1.29.2021

Elon Musk's Invescapades

Archive.is 


So here is what happened.  Elon musk sells 50 Billion dollars worth of Tesla stock ending on 9:45 AM on the morning of Thursday 1/28/2021.  

Elon Musk then buys covered shorts of Gamestop at 9:45 AM and tweets that shorting stocks should be illegal.  

Elon Musk then tweets a "Dogue" picture and then buys 5 Billion dollars worth of Dogecoin.  

Then Elon musk changes his twitter profile to "#Bitcoin" and buys 50 Billion dollars worth of Bitcoin.

Quite a day, sending the entire world into a confused dizzy.  But it was really all just one dude.

Expect Tesla to start adding Dogecoin and Bitcoin to thier balance sheet and they will facilitate payments via crypto for thier Tesla taxi service and sending crypto payments between Tesla owners.  Tech companies will use cryptocurrency as a "Reserve Currency" similar to how gold used to back the dollar.


1.04.2021

Bitcoin vs Digital Collectible Currency (DCC) in overcoming technical challenges

Archive: Wayback, Archive.is

Here I will list the problems laid out in the Bitcoin white paper with digital currencies, how bitcoin (a decentralized digital currency DDC) solved them, and how a Digital Collectible Currency (DCC) can also solve them.  We will also discuss which format has better solutions to which problems.

Verification of ownership of a coin 

Bitcoin

Digital signatures are used with public/private key encryption

DCC

Digital signatures are used with public/private key encryption

Creation and distribution of coins

Bitcoin

Bitcoin solves the creation and distribution of coins by having a challenge every 10 minutes where one lucky miner will win and get awarded a set number of coins.  Basically a lottery where the price of a ticket is energy usage.  

Basically in Bitcoin, you buy an ASIC and work on a hash problem that there is no way to figure out the right answer, you have to try every possible solution.  The lucky one who finds the right solution first, wins.

DCC

A DCC solves the creation and distribution of coins by letting miners create and complete a challenge on their own or in a group that meets the requirements of the coin.

You create your own challenge, and don't need any connection to the network to both create the challenge and complete it.

In our DCC, you generate a large random number that is the right bit length, and then you factor it using a CPU/GPU combo.  The prime factorization is the solution and earns you a coin.

Pro's and Con's 

In bitcoin the miner has to be constantly connected to the internet and has to compete within time limits.  In a DCC the miner never has to connect to the internet and can mine at their own pace.  

Everyone can earn coins simultaneously in a DCC whereas only one person can earn coins every 10 minutes in bitcoin.  

Also in bitcoin ASIC's are the most powerful miners which price out normal people from earning coins by mining.  In a DCC consumer grade APU's (CPU GPU combo like a laptop, desktop, or smartphone) will be the most efficient miner until quantum computers can compete in several decades for GNFS factorization. 

Bitcoin may be more resistant to quantum computers because it uses an NP-complete algorithm whereas our version of a DCC uses an NP-hard algorithm.  However DCC is much more resistant to acceleration in GPU's, FPGA's, and ASIC's.  Also a DCC can be designed that uses NP-complete algorithm if desired.  In any case quantum computers are decades off that would be able to complete the factorizations that everyday computers can complete today.

DCC has a very serious advantage in the creation and distribution of coins.

Sending coins

Bitcoin

In bitcoin, coins are assigned to your public key to which only you know the private key to claim them.  You then sign a transaction that verifies that you give a coin to another person's public key.  Once this transaction becomes a part of the blockchain, you can no longer spend it, and the person you gave it to can spend it at will.

DCC 

In a DCC coins are assigned to a public key that only you know the private key for just like bitcoin.  But to spend the coin, you must give the private key to another person off-chain.  So using encrypted messaging, bluetooth, snail mail, passing a note, or verbally, etc.  Now both you and the recipient know the private key.  The recipient then needs to send a message to the network in order to change the private key so they are the only ones that can spend it in the future.

Pro's and Con's

In bitcoin everything is on-chain, so you do not need to open up a side communication channel to send coins.  In a DCC you need to comunicate with the other party directly likely via either encrypted communication like email or wallet to wallet or physically with bluetooth.  Bitcoin has a distinct advantage here, but it is also nice that in a DCC you can send coins without internet connection.  With bitcoin you can receive coins without an internet connection, which you cannot do with a DCC (unless you trust the person to not double spend it, or you get it via bluetooth from a phone app that somehow prevents double spending).

In bitcoin you need to wait up to 1 hour for your transaction to be confirmed in the network.  In a DCC when someone changes the private key to receive coins, they can immediately ping the network and see if it was verified and integrated.  DCC has the potential for much faster transactions than bitcoin, however bitcoin's transactions would likely be more secure on average.

Bitcoin has the lead here for ease of sending coins if you have an internet connection but are not in-person.

DCC has the lead here for speed of transactions.

The DCC has the lead here for in-person point of sale, the merchant would need to be connected to the internet but the buyer would not need to be and transactions would be faster than bitcoin and likely cheaper.

Preventing double spend

Double spend is where someone gives their coin to multiple people at once and therefore gets more products than he can afford.

Bitcoin

Double spending is prevented by a blockchain; that is an unbroken chain of transactions that cannot be reordered or changed without re-completing the proof-of-work faster than the rest of the honest network.

