[Download] Bitcoin and Cryptocurrency Technologies [PDF ...
[PDF Kindle] Bitcoin Mining Step by Step (Bitcoin Step by ...
Introduction to Bitcoin Mining - Michael Ian Shamos
The home for the most innovative cryptocurrency, VeriCoin and Verium VeriCoin: Proof-of-Stake-Time Protocol. PoST Verified. Verium: Proof-of-Work-Time Protocol. PoWT Verified. CPU Mine-able (GPU and ASIC Resistant)
US OFAC issues advisory: ransom payments for ransomware may involve felony charges and personal civil liability for staff.
Under the authority of the International Emergency Economic Powers Act (IEEPA) or the Trading with the Enemy Act (TWEA),9 U.S. persons are generally prohibited from engaging in transactions, directly or indirectly, with individuals or entities (“persons”) on OFAC’s Specially Designated Nationals and Blocked Persons List (SDN List), other blocked persons, and those covered by comprehensive country or region embargoes (e.g., Cuba, the Crimea region of Ukraine, Iran, North Korea, and Syria). Additionally, any transaction that causes a violation under IEEPA, including transactions by a non-U.S. person which causes a U.S. person to violate any IEEPA-based sanctions, is also prohibited. U.S. persons, wherever located, are also generally prohibited from facilitating actions of non-U.S. persons, which could not be directly performed by U.S. persons due to U.S. sanctions regulations. OFAC may impose civil penalties for sanctions violations based on strict liability, meaning that a person subject to U.S. jurisdiction may be held civilly liable even if it did not know or have reason to know it was engaging in a transaction with a person that is prohibited under sanctions laws and regulations administered by OFAC.
Sauce Here: https://home.treasury.gov/system/files/126/ofac_ransomware_advisory_10012020_1.pdf OFAC Sanctions list here: https://sanctionssearch.ofac.treas.gov/ Analysis: Both TWEA and IEEPA carries Criminal and Civil penalties, so under these acts they can fine the company, fine staff directly, or press criminal charges. We know the US Government as part of both the 5 eyes agreements and domestic bank monitoring programs under FACTA monitors all international wire transfers. Bitcoin and other cryptocurrencies generally leave a paper trail that can be traced back to who purchased the currency. What I expect to start happening here is most CFO's are going to write off the cost of the ransom as a tax deduction which tips off the IRS that a ransom of some kind was paid. I expect the next step is the IRS is going to start asking for additional proof of payment and additional information about the cases. That puts CFO's in a bind, because I expect both the IRS, and federal courts, won't let it fly that you didn't know who you were paying money to under the TWEA. They'll sit on the data, and when eventually an APT Group gets compromised, they'll trace the payments back via said tax records. At that point, if your org paid under this, that data gets used to open up a search warrant and then they rip you a new one especially if the payment was substantial. The bigger issue here is it opens up tremendous liability for security services firms and insurers who pay ransoms on behalf of clients or advise clients to pay ransoms. Now is a good time to review your backup strategy and ensure you have tested backups that are isolated from your infrastructure. For those of you with your hands tied behind your back, now is a good time to gently remind your management staff, and especially the CFO if you have their ear, that they cannot rely on the renound cryptographic competence of our eastern european bretheren, and that their worst-case risk is a determined remote attacker and adversary of the US infecting your network, destroying the data while making it look like a ransomware attack, selling you worthless encryption keys to fund their operation before flaunting the fact they took you for a fool with a press release taking credit for the attack to tip off state government you paid them in order to further disrupt the company operations via putting your talented technical staff or c-suite staff in handcuffs and injuring your PR. To those of you in the business who are afraid of being scapegoated or in a tenuous situation, getchu some evidence tape and some tags, some vanilla envelopes and a glue stick. Print 2 copies, put one copy in a folder, seal it with evidence tape and a tag, then use your handy glue stick to adhere the other vanilla folder to its back and put the 2nd copy in so you can review the paperwork without breaking the evidence seal and shove that sucker in a fire proof safe or safety deposit box. Also, Mailstore home is free. TL;DR: If your company is attacked by ransomware, tell the management only facts of the occurance you know, what you can and cannot do for them, and don't advise them of anything upto and including getting a security services firm involved. I wouldn't even tell them paying the ransom might work. If you're going to have a verbal conversation, make it a one-on-one. Happy Saturday all!
Dragonchain Great Reddit Scaling Bake-Off Public Proposal
Dragonchain Public Proposal TL;DR:
Dragonchain has demonstrated twice Reddit’s entire total daily volume (votes, comments, and postsper Reddit 2019 Year in Review) in a 24-hour demo on an operational network. Every single transaction on Dragonchain is decentralized immediately through 5 levels of Dragon Net, and then secured with combined proof on Bitcoin, Ethereum, Ethereum Classic, and Binance Chain, via Interchain. At the time, in January 2020, the entire cost of the demo was approximately $25K on a single system (transaction fees locked at $0.0001/txn). With current fees (lowest fee $0.0000025/txn), this would cost as little as $625. Watch Joe walk through the entire proposal and answer questions onYouTube. This proposal is also available on the Dragonchain blog.
Hello Reddit and Ethereum community!
I’m Joe Roets, Founder & CEO of Dragonchain. When the team and I first heard about The Great Reddit Scaling Bake-Off we were intrigued. We believe we have the solutions Reddit seeks for its community points system and we have them at scale. For your consideration, we have submitted our proposal below. The team at Dragonchain and I welcome and look forward to your technical questions, philosophical feedback, and fair criticism, to build a scaling solution for Reddit that will empower its users. Because our architecture is unlike other blockchain platforms out there today, we expect to receive many questions while people try to grasp our project. I will answer all questions here in this thread on Reddit, and I've answered some questions in the stream on YouTube. We have seen good discussions so far in the competition. We hope that Reddit’s scaling solution will emerge from The Great Reddit Scaling Bake-Off and that Reddit will have great success with the implementation.
Dragonchain is a robust open source hybrid blockchain platform that has proven to withstand the passing of time since our inception in 2014. We have continued to evolve to harness the scalability of private nodes, yet take full advantage of the security of public decentralized networks, like Ethereum. We have a live, operational, and fully functional Interchain network integrating Bitcoin, Ethereum, Ethereum Classic, and ~700 independent Dragonchain nodes. Every transaction is secured to Ethereum, Bitcoin, and Ethereum Classic. Transactions are immediately usable on chain, and the first decentralization is seen within 20 seconds on Dragon Net. Security increases further to public networks ETH, BTC, and ETC within 10 minutes to 2 hours. Smart contracts can be written in any executable language, offering full freedom to existing developers. We invite any developer to watch the demo, play with our SDK’s, review open source code, and to help us move forward. Dragonchain specializes in scalable loyalty & rewards solutions and has built a decentralized social network on chain, with very affordable transaction costs. This experience can be combined with the insights Reddit and the Ethereum community have gained in the past couple of months to roll out the solution at a rapid pace.
Response and PoC
In The Great Reddit Scaling Bake-Off post, Reddit has asked for a series of demonstrations, requirements, and other considerations. In this section, we will attempt to answer all of these requests.
A live proof of concept showing hundreds of thousands of transactions
On Jan 7, 2020, Dragonchain hosted a 24-hour live demonstration during which a quarter of a billion (250 million+) transactions executed fully on an operational network. Every single transaction on Dragonchain is decentralized immediately through 5 levels of Dragon Net, and then secured with combined proof on Bitcoin, Ethereum, Ethereum Classic, and Binance Chain, via Interchain. This means that every single transaction is secured by, and traceable to these networks. An attack on this system would require a simultaneous attack on all of the Interchained networks. 24 hours in 4 minutes (YouTube): 24 hours in 4 minutes The demonstration was of a single business system, and any user is able to scale this further, by running multiple systems simultaneously. Our goals for the event were to demonstrate a consistent capacity greater than that of Visa over an extended time period. Tooling to reproduce our demo is available here: https://github.com/dragonchain/spirit-bomb
Source code (for on & off-chain components as well tooling used for the PoC). The source code does not have to be shared publicly, but if Reddit decides to use a particular solution it will need to be shared with Reddit at some point.
Dragonchain’s architecture attacks the scalability issue from multiple angles. Dragonchain is a hybrid blockchain platform, wherein every transaction is protected on a business node to the requirements of that business or purpose. A business node may be held completely private or may be exposed or replicated to any level of exposure desired. Every node has its own blockchain and is independently scalable. Dragonchain established Context Based Verification as its consensus model. Every transaction is immediately usable on a trust basis, and in time is provable to an increasing level of decentralized consensus. A transaction will have a level of decentralization to independently owned and deployed Dragonchain nodes (~700 nodes) within seconds, and full decentralization to BTC and ETH within minutes or hours. Level 5 nodes (Interchain nodes) function to secure all transactions to public or otherwise external chains such as Bitcoin and Ethereum. These nodes scale the system by aggregating multiple blocks into a single Interchain transaction on a cadence. This timing is configurable based upon average fees for each respective chain. For detailed information about Dragonchain’s architecture, and Context Based Verification, please refer to the Dragonchain Architecture Document.
An interesting feature of Dragonchain’s network consensus is its economics and scarcity model. Since Dragon Net nodes (L2-L4) are independent staking nodes, deployment to cloud platforms would allow any of these nodes to scale to take on a large percentage of the verification work. This is great for scalability, but not good for the economy, because there is no scarcity, and pricing would develop a downward spiral and result in fewer verification nodes. For this reason, Dragonchain uses TIME as scarcity. TIME is calculated as the number of Dragons held, multiplied by the number of days held. TIME influences the user’s access to features within the Dragonchain ecosystem. It takes into account both the Dragon balance and length of time each Dragon is held. TIME is staked by users against every verification node and dictates how much of the transaction fees are awarded to each participating node for every block. TIME also dictates the transaction fee itself for the business node. TIME is staked against a business node to set a deterministic transaction fee level (see transaction fee table below in Cost section). This is very interesting in a discussion about scaling because it guarantees independence for business implementation. No matter how much traffic appears on the entire network, a business is guaranteed to not see an increased transaction fee rate.
Dragonchain uses Docker and Kubernetes to allow the use of best practices traditional system scaling. Dragonchain offers managed nodes with an easy to use web based console interface. The user may also deploy a Dragonchain node within their own datacenter or favorite cloud platform. Users have deployed Dragonchain nodes on-prem on Amazon AWS, Google Cloud, MS Azure, and other hosting platforms around the world. Any executable code, anything you can write, can be written into a smart contract. This flexibility is what allows us to say that developers with no blockchain experience can use any code language to access the benefits of blockchain. Customers have used NodeJS, Python, Java, and even BASH shell script to write smart contracts on Dragonchain. With Docker containers, we achieve better separation of concerns, faster deployment, higher reliability, and lower response times. We chose Kubernetes for its self-healing features, ability to run multiple services on one server, and its large and thriving development community. It is resilient, scalable, and automated. OpenFaaS allows us to package smart contracts as Docker images for easy deployment. Contract deployment time is now bounded only by the size of the Docker image being deployed but remains fast even for reasonably large images. We also take advantage of Docker’s flexibility and its ability to support any language that can run on x86 architecture. Any image, public or private, can be run as a smart contract using Dragonchain.
Flexibility in Scaling
Dragonchain’s architecture considers interoperability and integration as key features. From inception, we had a goal to increase adoption via integration with real business use cases and traditional systems. We envision the ability for Reddit, in the future, to be able to integrate alternate content storage platforms or other financial services along with the token.
LBRY - To allow users to deploy content natively to LBRY
MakerDAO to allow users to lend small amounts backed by their Reddit community points.
STORJ/SIA to allow decentralized on chain storage of portions of content. These integrations or any other are relatively easy to integrate on Dragonchain with an Interchain implementation.
Cost estimates (on-chain and off-chain) For the purpose of this proposal, we assume that all transactions are on chain (posts, replies, and votes).
On the Dragonchain network, transaction costs are deterministic/predictable. By staking TIME on the business node (as described above) Reddit can reduce transaction costs to as low as $0.0000025 per transaction. Dragonchain Fees Table
How to run it
Building on Dragonchain is simple and requires no blockchain experience. Spin up a business node (L1) in our managed environment (AWS), run it in your own cloud environment, or on-prem in your own datacenter. Clear documentation will walk you through the steps of spinning up your first Dragonchain Level 1 Business node. Getting started is easy...
Download Dragonchain’s dctl
Input three commands into a terminal
Build an image
More information can be found in our Get started documents.
Dragonchain is an open source hybrid platform. Through Dragon Net, each chain combines the power of a public blockchain (like Ethereum) with the privacy of a private blockchain. Dragonchain organizes its network into five separate levels. A Level 1, or business node, is a totally private blockchain only accessible through the use of public/private keypairs. All business logic, including smart contracts, can be executed on this node directly and added to the chain. After creating a block, the Level 1 business node broadcasts a version stripped of sensitive private data to Dragon Net. Three Level 2 Validating nodes validate the transaction based on guidelines determined from the business. A Level 3 Diversity node checks that the level 2 nodes are from a diverse array of locations. A Level 4 Notary node, hosted by a KYC partner, then signs the validation record received from the Level 3 node. The transaction hash is ledgered to the Level 5 public chain to take advantage of the hash power of massive public networks. Dragon Net can be thought of as a “blockchain of blockchains”, where every level is a complete private blockchain. Because an L1 can send to multiple nodes on a single level, proof of existence is distributed among many places in the network. Eventually, proof of existence reaches level 5 and is published on a public network.
