukraine Ukrainian I realize the last one Ukraine Ukraine's the warrants the funnel for the Russian kids what they're doing is they're giving Russian kids and Russian families Ukrainian visas
    • So this was the Paul Manafort connection oh Manafort Paul Manafort Paul Manafort--okay
    • So they just
    • So the Mueller just took away Paul Manafort its bail conditions or they're against it
    • Somehow they think {{inaudible}} communicated with Paul Manafort maybe I don't know.
    • Wrong!
    • Andy's had a year to figure it out
    • Wrong! Bob Mueller
    • NO. What's happening is
    • Well let me just explain Strongsville
    • First of all Trump raided Strongsville
    • He met with Putin or his people met with Putin--they found out about this kind of breaking this is the Russian baby thing this isn't baby snatching
    • well maybe it is baby snatching
    • But they they raided it and the thing started in December, and then they raided it finally I think in February
    • And what is so beautiful about how this operation is run is you have these really great incredible parents through these religious organizations, trying to adopt these Russian kids
    • And they it takes forever and the the the kids--are older
    • And it just seems like oh my gosh these kids are never gonna get adopted
    • They're seven eight years old and it's these kind of folks here that are just the salt of the earth of Ohio
    • These are my parents...50 yrs ago
    • And these are just incredible people
    • They make what how'd the State Department runs this deal is you have a few people that are media fronting this operation
    • Which they are the most sincere people in the world
    • And then you have the Saipov babies coming in like there's no tomorrow
    • Everytime a Saipov trucker is going for another thing of uranium--taking another thing in uranium out, he's bringing a kid back
    • And you only need about 23 visas to reuse over and over again
    • They finally bust the operation in June this year okay
    • So they're shutting it down but
    • Again, the greed they just want to keep this thing going it's just it's it's amazing actually
    • And the fact that Jeff Sessions hasn't figured it out is quite quite amazing
    • And I wonder if there's any uranium dealings in Mobile, Alabama down there at the Naval Center
    • We'll get to that later
    • But anyway here's the Strongsville adoption agency
    • What they're doing is are bringing them up through Texas
    • And these Texas truckers I hate to go but down to the Texas shooting
    • Again, but Texas truckers there's going to be a network of about 2,000 of these truckers that are using the commercial drivers licenses--the commercial operators licenses for a very few set of trucking companies
    • And a whole bunch of different companies are gonna use those
    • If they get busted they get busted right for not having driver's licenses...
    • But they're bringing them up from the Mexican border and on these truckers, then if anybody ever gets arrested they throw Uzbeki truckers under literally under the truck, under the bus, and get them arrested
    • So you only need about twenty seven visas 23 visas what did Trump say that Saipov had about 23 visas?
    • And then you keep losing your visa
    • We keep printing new visas in in in Kingston, right?
    • And just keep losing visas printing visas losing visas printing visas
    • After well we got about--500 visas
    • These are the visas that are gonna be in the indictments in the sealed indictments
    • Now I'm daring Mueller I'm daring you right now to unseal those indictments
    • Because I know most of them are gonna be because of these duplicate visas the people using the duplicate visas
    • All you have to do is do is go to the TSA
    • And what's funny is Kirsten Kirsten and Nielsen the new DHS--she's from TSA--she knows how to do this match very quickly, and see that these visas have been used by different people
    • This is why the conspiracies collapse so quickly
    • So anyway the the history of abuses goes back a long way with this Center--this European adoption consultants--this EAC
    • I've had people way back when I mean I want to say a hundred day 150 go shoot video at this place after I was there the first time
    • And it's it's pretty much shut down now after the raid
    • But this goes back a long way, where there's all kinds of neglect while these babies are being stored in the Texas area
    • I'm not gonna say it's where the Texas shooting was but that's why it gets close to
    • And then they bring them up here when they have a match in Ohio
    • And I think there's gonna be Cincinnati
    • It's also gonna be Cleveland are the two places
    • And then I also think Minnesota
    • I think it's gonna be in near like Rochester Minnesota
    • They like the out-of-the-way places they don't like to go into Cleveland they're going to places that have a strong presence of law enforcement
    • They like to out-of-the-way places where they kind of control the Sheriff...
submitted by 911bodysnatchers322 to TruthLeaks [link] [comments]

Instruction and Review for Antminer S9 SE Bitcoin Miner ... How to configure cgminer - Windows mining tutorial - YouTube BFGMiner on Windows Setup Guide for Bitcoin Users + ASIC ... How to Start Using Bitcoin in Five Easy Steps - YouTube How To Mine Bitcoin - YouTube

This tutorial is intended for the INNOSILICON T2 Turbo Bitcoin Miner which is one of the most powerful bitcoin miner of Innosilicon. The hashrate of the T2T is upto 30TH/s while the power consumption is only 2200w. Miner Specifications. Brand: Innosilicon: Model: Terminator T2 Turbo(T2T) Algorithm: SHA-256: Submodel: 30TH/s @ 2200w : Hashrate: 30TH/s ± 5%: Power Consumption: 2200w ± 10% ... Bitcoin Miner Setup and Configuration; Sounds easy right? Don’t worry, in this guide; I answer all the commonly asked questions I get from over the years of my experience in ASIC mining. Questions like “where to buy bitcoin miners,” “how to set up a bitcoin miner,” “what is the best bitcoin miner” and more, will all get answered ... Der 2Pac USB Stick Miner für SHA256D basierte Coins benötigt einen speziellen Branch der Miningtools CGMiner die hier als Binary für Windows Systeme (empfohlen: Windows 7 oder höher) zum Download verfügbar ist: 26.05.2019 @ 9e51f0b – cgminer-4.11.1-windows-gekko-9e51f0b.7z; Der Miner registriert sich im Windows Gerätemanager als “2Pac BM1384 Bitcoin Miner”. Bei Treiberproblemen ... Ubuntu Mining Instructions /> BitCoin Mining and Ubuntu 10.10 – ATI Radeon 5XXX. Erik Paulsen writes: “It took me a good part of a week to get this graphics card to mine BitCoins in Ubuntu”. Complex mining programs for Bitcoin mining include CGMiner, Phoenix, DiabloMiner, Ufasoft Miner, BFGMiner. Working with them requires knowledge of MS-DOS commands. For beginners, it is better to use software with a simple graphic design and minimal additional options. They require less setup time and immediately focus on mining of cryptocurrency. In this case, you can use the next programs ...

[index] [42839] [7142] [49082] [19705] [39473] [42705] [40478] [13383] [22284] [17382]

Instruction and Review for Antminer S9 SE Bitcoin Miner ...

Easiest way to buy bitcoin (bank transfer): https://coinbase.com/?r=515f664d7198da63d3000016 In this tutorial I explain Bitcoin and demonstrate how to get st... Mining hardware comparison: https://litecoin.info/Mining_hardware_comparison Litecoin wallet: https://litecoin.org/ CGminer: http://ck.kolivas.org/apps/cgmin... BFGMiner on Mac Setup Guide ----- BFGMiner website: http://www.bfgminer.org Install ASICMiner driver: http://www.si... http://www.voicesofliberty.com/article/5-easy-steps-to-get-started-using-bitcoin/ Bitcoin is an open-source cryptographic currency that uses peer-to-peer tec... Antminer S9 SE is a special version of the classic Antminer S9, using a new generation of chip technology and design structure, enabling the unlimited potent...

#