Dragonchain is open source and even though the platform is easy enough for developers to code in any language they are comfortable with, we do not have so large a developer community as Ethereum. We would like to see the Ethereum developer community (and any other communities) become familiar with our SDK’s, our solutions, and our platform, to unlock the full potential of our Ethereum Interchain. Long ago we decided to prioritize both Bitcoin and Ethereum Interchains. We envision an ecosystem that encompasses different projects to give developers the ability to take full advantage of all the opportunities blockchain offers to create decentralized solutions not only for Reddit but for all of our current platforms and systems. We believe that together we will take the adoption of blockchain further. We currently have additional Interchain with Ethereum Classic. We look forward to Interchain with other blockchains in the future. We invite all blockchains projects who believe in decentralization and security to Interchain with Dragonchain.
While we only have 700 nodes compared to 8,000 Ethereum and 10,000 Bitcoin nodes. We harness those 18,000 nodes to scale to extremely high levels of security. See Dragonchain metrics.
Some may consider the centralization of Dragonchain’s business nodes as an issue at first glance, however, the model is by design to protect business data. We do not consider this a drawback as these nodes can make any, none, or all data public. Depending upon the implementation, every subreddit could have control of its own business node, for potential business and enterprise offerings, bringing new alternative revenue streams to Reddit.
Costs and resources
Summary of cost & resource information for both on-chain & off-chain components used in the PoC, as well as cost & resource estimates for further scaling. If your PoC is not on mainnet, make note of any mainnet caveats (such as congestion issues).
Every transaction on the PoC system had a transaction fee of $0.0001 (one-hundredth of a cent USD). At 256MM transactions, the demo cost $25,600. With current operational fees, the same demonstration would cost $640 USD. For the demonstration, to achieve throughput to mimic a worldwide payments network, we modeled several clients in AWS and 4-5 business nodes to handle the traffic. The business nodes were tuned to handle higher throughput by adjusting memory and machine footprint on AWS. This flexibility is valuable to implementing a system such as envisioned by Reddit. Given that Reddit’s daily traffic (posts, replies, and votes) is less than half that of our demo, we would expect that the entire Reddit system could be handled on 2-5 business nodes using right-sized containers on AWS or similar environments. Verification was accomplished on the operational Dragon Net network with over 700 independently owned verification nodes running around the world at no cost to the business other than paid transaction fees.
This PoC should scale to the numbers below with minimal costs (both on & off-chain). There should also be a clear path to supporting hundreds of millions of users. Over a 5 day period, your scaling PoC should be able to handle: *100,000 point claims (minting & distributing points) *25,000 subscriptions *75,000 one-off points burning *100,000 transfers
During Dragonchain’s 24 hour demo, the above required numbers were reached within the first few minutes. Reddit’s total activity is 9000% more than Ethereum’s total transaction level. Even if you do not include votes, it is still 700% more than Ethereum’s current volume. Dragonchain has demonstrated that it can handle 250 million transactions a day, and it’s architecture allows for multiple systems to work at that level simultaneously. In our PoC, we demonstrate double the full capacity of Reddit, and every transaction was proven all the way to Bitcoin and Ethereum. Reddit Scaling on Ethereum
Solutions should not depend on any single third-party provider. We prefer solutions that do not depend on specific entities such as Reddit or another provider, and solutions with no single point of control or failure in off-chain components but recognize there are numerous trade-offs to consider
Dragonchain’s architecture calls for a hybrid approach. Private business nodes hold the sensitive data while the validation and verification of transactions for the business are decentralized within seconds and secured to public blockchains within 10 minutes to 2 hours. Nodes could potentially be controlled by owners of individual subreddits for more organic decentralization.
Billing is currently centralized - there is a path to federation and decentralization of a scaled billing solution.
Operational on-premises capabilities
Operational deployment to any datacenter
Over 700 independent Community Verification Nodes with proof of ownership
Operational Interchain (Interoperable to Bitcoin, Ethereum, and Ethereum Classic, open to more)
Usability Scaling solutions should have a simple end user experience.
Users shouldn't have to maintain any extra state/proofs, regularly monitor activity, keep track of extra keys, or sign anything other than their normal transactions
Dragonchain and its customers have demonstrated extraordinary usability as a feature in many applications, where users do not need to know that the system is backed by a live blockchain. Lyceum is one of these examples, where the progress of academy courses is being tracked, and successful completion of courses is rewarded with certificates on chain. Our @Save_The_Tweet bot is popular on Twitter. When used with one of the following hashtags - #please, #blockchain, #ThankYou, or #eternalize the tweet is saved through Eternal to multiple blockchains. A proof report is available for future reference. Other examples in use are DEN, our decentralized social media platform, and our console, where users can track their node rewards, view their TIME, and operate a business node. Examples:
Transactions complete in a reasonable amount of time (seconds or minutes, not hours or days)
All transactions are immediately usable on chain by the system. A transaction begins the path to decentralization at the conclusion of a 5-second block when it gets distributed across 5 separate community run nodes. Full decentralization occurs within 10 minutes to 2 hours depending on which interchain (Bitcoin, Ethereum, or Ethereum Classic) the transaction hits first. Within approximately 2 hours, the combined hash power of all interchained blockchains secures the transaction.
Free to use for end users (no gas fees, or fixed/minimal fees that Reddit can pay on their behalf)
With transaction pricing as low as $0.0000025 per transaction, it may be considered reasonable for Reddit to cover transaction fees for users. All of Reddit's Transactions on Blockchain (month) Community points can be earned by users and distributed directly to their Reddit account in batch (as per Reddit minting plan), and allow users to withdraw rewards to their Ethereum wallet whenever they wish. Withdrawal fees can be paid by either user or Reddit. This model has been operating inside the Dragonchain system since 2018, and many security and financial compliance features can be optionally added. We feel that this capability greatly enhances user experience because it is seamless to a regular user without cryptocurrency experience, yet flexible to a tech savvy user. With regard to currency or token transactions, these would occur on the Reddit network, verified to BTC and ETH. These transactions would incur the $0.0000025 transaction fee. To estimate this fee we use the monthly active Reddit users statista with a 60% adoption rate and an estimated 10 transactions per month average resulting in an approximate $720 cost across the system. Reddit could feasibly incur all associated internal network charges (mining/minting, transfer, burn) as these are very low and controllable fees. Reddit Internal Token Transaction Fees Reddit Ethereum Token Transaction Fees When we consider further the Ethereum fees that might be incurred, we have a few choices for a solution.
Offload all Ethereum transaction fees (user withdrawals) to interested users as they wish to withdraw tokens for external use or sale.
Cover Ethereum transaction fees by aggregating them on a timed schedule. Users would request withdrawal (from Reddit or individual subreddits), and they would be transacted on the Ethereum network every hour (or some other schedule).
In a combination of the above, customers could cover aggregated fees.
Integrate with alternate Ethereum roll up solutions or other proposals to aggregate minting and distribution transactions onto Ethereum.
Users should be able to view their balances & transactions via a blockchain explorer-style interface
From interfaces for users who have no knowledge of blockchain technology to users who are well versed in blockchain terms such as those present in a typical block explorer, a system powered by Dragonchain has flexibility on how to provide balances and transaction data to users. Transactions can be made viewable in an Eternal Proof Report, which displays raw data along with TIME staking information and traceability all the way to Bitcoin, Ethereum, and every other Interchained network. The report shows fields such as transaction ID, timestamp, block ID, multiple verifications, and Interchain proof. See example here. Node payouts within the Dragonchain console are listed in chronological order and can be further seen in either Dragons or USD. See example here. In our social media platform, Dragon Den, users can see, in real-time, their NRG and MTR balances. See example here. A new influencer app powered by Dragonchain, Raiinmaker, breaks down data into a user friendly interface that shows coin portfolio, redeemed rewards, and social scores per campaign. See example here.
Exiting is fast & simple
Withdrawing funds on Dragonchain’s console requires three clicks, however, withdrawal scenarios with more enhanced security features per Reddit’s discretion are obtainable.
Interoperability Compatibility with third party apps (wallets/contracts/etc) is necessary.
Proven interoperability at scale that surpasses the required specifications. Our entire platform consists of interoperable blockchains connected to each other and traditional systems. APIs are well documented. Third party permissions are possible with a simple smart contract without the end user being aware. No need to learn any specialized proprietary language. Any code base (not subsets) is usable within a Docker container. Interoperable with any blockchain or traditional APIs. We’ve witnessed relatively complex systems built by engineers with no blockchain or cryptocurrency experience. We’ve also demonstrated the creation of smart contracts within minutes built with BASH shell and Node.js. Please see our source code and API documentation.
Scaling solutions should be extensible and allow third parties to build on top of it Open source and extensible APIs should be well documented and stable
Third-party permissionless integrations should be possible & straightforward Smart contracts are Docker based, can be written in any language, use full language (not subsets), and can therefore be integrated with any system including traditional system APIs. Simple is better. Learning an uncommon or proprietary language should not be necessary.
Advanced knowledge of mathematics, cryptography, or L2 scaling should not be required. Compatibility with common utilities & toolchains is expected. Dragonchain business nodes and smart contracts leverage Docker to allow the use of literally any language or executable code. No proprietary language is necessary. We’ve witnessed relatively complex systems built by engineers with no blockchain or cryptocurrency experience. We’ve also demonstrated the creation of smart contracts within minutes built with BASH shell and Node.js.
Bonus Points: Show us how it works. Do you have an idea for a cool new use case for Community Points? Build it!
Community points could be awarded to Reddit users based upon TIME too, whereas the longer someone is part of a subreddit, the more community points someone naturally gained, even if not actively commenting or sharing new posts. A daily login could be required for these community points to be credited. This grants awards to readers too and incentivizes readers to create an account on Reddit if they browse the website often. This concept could also be leveraged to provide some level of reputation based upon duration and consistency of contribution to a community subreddit.
Dragonchain has already built a social media platform that harnesses community involvement. Dragon Den is a decentralized community built on the Dragonchain blockchain platform. Dragon Den is Dragonchain’s answer to fake news, trolling, and censorship. It incentivizes the creation and evaluation of quality content within communities. It could be described as being a shareholder of a subreddit or Reddit in its entirety. The more your subreddit is thriving, the more rewarding it will be. Den is currently in a public beta and in active development, though the real token economy is not live yet. There are different tokens for various purposes. Two tokens are Lair Ownership Rights (LOR) and Lair Ownership Tokens (LOT). LOT is a non-fungible token for ownership of a specific Lair. LOT will only be created and converted from LOR. Energy (NRG) and Matter (MTR) work jointly. Your MTR determines how much NRG you receive in a 24-hour period. Providing quality content, or evaluating content will earn MTR.
Security. Users have full ownership & control of their points.
All community points awarded based upon any type of activity or gift, are secured and provable to all Interchain networks (currently BTC, ETH, ETC). Users are free to spend and withdraw their points as they please, depending on the features Reddit wants to bring into production.
Balances and transactions cannot be forged, manipulated, or blocked by Reddit or anyone else
Users can withdraw their balance to their ERC20 wallet, directly through Reddit. Reddit can cover the fees on their behalf, or the user covers this with a portion of their balance.
Users should own their points and be able to get on-chain ERC20 tokens without permission from anyone else
Through our console users can withdraw their ERC20 rewards. This can be achieved on Reddit too. Here is a walkthrough of our console, though this does not show the quick withdrawal functionality, a user can withdraw at any time. https://www.youtube.com/watch?v=aNlTMxnfVHw
Points should be recoverable to on-chain ERC20 tokens even if all third-parties involved go offline
If necessary, signed transactions from the Reddit system (e.g. Reddit + Subreddit) can be sent to the Ethereum smart contract for minting.
A public, third-party review attesting to the soundness of the design should be available
To our knowledge, at least two large corporations, including a top 3 accounting firm, have conducted positive reviews. These reviews have never been made public, as Dragonchain did not pay or contract for these studies to be released.
Bonus points Public, third-party implementation review available or in progress
Compatibility with HSMs & hardware wallets
For the purpose of this proposal, all tokenization would be on the Ethereum network using standard token contracts and as such, would be able to leverage all hardware wallet and Ethereum ecosystem services.
Minting/distributing tokens is not performed by Reddit directly
This operation can be automated by smart contract on Ethereum. Subreddits can if desired have a role to play.
One off point burning, as well as recurring, non-interactive point burning (for subreddit memberships) should be possible and scalable
This is possible and scalable with interaction between Dragonchain Reddit system and Ethereum token contract(s).
Fully open-source solutions are strongly preferred
Dragonchain is fully open source (see section on Disney release after conclusion).
Whether it is today, or in the future, we would like to work together to bring secure flexibility to the highest standards. It is our hope to be considered by Ethereum, Reddit, and other integrative solutions so we may further discuss the possibilities of implementation. In our public demonstration, 256 million transactions were handled in our operational network on chain in 24 hours, for the low cost of $25K, which if run today would cost $625. Dragonchain’s interoperable foundation provides the atmosphere necessary to implement a frictionless community points system. Thank you for your consideration of our proposal. We look forward to working with the community to make something great!
Disney Releases Blockchain Platform as Open Source
The team at Disney created the Disney Private Blockchain Platform. The system was a hybrid interoperable blockchain platform for ledgering and smart contract development geared toward solving problems with blockchain adoption and usability. All objective evaluation would consider the team’s output a success. We released a list of use cases that we explored in some capacity at Disney, and our input on blockchain standardization as part of our participation in the W3C Blockchain Community Group. https://lists.w3.org/Archives/Public/public-blockchain/2016May/0052.html
In 2016, Roets proposed to release the platform as open source to spread the technology outside of Disney, as others within the W3C group were interested in the solutions that had been created inside of Disney. Following a long process, step by step, the team met requirements for release. Among the requirements, the team had to:
Obtain VP support and approval for the release
Verify ownership of the software to be released
Verify that no proprietary content would be released
Convince the organization that there was a value to the open source community
Convince the organization that there was a value to Disney
Offer the plan for ongoing maintenance of the project outside of Disney
Itemize competing projects
Verify no conflict of interest
Change the project name to not use the name Disney, any Disney character, or any other associated IP - proposed Dragonchain - approved
Obtain legal approval
Approval from corporate, parks, and other business units
Approval from multiple Disney patent groups Copyright holder defined by Disney (Disney Connected and Advanced Technologies)
Trademark searches conducted for the selected name Dragonchain
Obtain IT security approval
Manual review of OSS components conducted
OWASP Dependency and Vulnerability Check Conducted
Obtain technical (software) approval
Offer management, process, and financial plans for the maintenance of the project.
Meet list of items to be addressed before release
Remove all Disney project references and scripts
Create a public distribution list for email communications
Remove Roets’ direct and internal contact information
Create public Slack channel and move from Disney slack channels
Create proper labels for issue tracking
Rename internal private Github repository
Add informative description to Github page
Expand README.md with more specific information
Add information beyond current “Blockchains are Magic”
Add getting started sections and info on cloning/forking the project
Add installation details
Add uninstall process
Add unit, functional, and integration test information
Detail how to contribute and get involved
Describe the git workflow that the project will use
Move to public, non-Disney git repository (Github or Bitbucket)
Obtain Disney Open Source Committee approval for release
On top of meeting the above criteria, as part of the process, the maintainer of the project had to receive the codebase on their own personal email and create accounts for maintenance (e.g. Github) with non-Disney accounts. Given the fact that the project spanned multiple business units, Roets was individually responsible for its ongoing maintenance. Because of this, he proposed in the open source application to create a non-profit organization to hold the IP and maintain the project. This was approved by Disney. The Disney Open Source Committee approved the application known as OSSRELEASE-10, and the code was released on October 2, 2016. Disney decided to not issue a press release. Original OSSRELASE-10 document
Hi Monero community! Two months ago I posted a CCS for continuing my research on Monero Atomic Swaps. That research is now complete and I'm happy to present my results. This post will be a summary of my research, but you can also find the whitepaper that describes the full protocol and all the details here.
Shiny BTC/XMR Atomic Swap Protocol!
We found it! With the help of the MRL, my colleagues, and the community, we created the first (to our knowledge) protocol to atomically swap bitcoin and monero. And this resulting protocol is implementable today - no more obscure crypto!
Why now? What changed?
When I started studying Monero for a Bitcoin/Monero atomic swap three and a half years ago, most of the swap protocols where based on 'Hash Time Locked Contract' (HTLC), something that we all know as non-existent on Monero. So the goal at the beginning of the project was to create an atomic swap where all the logic (timeouts, possible sequences of operation, secret disclosures, etc) is managed on the other chain: the Bitcoin chain. The second difficulty with Monero and Bitcoin is their respective underlying cryptographic parameters: they don't share the same elliptic curve, they don't share the same signing algorithm; they have nothing in common! This makes the pair a bad candidate for other types of atomic swap that don't (solely) rely on HTLC. In November 2018 we came up with a draft protocol that respects the above constraints. Thus, the protocol requires a specific type of zero-knowledge proof to be trustless: a hash pre-image zero-knowledge proof. This type of zkp is not wildly used in practice, if at all. Thus the protocol works in theory, but with some obscure crypto, making the protocol a bad candidate for an implementation. In early 2020, after presenting the draft protocol at 36C3 in December 2019, I discovered, by reference from Sarang Noether (MRL), Andrew Poelstra's idea of doing a discrete logarithm equality across group zero-knowledge proof of knowledge (MRL-0010), meaning that we can prove some relations between elements in two different groups (two curves to simplify) and the paper by LLoyd Fournier on One-Time Verifiably Encrypted Signatures allowing secret disclosure with ECDSA. With these two new (to me) cryptographic primitives, we were able to replace the previous zero-knowledge proof with a combination of the latter, making the protocol complete and practically feasible.
How it works
As a broad overview (and simplified) the protocol work as follow:
The monero are locked in an address generated by both participants
At the beginning, neither of the participants have the full control over the address; they both have half of the private key only
With the cross group discrete logarithm equality zkp, both participants prove to each other that the address on the Bitcoin chain is related to the address on the Monero chain
By means of Bitcoin scripts and ECDSA one-time verifiably encrypted signatures, one participant reveals to the other her partial private key by taking the bitcoin, allowing the other to take control over the monero
If the swap succeeds, A reveals to B, and if the swap is cancelled, B reveals to A. (We have a third scenario explained in the paper to force reaction and avoid deadlock.)
The obvious next step would be to have a working implementation on mainnet, but a ready-to-use implementation that is also robust and safe-to-use requires a lot of engineering work. Furthermore, even though the cryptography is not too obscure, most of it still also lacks an implementation. I'll post soon, if the community wants it, a CCS proposal to get my team and I to work on implementing this protocol, step by step, with the end goal of creating a working client/daemon for swapping Bitcoin and Monero. It would be very exciting to build that!
Thanks to the MRL and its researchers for their help, the CCS team, and the community for its support! I hope I fulfilled the community's expectations for my my first CCS - all feedback is appreciated.
TL;DR: Wakey wakey, give a crap about freedom, or accept the consequences. Another Sunday afternoon, another news item about Monero being delisted from a centralized exchange, this time in Australia. Last year it was OKEx and others. Just a few days ago it was Coinspot. It is sort of an open secret that Coinbase is not listing Monero due to external pressures. Today we're hit with news that Kraken will be ceasing Monero trading for AU residents. And you will also recall that Japan and South Korea have made similar moves. It's a near impossibility with me, especially when powered by caffeine, which is most definitely the case today, but I will try to make this brief, sweet and to the point. These are not isolated incidents. There is an International Organization™ in particular orchestrating, behind the scenes, the policies and requirements that financial institutions (crypto exchanges have since joined that category for this purpose) must follow, or else. Here is what bothers me about this. Have you been consulted about this? Anyone you know? Heard of it in the news? Yeah, me neither. You have to know where to look to find some information on what they would like to see happening (we'll get to that in a moment), and often you have to read PDFs with dozens of pages to find the good stuff too. I will leave that as an exercise to the reader. Suffice to say, I have been digging a bit deeper myself, and what I found shocked me. FATF wants nothing less than the complete elimination of anonymity and privacy in financial affairs, even going so far as to consider BANNING peer to peer transactions so that people are forced to interact with each other through exchanges, where data collection is more reliable and certain, effectively obliterating one of the major selling points of cryptocurrency (p2p-ness) with complete disregard for the millions of people who are already onboard with the vision. No privacy and no anonymity, imagine that. Many of you probably already use plastic cards for everything, day in day out, and don't think too much about this stuff. But the fact that an international organization that you have little to zero democratic control over is planning to get rid of class of financial tools that 99.99999% of people don't even realize exists yet should give you pause for concern. The tools I speak of are, of course, digital cash-like cryptocurrencies like Monero. I would like you to PAUSE, daydream a bit, visualize and imagine, what a world without zero financial privacy/anonymity would look like. Consider, this has certainly not been the case in human history, ever -- yes, even today. Today most of you still have cash as a choice. But what happens when that goes out of the window, and the only options are CBDCs, CorporateCoins, and transparent cryptocurrency ? Needless to say, both in the case of CorporateCoins and CBDCs, there will be little to none privacy/anonymity, and even if there was (in the case of CorporateCoin), the state would obviously bully its way into it and force them to do otherwise (without being asked to do so, of course). So, imagine that world. Every donation you make. Every $50 transfer to a friend or family member. Every item you buy. Every service you purchase. Every money you send to help a friend you. All of it stored, forever, to be accessed later at will for whatever reasons. Would you make the same choices, knowing that your entire financial life is entirely exposed to powerful organizations of which you likely know very little about and almost certainly can hardly ever influence at all? Does that seem like a good recipe for a free society?
The people at the top either don't care about the consequences of what they're imposing worldwide, or they don't understand. Sounds highly concerning to me either way - It comes down to either bullying or ignorance. Would you ever have truly heart-to-heart conversations if you knew your worst enemy was potentially watching and recording everything? Could you make passionate love knowing hundreds of strangers are analyzing your every move? Can you be spontaneous knowing you are being recorded? What if you did not have a choice in those matters ?! What if someone has already decided for you, your friends, your family, your neighbors, your country, that you are all potential criminals and the thing to do is to keep records on everyone, just in case ? Newsflash: It already happened. It's been happening for awhile, and it seems to be picking up pace; the technology that was going to liberate us, slowly enslaving us instead -- because the general public largely does not understand the issues at hand, while the elite certainly does, and boy oh boy, are they thrilled with the technological advancements that help them cement their power. What do I mean by cement? Imagine trying to kick-start civil rights in a place where every social map is known, everything a person is interested in is known, every transaction they make is known, every website they have visited is known, every time they step on the street, an AI-powered camera automatically identifies them and tracks their movement. You would be unable to organize. To exchange value. To discuss behind curtains, so to speak. You would not have any privacy, and you would not have any anonymity. Could you be free under these circumstances?
It's been a long road towards more freedom, but nowdays it is disappearing fast. Stopping to consider the implications is a most pressing issue. They want Monero(-like tools) GONE because Monero ACTUALLY would change the paradigm. By the time they are done with their "recommendations" (which really mean: comply, or else...), mark my words, there will be a name behind every Bitcoin address in some centralized database, query-able by partners in deciding who can and cannot use the system. Merchants will be forced to perform chain analysis and by law they will be compelled to reject/refund/report transactions coming from "anonymous clusters" (addresses that are not known to have an identity tied to them). This is what the normalization of the lack of privacy has brought us. The possibility was there, and they took it. Of course they did. I repeat, it is no accident that it's not Dogecoin and Nano, Bitcoin or Litecoin being delisted. The star of the show (for better or for worse) is Monero, and that is because it works. It lets you transact anonymously and privately, like cash - why the hell should FATF know that you sent $500 to your mother last week? in fact, why the hell should they know your entire financial history?! When cash goes (and we can be fairly certain that it will be gone; would already be gone if this sort of authoritarian mindset had its way), Monero or tools like Monero, will become the only way to make any transaction outside the eyes of the state. It's not because you have anything (nefarious) to hide. It's not because you're a criminal. Rather, it's because to accept anything else is to bow to tyranny. It's your choice to make - are you meekly going to accept that in perhaps less than a decade there will be zero privacy and anonymity in financial matters, or are you going to fight back? Will you organize, campaign, email, discuss, spread awareness? Will you spend precious summer Sunday afternoons writing for strangers on the Internet trying to help a few more see the major shit-show we're headed into? Or will you be a good boy and do what you're told? Tomorrow, by the way - if left unchallenged - it won't just be financial privacy that disappears. One of the most prominent examples in the introductory part of this post (Australia) has already made quite clear that they don't like the fact that people can hide things from them (encryption). In other words, either they know about it (and archive it forever), or you better let them know. After all, a threat - any threat! - could be lurking somewhere in that encrypted data. And you have nothing to hide anyway, yes? This is a cryptocurrency sub though so let's not steer too far from that. It is important to remember that ultimately the issue is the same though - totalitarian control over everyone's life; mass-surveillance, and the ability to rewind and see someone's entire life exposed for the benefit of the state. Their actions are letting you know what really works and what really threatens the status quo. That is useful information. If you care at all about the freedom and privacy of your future self, your friends and family, children present or future, I think you would do well to think long and hard about these issues. Because the direction assumed by the most prominent regulators seems to be headed in a uniform direction - that is no surprise, seeing as how they meet with each other. You have to ask yourself though, is this for your benefit, your safety? Or is it to keep the statuo quo? How would the world be different if human beings - regardless of color, nationality, age, sexual orientation, political beliefs- with an Internet connection could freely exchange value privately and anonymously (the way we can still communicate private and anonymously in most places today - though not so in authoritarian places like China, AND THAT IS NOT A COINCIDENCE)? It would be instant, like an instant message. It would cost very little. Well, I have news for you: It's already possible, and a growing number of people are realizing this. This tool is called Monero. It exists today, and the cat is out of the bag. The technology will only get better, and more interesting tools may even come along later. In fact, barring mass persecution of open-source developers, that is very likely what is going to happen, as ultrasmart people everywhere congregate in virtual spaces to discuss better ways to do stuff. If we keep losing our right to be left alone until suspected of a crime, life will increasingly come to resemble what the regulator types are - consciously or unconsciously - creating: a Panopticon society. If you don't speak up, then the decision has already been made - and you're probably going to live to regret being complicit in it. Freedom or Tyranny. It's your choice to make. p.s: Yes, totally failed at making this short. I guess it's just not my thing.
Taproot! Everybody wants to have it, somebody wants to make it, nobody knows how to get it! (If you are asking why everybody wants it, see: Technical: Taproot: Why Activate?) (Pedants: I mostly elide over lockin times) Briefly, Taproot is that neat new thing that gets us:
Multisignatures (n-of-n, k-of-n) that are just 1 signature (1-of-1) in length!! (MuSig/Schnorr)
Better privacy!! If all contract participants can agree, just use a multisignature. If there is a dispute, show the contract publicly and have the Bitcoin network resolve it (Taproot/MAST).
Activation lets devs work get back to work on the even newer stuff like!!!
Cross-input signature aggregation!! (transaction with multiple inputs can have a single signature for all inputs) --- needs Schnorr, but some more work needed to ensure that the interactions with SCRIPT are okay.
Block validation - Schnorr signatures for all taproot spends in a block can be validated in a single operation instead of for each transaction!! Speed up validation and maybe we can actually afford to increase block sizes (maybe)!!
SIGHASH_ANYPREVOUT - you know, for Decker-Russell-Osuntokun ("eltoo") magic!!!
OP_CHECKTEMPLATEVERIFY - vaulty vaults without requiring storing signatures, just transaction details!!
So yes, let's activate taproot!
The SegWit Wars
The biggest problem with activating Taproot is PTSD from the previous softfork, SegWit. Pieter Wuille, one of the authors of the current Taproot proposal, has consistently held the position that he will not discuss activation, and will accept whatever activation process is imposed on Taproot. Other developers have expressed similar opinions. So what happened with SegWit activation that was so traumatic? SegWit used the BIP9 activation method. Let's dive into BIP9!
bit - A field in the block header, the nVersion, has a number of bits. By setting a particular bit, the miner making the block indicates that it has upgraded its software to support a particular soft fork. The bit parameter for a BIP9 activation is which bit in this nVersion is used to indicate that the miner has upgraded software for a particular soft fork.
timeout - a time limit, expressed as an end date. If this timeout is reached without sufficient number of miners signaling that they upgraded, then the activation fails and Bitcoin Core goes back to the drawing board.
Now there are other parameters (name, starttime) but they are not anywhere near as important as the above two. A number that is not a parameter, is 95%. Basically, activation of a BIP9 softfork is considered as actually succeeding if at least 95% of blocks in the last 2 weeks had the specified bit in the nVersion set. If less than 95% had this bit set before the timeout, then the upgrade fails and never goes into the network. This is not a parameter: it is a constant defined by BIP9, and developers using BIP9 activation cannot change this. So, first some simple questions and their answers:
Why not just set a day when everyone starts imposing the new rules of the softfork?
This was done classically (in the days when Satoshi was still among us). But this might argued to put too much power to developers, since there would be no way to reject an upgrade without possible bad consequences. For example, developers might package an upgrade that the users do not want, together with vital security bugfixes. Either you live without vital security bugfixes and hire some other developers to fix it for you (which can be difficult, presumably the best developers are already the ones working on the codebase) or you get the vital security bugfixes and implicitly support the upgrade you might not want.
Sure, you could fork the code yourself (the ultimate threat in the FOSS world) and hire another set of developers who aren't assholes to do the dreary maintenance work of fixing security bugs, but Bitcoin needs strong bug-for-bug compatibility so everyone should really congregate around a single codebase.
Basically: even the devs do not want this power, because they fear being coerced into putting "upgrades" that are detrimental to users. Satoshi got a pass because nobody knew who he was and how to coerce him.
Suppose the threshold were lower, like 51%. If so, after activation, somebody can disrupt the Bitcoin network by creating a transaction that is valid under the pre-softfork rules, but are invalid under the post-softfork rules. Upgraded nodes would reject it, but 49% of miners would accept it and include it in a block (which makes the block invalid) And then the same 49% would accept the invalid block and build on top of that, possibly creating a short chain of doomed invalid blocks that confirm an invalid spend. This can confuse SPV wallets, who might see multiple confirmations of a transaction and accept the funds, but later find that in fact it is invalid under the now-activated softfork rules.
Thus, a very high threshold was imposed. 95% is considered safe. 50% is definitely not safe. Due to variance in the mining process, 80% could also be potentially unsafe (i.e. 80% of blocks signaling might have a good chance of coming from only 60% of miners), so a threshold of 95% was considered "safe enough for Bitcoin work".
Why have a timeout that disables the upgrade?
Before BIP9, what was used was either flag day or BIP34. BIP34 had no flag day of activation or a bit, instead, it was just a 95% threshold to signal an nVersion value greater than a specific value. Actually, it was two thresholds: at 75%, blocks with the new nVersion would have the new softfork rules imposed, but at 95% blocks with the old nVersion would be rejected (and only the new blocks, with the new softfork rules, were accepted). For one, between 75% and 95%, there was a situation where the softfork was only "partially imposed", only blocks signaling the new rules would actually have those rules, but blocks with the old rules were still valid. This was fine for BIP34, which only added rules for miners with negligible use for non-miners.
The reasons miners signalled support was because they felt they were being pressured to signal support. So they signalled support, with plans to actually upgrade later, but because of the widespread signalling, the new BIP66 version locked in before upgrade plans were finished. Thus, the timeout that disables the upgrade was added in BIP9 to allow miners an escape hatch.
The Great Battles of the SegWit Wars
SegWit not only fixed transaction malleability, it also created a practical softforkable blocksize increase that also rebalanced weights so that the cost of spending a UTXO is about the same as the cost of creating UTXOs (and spending UTXOs is "better" since it limits the size of the UTXO set that every fullnode has to maintain). So SegWit was written, the activation was decided to be BIP9, and then.... miner signalling stalled at below 75%. Thus were the Great SegWit Wars started.
BIP9 Feature Hostage
If you are a miner with at least 5% global hashpower, you can hold a BIP9-activated softfork hostage. You might even secretly want the softfork to actually push through. But you might want to extract concession from the users and the developers. Like removing the halvening. Or raising or even removing the block size caps (which helps larger miners more than smaller miners, making it easier to become a bigger fish that eats all the smaller fishes). Or whatever. With BIP9, you can hold the softfork hostage. You just hold out and refuse to signal. You tell everyone you will signal, if and only if certain concessions are given to you. This ability by miners to hold a feature hostage was enabled because of the miner-exit allowed by the timeout on BIP9. Prior to that, miners were considered little more than expendable security guards, paid for the risk they take to secure the network, but not special in the grand scheme of Bitcoin.
ASICBoost was a novel way of optimizing SHA256 mining, by taking advantage of the structure of the 80-byte header that is hashed in order to perform proof-of-work. The details of ASICBoost are out-of-scope here but you can read about it elsewhere Here is a short summary of the two types of ASICBoost, relevant to the activation discussion.
Overt ASICBoost - Manipulates the unused bits in nVersion to reduce power consumption in mining.
Covert ASICBoost - Manipulates the order of transactions in the block to reduce power consumption in mining.
Now, "overt" means "obvious", while "covert" means hidden. Overt ASICBoost is obvious because nVersion bits that are not currently in use for BIP9 activations are usually 0 by default, so setting those bits to 1 makes it obvious that you are doing something weird (namely, Overt ASICBoost). Covert ASICBoost is non-obvious because the order of transactions in a block are up to the miner anyway, so the miner rearranging the transactions in order to get lower power consumption is not going to be detected. Unfortunately, while Overt ASICBoost was compatible with SegWit, Covert ASICBoost was not. This is because, pre-SegWit, only the block header Merkle tree committed to the transaction ordering. However, with SegWit, another Merkle tree exists, which commits to transaction ordering as well. Covert ASICBoost would require more computation to manipulate two Merkle trees, obviating the power benefits of Covert ASICBoost anyway. Now, miners want to use ASICBoost (indeed, about 60->70% of current miners probably use the Overt ASICBoost nowadays; if you have a Bitcoin fullnode running you will see the logs with lots of "60 of last 100 blocks had unexpected versions" which is exactly what you would see with the nVersion manipulation that Overt ASICBoost does). But remember: ASICBoost was, at around the time, a novel improvement. Not all miners had ASICBoost hardware. Those who did, did not want it known that they had ASICBoost hardware, and wanted to do Covert ASICBoost! But Covert ASICBoost is incompatible with SegWit, because SegWit actually has two Merkle trees of transaction data, and Covert ASICBoost works by fudging around with transaction ordering in a block, and recomputing two Merkle Trees is more expensive than recomputing just one (and loses the ASICBoost advantage). Of course, those miners that wanted Covert ASICBoost did not want to openly admit that they had ASICBoost hardware, they wanted to keep their advantage secret because miners are strongly competitive in a very tight market. And doing ASICBoost Covertly was just the ticket, but they could not work post-SegWit. Fortunately, due to the BIP9 activation process, they could hold SegWit hostage while covertly taking advantage of Covert ASICBoost!
UASF: BIP148 and BIP8
When the incompatibility between Covert ASICBoost and SegWit was realized, still, activation of SegWit stalled, and miners were still not openly claiming that ASICBoost was related to non-activation of SegWit. Eventually, a new proposal was created: BIP148. With this rule, 3 months before the end of the SegWit timeout, nodes would reject blocks that did not signal SegWit. Thus, 3 months before SegWit timeout, BIP148 would force activation of SegWit. This proposal was not accepted by Bitcoin Core, due to the shortening of the timeout (it effectively times out 3 months before the initial SegWit timeout). Instead, a fork of Bitcoin Core was created which added the patch to comply with BIP148. This was claimed as a User Activated Soft Fork, UASF, since users could freely download the alternate fork rather than sticking with the developers of Bitcoin Core. Now, BIP148 effectively is just a BIP9 activation, except at its (earlier) timeout, the new rules would be activated anyway (instead of the BIP9-mandated behavior that the upgrade is cancelled at the end of the timeout). BIP148 was actually inspired by the BIP8 proposal (the link here is a historical version; BIP8 has been updated recently, precisely in preparation for Taproot activation). BIP8 is basically BIP9, but at the end of timeout, the softfork is activated anyway rather than cancelled. This removed the ability of miners to hold the softfork hostage. At best, they can delay the activation, but not stop it entirely by holding out as in BIP9. Of course, this implies risk that not all miners have upgraded before activation, leading to possible losses for SPV users, as well as again re-pressuring miners to signal activation, possibly without the miners actually upgrading their software to properly impose the new softfork rules.
BIP91, SegWit2X, and The Aftermath
BIP148 inspired countermeasures, possibly from the Covert ASiCBoost miners, possibly from concerned users who wanted to offer concessions to miners. To this day, the common name for BIP148 - UASF - remains an emotionally-charged rallying cry for parts of the Bitcoin community. One of these was SegWit2X. This was brokered in a deal between some Bitcoin personalities at a conference in New York, and thus part of the so-called "New York Agreement" or NYA, another emotionally-charged acronym. The text of the NYA was basically:
Set up a new activation threshold at 80% signalled at bit 4 (vs bit 1 for SegWit).
When this 80% signalling was reached, miners would require that bit 1 for SegWit be signalled to achive the 95% activation needed for SegWit.
If the bit 4 signalling reached 80%, increase the block weight limit from the SegWit 4000000 to the SegWit2X 8000000, 6 months after bit 1 activation.
The first item above was coded in BIP91. Unfortunately, if you read the BIP91, independently of NYA, you might come to the conclusion that BIP91 was only about lowering the threshold to 80%. In particular, BIP91 never mentions anything about the second point above, it never mentions that bit 4 80% threshold would also signal for a later hardfork increase in weight limit. Because of this, even though there are claims that NYA (SegWit2X) reached 80% dominance, a close reading of BIP91 shows that the 80% dominance was only for SegWit activation, without necessarily a later 2x capacity hardfork (SegWit2X). This ambiguity of bit 4 (NYA says it includes a 2x capacity hardfork, BIP91 says it does not) has continued to be a thorn in blocksize debates later. Economically speaking, Bitcoin futures between SegWit and SegWit2X showed strong economic dominance in favor of SegWit (SegWit2X futures were traded at a fraction in value of SegWit futures: I personally made a tidy but small amount of money betting against SegWit2X in the futures market), so suggesting that NYA achieved 80% dominance even in mining is laughable, but the NYA text that ties bit 4 to SegWit2X still exists. Historically, BIP91 triggered which caused SegWit to activate before the BIP148 shorter timeout. BIP148 proponents continue to hold this day that it was the BIP148 shorter timeout and no-compromises-activate-on-August-1 that made miners flock to BIP91 as a face-saving tactic that actually removed the second clause of NYA. NYA supporters keep pointing to the bit 4 text in the NYA and the historical activation of BIP91 as a failed promise by Bitcoin developers.
We have discussed BIP8: roughly, it has bit and timeout, if 95% of miners signal bit it activates, at the end of timeout it activates. (EDIT: BIP8 has had recent updates: at the end of timeout it can now activate or fail. For the most part, in the below text "BIP8", means BIP8-and-activate-at-timeout, and "BIP9" means BIP8-and-fail-at-timeout) So let's take a look at Modern Softfork Activation!
Modern Softfork Activation
This is a more complex activation method, composed of BIP9 and BIP8 as supcomponents.
First have a 12-month BIP9 (fail at timeout).
If the above fails to activate, have a 6-month discussion period during which users and developers and miners discuss whether to continue to step 3.
Have a 24-month BIP8 (activate at timeout).
The total above is 42 months, if you are counting: 3.5 years worst-case activation. The logic here is that if there are no problems, BIP9 will work just fine anyway. And if there are problems, the 6-month period should weed it out. Finally, miners cannot hold the feature hostage since the 24-month BIP8 period will exist anyway.
PSA: Being Resilient to Upgrades
Software is very birttle. Anyone who has been using software for a long time has experienced something like this:
You hear a new version of your favorite software has a nice new feature.
Excited, you install the new version.
You find that the new version has subtle incompatibilities with your current workflow.
You are sad and downgrade to the older version.
You find out that the new version has changed your files in incompatible ways that the old version cannot work with anymore.
You tearfully reinstall the newer version and figure out how to get your lost productivity now that you have to adapt to a new workflow
If you are a technically-competent user, you might codify your workflow into a bunch of programs. And then you upgrade one of the external pieces of software you are using, and find that it has a subtle incompatibility with your current workflow which is based on a bunch of simple programs you wrote yourself. And if those simple programs are used as the basis of some important production system, you hve just screwed up because you upgraded software on an important production system. And well, one of the issues with new softfork activation is that if not enough people (users and miners) upgrade to the newest Bitcoin software, the security of the new softfork rules are at risk. Upgrading software of any kind is always a risk, and the more software you build on top of the software-being-upgraded, the greater you risk your tower of software collapsing while you change its foundations. So if you have some complex Bitcoin-manipulating system with Bitcoin somewhere at the foundations, consider running two Bitcoin nodes:
One is a "stable-version" Bitcoin node. Once it has synced, set it up to connect=x.x.x.x to the second node below (so that your ISP bandwidth is only spent on the second node). Use this node to run all your software: it's a stable version that you don't change for long periods of time. Enable txiindex, disable pruning, whatever your software needs.
The other is an "always-up-to-date" Bitcoin Node. Keep its stoarge down with pruning (initially sync it off the "stable-version" node). You can't use blocksonly if your "stable-version" node needs to send transactions, but otherwise this "always-up-to-date" Bitcoin node can be kept as a low-resource node, so you can run both nodes in the same machine.
When a new Bitcoin version comes up, you just upgrade the "always-up-to-date" Bitcoin node. This protects you if a future softfork activates, you will only receive valid Bitcoin blocks and transactions. Since this node has nothing running on top of it, it is just a special peer of the "stable-version" node, any software incompatibilities with your system software do not exist. Your "stable-version" Bitcoin node remains the same version until you are ready to actually upgrade this node and are prepared to rewrite most of the software you have running on top of it due to version compatibility problems. When upgrading the "always-up-to-date", you can bring it down safely and then start it later. Your "stable-version" wil keep running, disconnected from the network, but otherwise still available for whatever queries. You do need some system to stop the "always-up-to-date" node if for any reason the "stable-version" goes down (otherwisee if the "always-up-to-date" advances its pruning window past what your "stable-version" has, the "stable-version" cannot sync afterwards), but if you are technically competent enough that you need to do this, you are technically competent enough to write such a trivial monitor program (EDIT: gmax notes you can adjust the pruning window by RPC commands to help with this as well). This recommendation is from gmaxwell on IRC, by the way.
Axion - A Global Currency, Built To Serve The People
What is Axion? Per Axion's website:
AXION is the answer to our global financial markets that are on the brink of disaster. The original solution to this impending collapse was Bitcoin, a decentralized peer-to-peer currency. However, since its inception, certain aspects of Bitcoin, such as lack of speed and high fees, have shifted Bitcoin into more of a store-of-value than a currency. Axion is the currency to address that. With a high-interest time-locked savings account, Participants in the Axion Network are rewarded daily.
Rewards people, not the corporate elite
Global & Scalable
How is AXION distributed?
Anyone holding Hex2T (pre-sale) tokens will receive AXION at a rate of 1:1
Hex holders will also receive AXION 1:1, limited at 10M AXION tokens. Hex holders will also be auto-locked for a year, with 2% releasing weekly. More details can be found in the whitepaper. If Hex holders do not claim their AXION tokens, they will become available for purchase in the Daily Auction every week.
The Daily Auction
Putting Tokens and Value into your pocket.
To get Axion, it needs to be claimed by Hex & Hex2T holders, the longer they wait to claim, the more penalties they face. About 2% of their total per week. This 2% is added into a daily auction pool where people can bid using ETH on the Axion tokens within it. If you bid 10% of the ETH on that day, you get 10% of the pool rewards. 80% of the ETH paid in the auction is then used to hyperdrive both the Axion token and the stakers earnings. First, the ETH is used to purchase the tokens, boosting the token price, and then those tokens are distributed to stakers, creating a very strong positive feedback loop.
Axion is on the path to becoming the ideal global currency.
For the first time in history, inflation is increasing the purchasing power of the people within the network. Axion has partnerships lined up to be integrated in online and in-person payment solutions, where you can pay for nearly everything in your every-day life using Axion. The merchants can accept FIAT (converted from Axion), or Axion itself. This is a global movement.
Axion: Built to Scale
500 Billion Initial Total Supply 1:1 Freeclaim ratio for Hex2T and Hex holders 80% of ETH Earned in auctions is used to buy back tokens 8% Annual inflation that goes Directly to stakers 100% of all purchased tokens Are distributed to stakers No Auto-Stake For hex2t holders 100% autostake for hex holders
How to buy:
**Video Tutorials:**Metamask Install – https://www.youtube.com/watch?v=htyEeKNHX5ABuy/Sell Axion (HEX2T) – https://www.youtube.com/watch?v=vYZBOkHIM5k How Do I Buy Axion (HEX2T)? Step One: Purchase Ethereum from your exchange of choice (Coinbase, Binance, etc). You can also purchase Ethereum through Metamask and have it sent directly to your Metamask wallet (More details on this in Step Three). If buying through Coinbase, you’ll have the option to use a linked bank account or a debit card. Funds purchased via linked bank account will have a hold period while the bank transaction clears, funds purchased via debit card will be available for use instantly. Step Two: Install the Metamask desktop browser extension and set up your Ethereum Wallet. You may also install the Metamask app on your Android smartphone and follow the same set up process in the linked video. (Apologies iOS users, the iOS Metamask app has restrictions that disable necessary features, you’ll have to use the desktop browser extension) Step Three: Once you have your Metamask wallet set up and your seed words properly saved, it’s time to deposit Ethereum to your wallet. – If you’ve purchased Ethereum on an exchange such as Coinbase or Binance, you’ll have to copy your wallet address from Metamask and withdraw the Ethereum from the exchange to your Metamask wallet address that you just copied. Be sure to check the wallet address multiple times before sending as transactions can not be reversed. – If you’d like to purchase Ethereum directly through Metamask, you can do so using the Wyre fiat gateway that is integrated into Metamask. Step Four: Now that you have Ethereum in your Metamask wallet, you can head over to our listing on the Uniswap Exchange to purchase Axion (HEX2T). We recommend using Fast GAS to speed up your transactions. You may also have to click on the gear icon in the top right on Uniswap to adjust your slippage limit when buying larger amounts. – If using the Metamask app on Android, you’ll have to access the in-app browser through the menu (three bars top left of app) and paste the provided link. – You will see a “From” input that should have ETH as the selected currency pointing to a “To (estimated)” output that should have HEX2T as the selected currency. The “From” input is the amount of Ethereum you will be spending and the “To (estimated)” output is the amount of HEX2T that you will receive for that amount of Ethereum. – Once you enter the amount of Ethereum you’d like to spend, the button at the bottom of the page should say “Approve”. This “Approve” function allows the exchange to access Ethereum in your wallet, which is necessary to complete this transaction. You’ll click the “Approve” button and the exchange will send a transaction to your wallet, which you will have to confirm. Wait for that Approve transaction to clear and once it does the button should change from “Approve” to “Swap”. – Now that you’ve given the exchange permission to use the Ethereum in your wallet, you can click the “Swap” button. This will send another transaction to your wallet that you’ll have to confirm. Once that transaction clears, you’ll have successfully purchased HEX2T with Ethereum! Side Note: If you can’t see the HEX2T that you’ve purchased in your Metamask wallet’s Asset list, you’ll have to add the token to your Asset list. At the bottom of the Asset list you will see an “Add Token” button, click on that and you’ll see a “Search” and a “Custom Token” tab. Click on the “Custom Token” tab and paste the following address (0xed1199093b1abd07a368dd1c0cdc77d8517ba2a0) into the “Custom Token Address” field, the rest of the info should auto-fill. Then click the “Next” button in the bottom right, and it should display your HEX2T balance, click the “Add Tokens” button and you should now see your HEX2T in your Asset list. **How Do I Sell Axion (HEX2T)?**To sell Axion (HEX2T), you essentially do the inverse of what you did to purchase it.Step One: Head over to Uniswap Exchange and click on ETH in the “From” input, a drop down list will appear and you’ll select HEX2T. In the “To (estimated)” output, click on “Select a Token” and select ETH. To clarify, if you want to sell, HEX2T should be on top, ETH should be on bottom. Step Two: Enter the amount of HEX2T you’d like to sell in the “From” input, the button at the bottom of the page should say “Approve”. This “Approve” function allows the exchange to access HEX2T in your wallet, which is necessary to complete this transaction. You’ll click the “Approve” button and the exchange will send a transaction to your wallet, which you will have to confirm. Wait for that Approve transaction to clear and once it does the button should change from “Approve” to “Swap”. – Now that you’ve given the exchange permission to use the HEX2T in your wallet, you can click the “Swap” button. This will send another transaction to your wallet that you’ll have to confirm. Once that transaction clears, you’ll have successfully sold HEX2T for Ethereum! If at any point you feel that you need help in this process, please do not hesitate to join our fast growingDiscordorTelegram.Once you’re in either of those communities you’ll be able to ask an admin or moderator for assistance.
Their legal proposal is 95% complete, per their Discord announcement - and most likely be finished in the coming days.
‘Digital Asset and Blockchain Technology Act’ Approved by Assembly Committee
Link to Insider Nj article:https://www.insidernj.com/press-release/digital-asset-blockchain-technology-act-approved-assembly-committee/ ‘Digital Asset and Blockchain Technology Act’ Approved by Assembly Committee (TRENTON) – The Assembly Science, Innovation and Technology Committee on Wednesday approved a bill (A-2891) known as the Digital Asset and Blockchain Technology Act to regulate the growing cryptocurrency industry in New Jersey, with the goal to spur innovation and create a competitive economy. The measure aims to provide transparency, consumer protections and a licensing structure for both operators and consumers engaging in virtual currency transactions in New Jersey. The bill is sponsored by Assembly Democrats Yvonne Lopez, Andrew Zwicker and Joe Danielsen. “While many people see and hear about Bitcoin, few know how the virtual currency industry works. Many people have invested large sums of money without knowing the cryptocurrency market can be volatile and can subsequently lead to irreparable financial harm,” said Lopez (D-Middlesex). “We must take steps to protect consumers looking to invest in cryptocurrency, while also allowing the sector to continue to develop and expand in New Jersey.” Under the bill, digital asset businesses must be licensed by Department of Banking and Insurance in order to operate in New Jersey, or be licensed in another state in which New Jersey has a reciprocity agreement. In the application process, a cryptocurrency business would be required to disclose its legal name and any fictitious or trade name the applicant uses to conduct business. It also must provide a list of any license revocation or suspension taken against the applicant in another state, federal or state investigations and litigation involving the business, among other information. “The value of Bitcoin goes up and down; it’s been as high as $20,000 and as low as $16,” said Zwicker (D-Somerset, Mercer, Middlesex, Hunterdon). “With this in mind, it’s important that we instill protections for consumers and ensure the Department of Banking and Insurance has the tools it needs to take action if fraudulent activity ever occurs.” New York State recently promulgated capital expenditure requirements for the virtual currency sector that proved difficult for small digital asset businesses to meet. As a result, many have chosen to find a home in New Jersey. “If we want to keep our economy innovative and competitive, we must welcome emerging industries to do business here in New Jersey. It’s also important that we establish fair and reasonable requirements for this new sector that will protect businesses and consumers alike,” said Danielsen (D-Middlesex, Somerset). “With this legislation, consumers will be better-informed of the risks involved when investing in virtual currency.” Additionally, the bill requires cryptocurrency businesses to disclose the terms and conditions of a consumer’s account at the time the consumer contracts for a service. A disclosure shall provide a schedule of fees and charges, whether the consumer’s account is protected by the Federal Deposit Insurance Cooperation, and information detailing that an investment in digital assists is volatile and subject to market losses, among other requirements. The bill now goes to the Assembly Speaker for further consideration.
Attention incoming interns! Here's a list of TIPS I WISH I KNEW starting my intern year, some things you can start working on now and some less commonly discussed but very important parts of your job
It’s that time of year and yet again I’ve seen plenty of incoming interns asking what they can do to prepare. I wrote this post to share some tips for all of the not-exactly-medical stuff I wish I knew before I started intern year and to share a few things that interns can do before they start to feel like they’re well prepared for the long white coat. As a quick background, I was a surgery intern in the first half of the 2010s and much of this is informed by my notes and memories from that time in addition to everything I’ve learned since, particularly about professionalism both in medicine and in the business world with work I’ve done in the healthcare startup arena. I’m also not perfect and very much a work in progress myself and, outside the intern-specific items here, I try to do most of these things myself—sometimes more successfully than others. So take what you think are good ideas here, leave what you don’t think would be useful, and if anyone else has anything to add, please feel free to chime in. TL;DR: Intern year is hard. Here are some not-so-commonly-disucussed tips that may help.
1. Being an effective intern is, at its core, about being responsible, effective and reliable.
Your day to day responsibilities are nearly always dominated by the need to get things done and to do so in a manner that lets your other team members focus on their own roles and responsibilities. What about learning clinical medicine? You'll learn plenty and fast. Don't worry. When reading through these tips below, view them from an angle of “would this help me develop an effective system for making sure everything gets done and nothing falls through the cracks?”
2. For your in-the-hospital life as well as your outside-the-hospital life, remember this one thing: you will forget.
You will be busy and have responsibilities in a way you likely have never experienced before. This will naturally make the day-to-day things in life more difficult than you’re used to so developing ways to outsmart your forgetful brain will pay off.
3. You are a professional now. This is your career. You’re in it.
It’s easy to view your life as a trainee as a sort of advanced student or something in between a student and a “real doctor”. But that’s not true. View yourself as a professional building your career. Your intern year is just the first step of that career. You’re a real doctor as much as any other now.
4. One of the hardest things about being an intern or resident is dealing with feelings of isolation. It will take work to actively manage and overcome those feelings.
Imposter syndrome, feeling like you don’t know what you’re doing or that you don’t belong, feeling like you’re not the person you used to be, that you don’t have time to do all the “normal” things that other people do, thinking your co-residents or attendings think you’re dumb, feeling that you don’t have time for friends/family/hobbies, ruminating on “what if I screw this up and hurt a patient?”, or “this doesn’t matter -- the patient is going to XX or YY anyway” etc are all common feelings and they all share the same undercurrent of feeling isolated in one way or another. You need to actively work to find ways to confront and overcome these feelings or else they will control you. When they control you, you’re burned out. It may not seem like it at first, but nearly every single tip below is geared towards avoiding feelings of isolation. Feeling like you’re not in control of your finances will make you feel isolated. Feeling like you’re losing a handle on your relationships will make you feel isolated. Feeling like you’re behind on your email and haven’t done all the little things in life you need to do will make you feel isolated. Read these tips through that lens.
What you can do before you start
1. Organize and update your contacts. Seriously.
Here are some ways it can help you maintain and grow your relationships.
Use the ‘Notes’ feature in your contacts for everyone important in your life and all the new people meet.
You will forget your friends’ kids names and ages. Every time you get a birth announcement or see a post on social media, go to your friend’s contact, edit the notes and put in the info. Then, when you reach out to your friends, ask about their kids...by name.
You will forget your friends’ boyfriend/girlfriend/wife/husband/partner’s name, especially if you’ve never met them or haven’t seen them for a long time. Put their name in your friends’ card with a note like “Started seeing Sam in June 2020, he/she’s a software engineer”. Someone you know gets married? Add their wedding date to their card.
You will forget how you knew people in your contacts. Met at a conference? Was a medical student on your heme onc service? Friend-of-a-friend you met at a wedding? Someone shares an interest you have? Make a note in their contact card. Tip: these notes are for you, not them. So if someone reminds you of an actor, or didn’t stop talking about bitcoin, make a note. It will help because you will forget.
Tag your contacts or add them to lists and use those tags/lists to your advantage.
Make lists or tags for your family, your medical school friends, your undergrad friends, your coresidents, your attendings, your medical students, the hospitals you’ll be working at, etc. Put those lists or tags to use like this:
You will forget to stay in touch with people important to you. Set reminders in your phone for every week / two weeks / month, etc to pull up a list (family, medical school friends, etc), pick someone on that list you haven’t chatted with in a while and text them and ask them how they’re doing. Aim to start a conversation, ask about what’s happening in their life. Texts are more personal and meaningful than liking a post on social media or sharing a meme. Initiating conversations with your friends and family will help you feel connected and will increase the likelihood they reach out to you.
Don’t label your medical students like “MS3 Laura” or “Sub-I Juan”, etc. Label them with their full name and treat them like the colleagues they are. Put them on a list, clear it out next year if you want, but don’t treat them as “MS3 XXX“ or “MS4 YYY”. I’m sure you remember feeling like a nameless/faceless medical student at times in school and I’m sure you didn’t love it. So don’t repeat that behavior. Add a note or two about them while you’re at it. Take enough interest in your medical students to treat them well. You never know when or how you’ll cross paths with them again.
If you rotate through different hospitals, you will forget which “ED” or “PACU” or “nursing station 3rd floor” numbers are which. Tag them or put them on a list. It’ll make finding them when you need them much easier.
2. Use a good note taking app and a good task manager app to help with both your in-hospital life and your outside-of-the-hospital life.
Here are some ways to use a notes app.
Make a note for each rotation you’re on. Add in any unstructured tips as they come up, like “Send all of Dr. X’s patients home with Y”, “Use the call room in the basement outside of the locker room, passcode 1234”, “Park in the X lot on the weekends”, “Dr. A likes to manage Z with Y”, “The case manager, NAME, usually sits at the computer behind the 2nd floor nurses station”, etc. Don't overthink them, just write them down when they come up. Review those notes the next time you rotate through because you will forget all those little things and they will help you in the future.
Create a master grocery list of all things you typically get at the grocery store. Share it with a roommate/partner so they can keep it updated too. That way if you ever stop to pick something up, you can review the list to make sure there’s nothing you’ll forget.
Make master lists for other things in your life too like “packing for a conference”, “packing for a family trip”, “Target/Wal-Mart household master list” so you can quickly review anytime something comes up so you minimize the chance of forgetting something
Make notes for all of the other stuff you have to manage in your life like your car, your apartment/house, your loans, etc and update them every time you work on that thing. Change your loan repayment? Add it to the note. Have to get your brakes fixed? Add to the note where you got it done, how much it cost, etc. Talk to your landlord about fixing the shower? Add it to the note. Have to call the medical board to sort something out with a license? Add it to the note.
I like two note apps on iOS: Bear for personal notes since it’s fast and has great tagging and Apple’s Notes app for shared notes
Pick a good task manager app and use it for all the things in your life that aren’t your day-to-day work
Cousin getting married and you can go to the wedding? Make tasks to ensure your time off, book your travel, buy a gift, rent a hotel room, etc. Then put all the relevant info into your note because...you will forget.
Pandemic is over and you get to present a poster at a conference? Make tasks to review your draft with your coauthors, print your poster, book your travel, submit your reimbursement, etc. Then put all the relevant info into a note. Otherwise, you’ll forget.
I like Things and have also liked OmniFocus. There is a ton of content on how to set one of these things up for productivity so review it and use it YouTube search
3. Take charge of your finances
When I was an intern, I figured all I had to do was pay my loans and not go into more debt. I wish I had done the following instead:
Read these two books: The White Coat Investor and I Will Teach You To Be Rich. Both are very good and have different strengths. The WCI is directly applicable to you and will help educate you in ways medical school didn’t about your financial future. IWTYTBR is much more of a “millennial” book but it’s very good for explaining big concepts and for providing a system to set yourself up for success. They’re both easy and relatively quick reads and don’t require any financial background. WCI is fine as an e-book but IWTY has a bunch of dialog boxes that make the e-book a poor experience, get a physical new or used copy.
Set up a budget. I use and swear by You Need A Budget. It’s the best money I spend every year. Their system is easy and straightforward and it doesn’t take long to get the hang of it. I can’t recommend it highly enough.
4. Update your CV now and keep it updated regularly
You will no doubt have to share your CV with someone at some point whether it’s for fellowship or a research project or any number of things. The time to work on it is not when someone says “can you share your CV?” -- that’s a recipe for omissions, typos and mistakes. The only thing you should be doing every time you share your CV is giving it a quick once-over to make sure you don’t spot any mistakes and to make sure it’s up to date There are plenty of templates online and your training institution may even have a preferred format somewhere on their website. Your ERAS application will give you a good head start but most of your medical school CV lines will either be condensed or removed all together unless something was particularly notable. You can almost always find example CVs online from senior people in your department or institution with a quick web search -- use a few as a guide Set a reminder / task to update your CV at regular intervals. Quarterly is good, yearly at least. Save new versions of it each time so you can refer to the old ones if you need to and name them in a way to let you know you’re always sharing the most recent version, e.g., LASTNAME_FIRST NAME_CV_2020-06. You will forget if the one marked “CV” only is the right one you want to share.
5. Subscribe to a couple of newsletters to stay up to date with the world outside of your hospital
For general news, your preferred newspaper probably has a daily email briefing. Otherwise, Axios AM/PM and Politico’s Playbook are both very good quick reads to stay up to date with current events.
Keep up with healthcare news so you know what’s going on in the healthcare system broadly
Politico’s Pulse and Morning eHealth are both very good and have quick facts at the beginning if you just want to skim
Rock Health’s Rock Weekly is a decent summary of each week in the healthcare startup and technology world
Pick a few of these and aim to get through them each day. If you can’t get through them, unsubscribe to the ones you think are least relevant to you so you never feel “behind” in staying up with the news. You can breeze through the few you pick in a few minutes here and there throughout the day -- don’t make it any harder than that to feel like you’re “up to date” on the news.
General tips for maintaining relationships
For any romantic relationship, do these things if you don’t already:
1. Make a rule: no phones at the table. * Don’t put your phone on the table face-up. Don’t put your phone on the table face-down. Keep your phone off the table and set to silent. * Focus on the person in front of you and show them you care about them by paying attention to them. We all know what it feels like to be with someone more interested in their screen than in interacting with you. If you’re on call, say “sorry, I’m on call, I may have to check something here and there”, apologize if you do check it and then put your phone away. 2. Make another rule: no phones in bed * Same principle as at the table. Want to feel like two strangers just passing through life who just so happen to share the same bed? Wake up, reach for your phone and scroll through your feeds like a zombie before getting out of bed. Same idea before bed. Your phone can wait. 3. If you’re at the point where you share finances, set a regular meeting to review how you’re doing. * Ideally, this is a “red, yellow or green” meeting and should only take a few minutes. Money can be a big conflict issue for relationships and avoiding talking about money is a surefire way to eventually turn to conflict. If you have a budget and shared goals, this should be quick. * A monthly check-in is good. Create a recurring calendar event, attach the shared notes or spreadsheet document you use, add your goals for the meeting and honor the meeting when it comes around.
Eat with people who are important to you, if you can.
There’s something about sharing a meal that’s special in human nature. Friends who are important to you? Partners? Mentors you’re looking to get to know better after you’ve had a few chats? Try to eat with them when you can. And keep your phone off the table.
The same idea works with your coresidents and teams in the hospital. Eat with them if you can. Eating with others builds, strengthens and maintains relationships. Keep your phone off the table if you can.
Think about it this way: who would you consider a better mentor, the person you’ve met with a few times in their office where they sit behind their desk and you in front of them while they glance at their computer screen every time it pings or the person who’s invited you to get coffee or food and they kept their phone away the whole time? Now turn that around and realize the power of the message you can send to people you care about by trying to eat with them and show them they have your full attention.
1. Learn to think about tasks as a continuum from start to finish instead of as a binary 'done/not done'.
Let’s say you have to order a CT for a patient of yours.
Instead of marking the task as complete the second you place the order for the CT, recognize that the whole task is not just placing the order, but also knowing when your patient is going down to the scanner, when they’re back, when the CT is up in the system, when the report is up and also that you’ve looked at the CT yourself and have read the report.
When your senior or attending asks you, “Did patient X get their CT?”, a not-so-great answer is “Yes” or “No”. A better answer is “they’re down at the scanner now” or “the scan’s done but it hasn’t been read yet. Want to look at it?” or “Yes, it’s negative for XXX but did show YYY”.
Whatever system you eventually adopt for your day-to-day task management in the hospital, whether it’s a list or index cards or a printed signout sheet, make sure you’re tracking both when orders go in, when they’re complete, when they’re cancelled, etc. Just marking things as complete once you place the order isn’t enough.
2. Signout is taken, not given.
What I mean by this is that when you take signout, that means you’re accepting responsibility for those patients. They might be your patients, you might be cross-covering, it doesn’t matter. What matters is that when those patients are your responsibility, it’s your responsibility to get what you need to know to take care of them. Is someone signing out to you in a hurry and not giving you what you need? Ask them for that relevant past medical history, those exam findings, and so on. It’s not enough for the person handing off to say “we’re worried about x or y”, you’ve got to follow that up with “in case of x or y, is there a plan for what the team wants me to do?”. Get the answers you need. A lot of covering patients on call is playing defense whereas the primary team generally plays offense. But that doesn’t mean you can play defense in isolation. The last thing you want is for the primary team to feel surprised by your choices.
* Here’s two ways for the above example to go when turning the patients you were covering back over the next day or whatever: 1. You: “For patient so-and-so, you said you were worried about x or y. Y happened.” Them: “What did you do?”. You: “Z”. Them: “Shit, my attending’s not gonna like that”. 2. You “Y happened so I did A like you said, it went fine and here’s the current status”. Them: “Great, thanks” * See the difference?
Along the lines of taking responsibility for those patients, that means that if you couldn’t get the information you needed at signout then you have to go and see those patients and get the information you need yourself.
You’ll hear this idea said a bunch of different ways like “trust but verify”, “trust no one” and your comfort level will change over the year as you become more confident and comfortable. But always error on the side of going to see the patient and getting your own information at the start.
3. If you will be miserable without something when you’re in the hospital, bring it with you. You won’t reliably be able to find it at the hospital every time you need it.
Need coffee otherwise you turn into a demon? Bring it with you. You never know when you’ll get caught doing something and won’t be able to run to the cafeteria for your fix.
On call overnight and know you need food so you don’t go insane? Bring it with you. Here’s a hospital food rule: never rely on the hospital's ability to feed you. The hospital will let you down sooner or later, I guarantee it.
Know you always get cold on call? The day you forget your jacket/sweatshirt is the day you won’t be able to find a spare blanket in the hospital to save your life. Put a backup in your locker (if your hospital respects you enough to give you one).
Miscellaneous productivity, professionalism and lifestyle tips
1. Aim to “touch” everything only once
Example: your physical mail. You know, the stuff made of dead trees that accumulates in that box you check every once in a while. For every piece of mail you get, you should either trash it, file it, or act on it. Don’t touch it until you’re ready to do one of those things.
Example: your email. Either delete it, archive it, reply to it or do the thing it’s telling you to do right away. Don’t fall into the trap of using your inbox as a to-do list -- that’s a recipe to get burned. Use a task manager for your to-do list and aim to keep your inbox at zero. Realize that email’s true power is communication and use it as a communication tool and nothing else.
I’ll use the example of going to a wedding again as something to “touch once”. Aim to accomplish all the tasks at once or at least create tasks and reminders to complete those tasks all in one go. Respond to the RSVP, create the calendar invite with all the information from the invitation, share the calendar event with your date, book your travel, book your hotel, book your rental car, buy your gift from the registry and set a reminder to get your suit/dress cleaned a few weeks ahead, etc.
2. Lean to use your calendar as a tool
Professionals in the “real world” tend to live and die by their calendars. Some people, especially many senior people in medicine, don’t manage their own calendars. But you manage yours. With it you can:
Make sure all events—even small ones like dates or errands you want to run—have locations so all you have to do is click the location for directions
Send invites to friends / family / coworkers for anything you talk about doing that has the relevant info
Make reminders for yourself to prepare for upcoming events, i.e.., don’t count on seeing your parents’/spouses’/whomever’s birthday “coming up” to remind you to get a gift or send a card. Create an event two weeks before their birthday that says “Buy Mom a birthday card”, set it to repeat yearly and buy a card when it comes up, send it a few days later and don’t worry that it won’t get there in time.
3. Learn to use email well
Ever get an email from someone and feel their tone was terse, condescending or rude? Don’t be that person. Error on the side being polite and professional and writing in complete sentences without textspeak. It’s not hard — you type fast, even with your thumbs, I’m sure of it.
Learn to communicate effectively. Keep it short but not terse. State why you’re writing to someone, be clear if you’re asking a question, and think about it this way: “How am I making it as easy as possible for this person to understand why I’m emailing them and do what I’m asking them to do?
Don’t use a canned salutation like “Best, NAME” or even worse: “Best, INITIALS”. Use your salutation to continue to communicate your message and remember that politeness and professionalism extend through your signature.
I don’t know why “Best,” is so common in medicine but it’s meaningless, unthoughtful, inherently passive aggressive and I seriously read it as if the person writing it were signing off by saying “Go f*ck yourself,”. Same thing for “Regards,” and its ilk, any abbreviation like “vr,” or any form of cutesy quote.
Write your salutation fresh each time. Did you ask someone for something? Say “Thank you for your help”. Are you writing someone senior to you and want to sound somewhat formal? “Sincerely,” never goes out of style. Are you sharing information and essentially writing a memo? Use “Please let me know if you have any questions”. Your salutation is communication, treat it that way.
Sign with your name, not your initials. Signing with initials is a common way senior people will try to remind you they’re senior to you. If you do it, it’s like you’re trying to prove you’re a Cool Guy Big Shot too. It never comes across well -- even for those senior people. Initials are terse. Lowercase initials are even terser. Although they may look different at first glance, all initial signatures functionally come across as ‘FU’. Write your name.
If it’s a few rounds back and forth of email, it’s normal drop salutations and signatures and treat email more like texting. Keep using complete sentences without textspeak, though. I promise you’ll come across better that way.
Use the ‘signature’ feature of your email client to share your professional details and contact information
Your institution (not department) will hopefully have a format for this that’s standardized and includes minimal or no graphics. If it doesn't, then I feel sorry for all the inevitable IT headaches you will eventually endure at your institution since they clearly underfund and undervalue contemporary IT and professional services. It’s the wild west out there so find some good examples of clean, professional signature formats and make one for yourself.
Note: this signature lives below your salutation and sign off. It’s essentially the letterhead for your email that lets your recipient fill in the details you may not otherwise provide like your department, mailing address or fax number. It’s not a replacement for signing off of your communication professionally.
Never use bold, italics, underlines or different font sizes in your emails. They only make emails harder to read and jumble your message.
If you want to highlight something, put it in a numbered or bulleted list.
If you can’t communicate what you want with 2-3 bulleted points, then email is not the right medium to use. Do you like reading long emails? Of course you don’t. Write a memo, attach it as a PDF or shared doc and use the email to tell your recipients to review the attachment.
You will eventually, in some way or another, ask someone to introduce you to one of their contacts and or refer you for something. Learn how to write a good forwardable email that utilizes the double opt-in concept and how to make it easy on the person doing you the favor. Read more here, here and here.
While you’re at it, understand the power of using CC and BCC to communicate effectively.
Aim to answer all emails written directly to you within 24 hours.
If you can’t respond fully right away, respond briefly saying you got the note and that you’ll work on it and get back to them. Set a reminder or create a task to do or review the thing and get back to them once you’ve done it.
Do you hate being left on read in text? You do it in email every time you don’t respond to someone in a timely fashion. It’s better to share a quick, “I got it and I’m working on it message” then not replying until days or weeks later.
4. Don’t let someone else’s negative energy and/or anxiety transfer to you
You will frequently experience things like this in the hospital:
A co-resident disagrees with a management decision made at rounds and mentions that so-and-so is an idiot. So-and-so probably isn’t an idiot. Your co-resident probably isn’t an idiot either. Form your own opinions from your own experiences.
A nurse pages you with a tone that says “THIS IS REALLY BAD”. It might be, go and see. And on your way, stay calm and go over the steps in your head of what you’d do if it is, in fact, REALLY BAD. But don’t freak yourself out before you even get to the room. You won’t be able to make decisions with a clear head if you’re already worked up.
You’re a surgery intern and all your patients are normally on the med-surg floor. Every once in a while, one goes somewhere like heme-onc if the med-surg floor is full. Someone on your team says something like “great, now they’re going to screw up our patient”. Recognize that that floor isn’t full of terrible nurses and may just have less experiences with lines and drains and that the best thing you can do is go down there, talk to the nurse and say “here’s what we want to be called about” and “this thing may look bad but it usually isn’t and we don’t need to be called, here’s why”, and so on. Doing things like this will mean you get fewer calls. Fewer calls are good.
Your attending is having a bad day and you’re not enjoying your interactions with them. Don’t let that make you have a bad day too. Medicine is hard enough as it is, stick to your own bad days instead adopting other people’s. Then pull up your friend list, text a buddy and feel better.
5. Don’t neglect your physical health. Trying to eat well and stay active are even more important when you’re insanely busy.
The #1 thing you can do to help your waistline is cook your own food and pack your own meals. It doesn’t matter what you cook or how good of a cook you are, as long as you’re aiming to pack meals that an adult would eat, it will be healthier than takeout and cafeteria food. It’s better for portion control, you control all the ingredients and you get a sense of satisfaction for being on the ball. It’s better in every way. I know it’s not realistic to always prep and pack your own food on the busiest of services but you should try to hit at least a percentage like 25% or 50% of your meals. There are no lost causes in your own health. It will be hard to exercise and work out. You should still try to do it anyway. You will go long stretches without exercising at times. Don’t beat yourself up about it. Every day is a chance to do the thing you want to do so get back out there.
6. If your social profiles are private, consider doing some housekeeping and making them public.
Instead of thinking about them as a liability to be that needs to be hidden, think about them as a narrative you can control. Nothing is private on the internet. Even your private profile. You never know who knows someone you know or what may get screenshotted and shared down the line. It’s natural to run a web search on anyone you’re meeting for a date, interviewing with for a job, or researching in general. When you search your own name, what comes up? What do you think when you’re searching for someone and they have a private page? Do you ever click on a few links to see professional stuff from LinkedIn, and then some social pages to see what else you learn? So does everyone else. Use your social pages to put forward a version of you that shows who you are, shows some interests true to yourself, makes you seem like a totally normal and reliable person (which is exactly what any potential date, partner, fellowship director or hiring manager is asking themselves about you) and doesn’t share enough information to let a patient show up at your door. Medicine lags behind other industries with people still commonly hiding behind private pages. In the tech world, it’s more strange to not have a public page. A private page says more about you that you might want to hide red flags whereas a public page says “go ahead and look, you won’t find any red flags”. One is much more powerful than the other.
Closing and something to read
When you view your professional life, it’s natural to view your professional relationships as being a binary one between patient and physician. That’s certainly essential and certainly important, but as a professional you now have relationships to consider with so many more types of people: co-residents, faculty in your department, faculty in other departments, administrators, support staff, medical students, and so on. Just as you had to learn how to work with patients, you will have to learn to work with all of the other people in your professional life. Truly effective professionals will treat all interactions importantly and give thought and consideration to each one. All these interactions and relationships will all affect your day-to-day experience, your well-being and, ultimately, your professional experience. You will find yourself being not just responsible for your patients, but also for yourself, your career and your relationships. It takes effort to succeed in all of those areas. And even with effort, sometimes you’ll be winning in an area and losing in others. And in a few months it will be different -- that’s just life. I want you to consider looking outside of books and resources written specifically for physicians when you’re trying to tackle these issues inside the hospital and out. Medicine is a much-smaller-than-you-realize bubble with a long history of personality-driven examples of “that’s just the way we do it” or “that’s how we’ve always done it”. There are good books about medicine out there, to be sure, but you’ll benefit more professionally by learning from the wide world outside of hospitals since there are quite simply many more successful and accomplished people who’ve written great resources for all aspects of professional life that medicine tends to ignore. I’d recommend you start with this book: Andy Grove’s High Output Management (a review by another Valley titan here). Andy escaped communist Hungary, taught himself English and rose to be CEO of Intel and went on to be a sage of Silicon Valley before he passed. This book is a how-to guide for how to be an effective professional in an organization (hint: you're now a professional in an organization) and if you’ve enjoyed this post at all, you’ll love this book. You may think that this book applies to ‘managers’ and ‘business’ and not medicine but you couldn’t be more wrong. Although it was probably written around the time you were born, nearly everything in this book is a lesson that directly applies to your professional life in medicine and when you start seeing it, you’ll feel like you’re in The Matrix. Congratulations! You've worked hard to get here. Be proud of yourself, your degree, your long white coat and be the best doctor you can be.
In these series of articles, we will be discussing the General Data Protection Regulation commonly know as GDPR, and explain its relation with Distributed Ledger Technologies such as blockchain. According to Article 8 of the EU Charter of Fundamental Rights on Protection of Personal Data, “Everyone has the right to the protection of personal data concerning him or her”, thus establishing data protection as one of the most important rights for EU citizens. Based on this assumption, in April 2016 the European Parliament adopted the General Data Protection Regulation (GDPR), urging that businesses protect the personal data and privacy of EU citizens for transactions that occur within EU member states, or even outside EU borders if transactions involve EU citizens. The measure was considered a necessary step after a report by the RSA on privacy and security called attention to some alarming data. It emerged that out of 7,500 consumers across the UK, USA, France, Germany, and Italy, 80% said that lost banking and financial information was a top concern, while 76% stated that lost security and identity information was their major worry. GDPR and blockchain With the rise of blockchain technology and its cryptographic approach to personal data, which conceals information like names and addresses under a code, the need for some thorough analysis and some relevant regulation became apparent. Data protection regulation principles were designed and developed in a world that only knew a centralized data management type, while blockchain raises questions on how to apply these principles in a decentralized environment. It’s understood and accepted that the issues around the overlapping of GDPR and blockchain are not about the technology itself but how the technology is used when processing personal data. Although we developed the idea that blockchains are private and anonymous, in reality, some user information can lead back to the individual’s identity even if cryptographically secured. Therefore, since this is possible, personal data processed through a blockchain is to be considered subject to the GDPR. Personal data includes any information relating to an identified or identifiable natural person (the data subject). In the context of blockchain technology an individual’s public key would be considered their personal data and would therefore need GDPR compliance obligations. While the validity and relevance of blockchain technology in relation to GDPR are not questioned, there still exist many points of tension between the two. What issues arise under GDPR? We’ve seen that processing personal data in a blockchain still triggers GDPR compliance. The two major issues involving GDPR and blockchain are:
The definition of Data Controllers and Data Processors when blockchain is involved;
The issues arising with the Right of Rectification and Right to Erasure.
What are a data controller and a data processor when a blockchain is involved? GDPR identifies a Data Controller as “the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data within the EU state members or when it involves an EU citizen, even if the data processing is carried out by a non-member state entity.” (Art. 4 sec 7) In the case of a blockchain involvement, a natural person who buys or sells bitcoin on their own behalf, for instance, is not a data controller. By contrast, a natural person who trades bitcoin on behalf of professional or commercial activity, or of other natural persons, is a data controller. If a lawyer records a client’s transaction of any sort on a blockchain, the notary is a data controller. If a bank processes a client’s financial data on a blockchain, the bank is a data controller. The data controller is the one instigating the purposes or means of data processing. He/she/they have to be identifiable so that data subjects can enforce their legal rights under EU data protection law. Blockchain’s decentralized nature replaces a central entity with a network of nodes whose consensus makes it difficult to attribute responsibility and accountability. This is where blockchain technology clashes with GDPR. Data Protection, GDPR, and Blockchain. Data Processors activate personal data on behalf of the controller (Art 4 sec 8 of GDPR) where data processing essentially involves any handling of personal data. Processing includes the collection, adaptation, alteration, and recording of personal data but also its simple storage. According to the French Data Privacy Authority (CNIL), a data processor in a blockchain can be either miners or smart contract developers. For instance, a smart contract developer who processes personal data on behalf of a data controller may be a data processor. Similarly, a miner who follows the data controllers’ instructions when validating a transaction is also a data processor. CNIL mainly draws some guidelines as it has been emphasized that a case-by-case basis should be considered in the connection between the technology and GDPR, rather than the relationship being determined in a broad and general manner. For instance, with regard to the rights of information, access, and portability it advises that they are not problematic on blockchain technology and that a transaction submitted to the blockchain contains sufficiently transparent and visible information. CNIL also views the “right of access and the right to portability as entirely compatible with blockchains’ technical properties.” Issues arising with the Right of Rectification and Right to Erasure The matter becomes more complicated as the EU Charter of Fundamental Rights on Protection of Personal Data provides that everyone has a right to access personal data relating to them, including a right to have such data rectified or erased. That’s why the GDPR includes the “Right of Rectification”, that grants data subjects the right to have their data amended in case of inaccurate information; and the “Right of Erasure” (or “Right to be forgotten”) which adds the right of data subjects to obtain from a data controller and the data processor an obligation to erase their personal data. How can something be deleted or rectified from an immutable blockchain then? The immutability of the blockchain and the fact that it is a permanent and transparent ledger gives rise to GDPR compliance issues. As GDPR requires that personal data must not be kept longer than it is necessary for the purpose for which it is processed, this may be an issue with blockchains where the data cannot be deleted. Not all blockchains are immutable though or subject to a predefined and permanent consensus. Permissioned (or private) blockchains, for example, allow participants to establish a governance structure where roles can be clearly defined, contractual terms satisfying GDPR requirements can be embedded, and technological solutions granting individual rights can be built into the blockchain. With permissionless (open and public) blockchains, the most-compliant approach to these issues is to avoid storing personal data on the blockchain altogether, using for example an off-chain (append-only) data storage approach. If the data is stored off-chain, then it would be easier to process the erasure of the information. On the other hand, if the data is stored on-chain in an encrypted way, then the deletion of the encryption key could be a fair compromise. Because of the immutable nature of blockchains, the data would not be erased as such, however, it would be made inaccessible. In essence, unless there is a blockchain rollback resorting to a hard fork, as happened with the DAO hack in 2016, open blockchain’s data cannot be deleted. The best practice would be to store all personal data “off-chain” which can then be linked back to the ledger by a hash. Through the erasure of hash functions’ private keys, editing and verifying the hashed information would no longer be possible and confidentiality would no longer be compromised. Rather than posing a risk for individuals’ fundamental privacy rights and freedoms, blockchain technology represents a tool that grants data subjects exclusive possession and control over their personal information. Conclusion Without question, the EU consideration of the blockchain approach to GDPR is a further legitimization of the technology. Even though the blockchain itself may be immutable or can only be updated under specific circumstances, the requirements of GDPR may indeed still be fulfilled. It will soon become obvious that rather than posing a risk for individuals’ fundamental privacy rights and freedoms, blockchain technology represents a tool that grants data subjects exclusive possession and control over their personal information. Furthermore, as the technology evolves, the digital ecosystem will offer a variety of peer-to-peer networks; from public distributed ledgers developed that grant unrestricted access and equal roles to everybody, to private networks developed with proprietary software that will grant access to selected participants only. Mixed private and public blockchains will provide an additional structure that could range from some nodes running a piece of the protocol to other nodes that could act as block validators. Stay tuned for the next article with more insights about blockchain technology, its use, and implications by following us on our social media channels. For more info, contactBlock.codirectly or email at [email protected]. Tel +357 70007828 Get the latest from Block.co, like and follow us on social media: ✔️Facebook ✔️LinkedIn ✔️Twitter ✔️YouTube ✔️Medium ✔️Instagram ✔️Telegram ✔️Reddit ✔️GitHub
This is a continuation of the Mandela Effect story.For the introduction, clickhere. How did you first become aware of the Incident? I have a lot of fans, and I often hold events that allow me to mingle with them. They have all sorts of interesting careers, and I like to ask them questions about their lives. Maybe it’s my sincerity, or maybe it’s just part of being a celebrity, but when they open up and tell me about their lives, they frequently share things that they might not tell another person. I was in a deep conversation with one of these fans, and he says “You know, I work for (the Silicon Valley Mogul) and there is just the strangest project that he’s working on. It involves you, interestingly enough.” I mean, obviously I want to know more, so I ask him more questions and he tells me about this weird guy that the NSA is surveilling. They’re tracking his internet habits and it turns out that he repeatedly googles and reads whatever are the most recent news articles on the same five people: Donald Trump, (The Silicon Valley Mogul), Kanye West, Vladimir Putin, and me. So I’m surprised, like “Wow. That’s really weird.” And obviously I’m a little worried too, because I’ve had a lot of stalkers, and it’s a really unsettling experience. So I tell him “Hey, this is really scary, and I’m kind of worried that I may have a stalker that I don’t know about. I’m not asking you to say or do anything that would endanger your job, but if he does anything else that involves me, would you please let me know?” Anyway, a few weeks passes, and I hear back from him and he says “You know, it’s the weirdest thing. He just granted you limited power of attorney in regards to IP infringement. He thinks that the NSA is trying to infringe upon his IP!” I’m like “WHAT?” It turns out that you’re verbally allowed to grant power of attorney and he did so until the end of 2019, to be extended in the event that I file any lawsuits on his behalf. What did you do? Well, I mean, what does one do in a situation like that? I talked to my friends about it. They also thought it was the weirdest thing, and one of them was laughing that we should try to get a message to him. My fan, the guy who works for (The Silicon Valley Mogul), told me that this guy reads Daily Mail a lot. It’s sort of this trashy British tabloid that has a lot of pictures in it. It’s not too expensive to insert a paid article there: in fact a lot of Z-list celebrities and Instagram influencers do it when they’re trying to get their glow-up. So as a joke, one of my friends puts a paid ad in there about me… and the guy answers! But here’s the weird thing, he doesn’t hit the post button. He responds with a thoughtful comment and then deletes it. Like what? Anyway, once me and my friends find out that we can communicate with this guy through Daily Mail, it becomes a thing for us and we try to find out his opinion about all sorts of different things. When you move through our world it can be hard to get a genuine opinion, and this guy is painfully honest. I mean, why wouldn’t he be? He deletes the posts, so there’s no evidence that they even exist. We’re the only ones who know. Anyway, it eventually becomes this sort of… game. We occasionally post paid articles in Daily Mail and ask him his opinion on things. Sometimes it’s serious stuff, like politics or racial issues. Sometimes it’s totally trivial, like… just the other day, a popular actress was asking his opinion about her ankles. Weird stuff like that. We ask his opinions through Daily Mail and my friend who works for (The Silicon Valley Mogul) relays his typed but deleted message back to us a day later. Eventually, we hear his comment about the colors. “Monochrome with a little red if you pledge your loyalty to me, blue and pink if you think I’m sexy.” And we do that too, because, hey, it’s fun. A lot of us are into fashion anyway, so this is like, a… a cool little thing to let other people know that you’re in on the secret, that you’re in the know. 21 is a special number for him for some reason - so every month, on the 21st, we dress up in hiscolors. Someof us even work themintomusicvideos, trailers for coming movies, or the colorscheme of our musictours. Even corporations are doing it too now, using these color schemes in their commercials. There are symbols, too. Like the “OK”symbol, or the illuminatisign of the trianglenearyoureye. Those apparently have some sort of significance to him also, so we try to sneak it into our paparazzi shots or poses. And then one day, I look around, and I’m like… wait a second, this is a cult. I’m in a secret cult. We have weird symbols, and similarclothing, and strange rituals we do on a certain day of the month, and a huge secret shared only by us that the rest of the world doesn’t know about. (Laugh) What is your interpretation of the Incident? Well, it’s pretty obvious. Shortly after I realized we were in a secret cult, he posted a link to a book on Amazon. It’s written like a cross between a Spellbook, an unhinged Twitter rant, and some sort of science handbook. Except this isn’t any sort of normal science. This is something called “Game Theory” and “Memetics.” Basically, those are sciences of crowd manipulation, except right now they’re still speculative – people can’t agree whether or not they exist or are just wild fringe ideas. But this guy’s theories are like, two decades ahead of everybody else. Apparently, for the past twenty years he has secretly been doing mad science experiments on how to manipulate groups, and he just proved it by starting a cult in Hollywood without even ever meeting a single one of us in person. But here’s the crazy thing – there’s no proof of any of this. Like I said, he never hit the post button on any of his comments, so there’s no proof any of them existed. If it wasn’t for the fact that we’re all doing the same things, you wouldn’t know. He’s covered his tracks perfectly. If not for the fact that you came here to interview me about it, I’d never say anything, because who would believe me? What part of the Incident would you categorize as paranormal or outside the bounds of understanding? OK, this is really going to come off as narcissistic, and I really don’t mean it to come off this way… (laughs) Go on. Well, the impression I initially had of this guy is that he was a stalker who was obsessively into me. Even after I changed my mind about that, it seemed pretty clear that he was attracted to me. I mean… to be entirely honest, I got curious and asked him about it on Daily Mail once, and he flat-out admitted it. But, the weird thing is… Yes? After January 1st, 2020, he didn’t read even a single Daily Mail article about me. Not even one.
Good, now you know what Bitcoin is and why you should use it. Then it’s time to get started with the cryptocurrency. If you follow our guide with step-by-step instructions, it only takes a few minutes.. First, we show you how to create or buy a secure Bitcoin wallet.Then we will help you buy your first bitcoin.Thereafter we will explain how to protect and store your bitcoin. PDF Bitcoin Step by Step for Beginners How to Invest and Profit from Bitcoin Today Bitcoin EBook Bitcoin and Cryptocurrency Technologies PDF was very well-received by the critics and financial experts. The book was termed a comprehensive read and a very insightful guide for users. The book went on to become the recipient of the honorable mention 2017 prose award. The choice reviewed the book multiple times and said that the book was an excellent read for everyone who wanted to get an ... Digital money that’s instant, private, and free from bank fees. Download our official wallet app and start using Bitcoin today. Read news, start mining, and buy BTC or BCH. Get Now http://bankbooks.xyz/?book=B00CLU7Z96Bitcoin Mining Step by Step (Bitcoin Step by Step Book 2)
Buy Bitcoin In South Africa - Step by Step(Ice3x) - YouTube
Ice3x: https://ice3x.com?ref=14346648 Crypto University: https://cryptouniversity.co.za Survival Skills Podcast;https://www.greyjabesi.com/ DISCLAIMER: My co... bitcoin beginner guide pdf https://tinyurl.com/best-bitcoin-ebook This is the best bitcoin beginner guide pdf 2018. ☟☟ Link Kindle Editon Beginners Guide To Mastering Bitcoin & Cryptocurrencies: The Step by Step Guide on How to Buy, Store Securely & Trade Bitcoin/ Alt Coin... Skip navigation Sign in. Search Buy your First BITCOIN at Coinbase - http://geni.us/Z0vhym Learn how to purchase (buy) your first Bitcoin so you can start investing in the Cryptocurrency an...