DCC

Double spending is prevented by allowing the receiver of the coin to change the private key of the coin they are given.  The receiver pings nodes in the network to confirm that the private key of the coin was changed to their private key, and no one else's.

Pro's and Con's

Bitcoin requires less coordination between nodes to prevent double spend.  A new miner can simply see what the longest blockchain is, and accept that as objectively the true and correct chain.

DCC requires coordination between nodes.  You will have to look for a consensus of nodes to know what the true ledger is.  Likely some nodes will be more trusted than others so you will value their ledger as more correct.  Bad nodes can be blacklisted from the network and their staked coins erased.  Also nodes could require a subscription or connection fee to download or collaborate with or send a transaction to their ledger.  This will likely even out with bitcoin, since there are no transactions on the DCC ledger, you will not have to pay transaction fees in a DCC.

Bitcoin has a more cohesive and authoritative and rigid way to prevent double spend.  But in practice and network code optimization, DCC should become quite close and be more flexible if errors are later found, unlike bitcoin.

Incentives 

Bitcoin

Bitcoin incentivizes nodes by requiring nodes to be constantly connected to the network and have an up-to-date ledger to mine for the currency, collect transaction fees, and to send it.

DCC

DCC incentivizes nodes by requiring a connected node to securely receive payments.  Node runners might also require a fee to connect to them and declare that you received a payment.

Pro's and Con's

Bitcoin using mining to incentivize running network nodes has an advantage here, but in practice, I expect roughly equal numbers of nodes in either setup.

Divisibility

Bitcoin

In bitcoin the mining reward is very highly divisible.  However it needs to be because there are so few mining rewards.  There is an ultimate indivisible amount called the Satoshi which is a set and small fraction of a bitcoin.

DCC

In a DCC, each mining challenge awards the miner with the smallest unit possible of the currency which cannot be further subdivided.  This is similar to the satoshi in bitcoin.  In our DCC this doesn't matter as much since there is no limit to how many people can be solving challenges at once.  The difficulty of the problem can be set, and adjusted, so that the coin maintains a relatively constant value if desired.

Pro's and Con's 

While bitcoin is clearly more divisible than DCC in theory, in practice DCC could be difficulty adjusted to make each reward worth a small amount similar to a satoshi or a penny (or more preferably a dollar).

Price stability

Bitcoin

Bitcoin's price is not designed to be stable.  Bitcoin is designed to have an ever increasing value by having ever diminishing supply.  Also there are liquidity crises every block halving which occurs roughly every 4 years.

DCC

The price can be very stable in a DCC.  A price target can be set and the challenge difficulty adjusted to keep the price fixed on whatever is desired.  If the price rises, the difficulty can be lowered so more supply comes on the market.  If the price falls, difficulty can be raised to reduce supply.  A consensus of nodes would be required to set the numbers minimum bit length to be factored to be awarded a coin.  Adjusting the difficulty can make mined coins less fungible until they are accepted to the network in which case even if later the bit length is no longer adequate, the coin would still be valid.  The varying requirements only effect newly mined coins being accepted onto the network.  So if your factors currently don't meet the requirements, you can sit on it until the difficulty lowers in which case you can submit it to the network.

Pro's and Con's

DCC clearly has an advantage in price stability, but at the cost of potential loss of fungibility of some mined coins that are still in-process when difficulty requirements change.  Difficulty adjustment can be done at set intervals like monthly or yearly to prevent miner frustration.

Privacy

Bitcoin

In bitcoin everything is transparent but pseudonymous, there is no identity linked to a public key.  However if a public key can be linked to an identity like through using off-chain exchanges, your entire history can be tracked if you are using that one public key.  Ways around this is to own many public keys that are not linked to exchanges and only connected to your other public keys through obfuscated routing of transactions through 3rd party intermediates.  Sophisticated tools could likely still use metadata techniques to figure out what your likely public keys are.

DCC 

In a DCC each coin has a separate public and private key.  Therefore there is no way to link together the keys to which you own without somehow snooping on your off-chain communications.

Pro's and Con's

DCC has much stronger privacy built in.  Mining and sending coins can have 100% unbreakable privacy since it can be done without an internet connection.  Receiving coins requires a node and IP address so thus can potentially be spied on, but much less so than bitcoin.

Vulnerabilities

Bitcoin

Bitcoin's biggest vulnerability is a 51% attack.  This can happen when a miner or colluding group of miners achieve 51% of the hash-power of the network.  When this happens a coin can basically be destroyed at will causing a fork in the chain.  Non-colluding miners can be prevented from mining and transactions of non colluding actors can be stopped.  It is basically a hostile takeover.  It can also be done in secret.

There is nothing that can be done to mitigate this risk.

DCC

A DCC is vulnerable to a large group of bad colluding nodes that will accept your private key change request, but later reverse it in order to double spend the coin.  This would happen on a transaction by transaction basis and cannot effect the network as a whole unlike the 51% attack on bitcoin.

This can be mitigated by reporting your key change to nodes that are trusted, either by experience or by them having staked coins.  Bad nodes that reverse transactions can be blacklisted from the network and their staked coins erased.  Nodes are disposable, and having a fork in the nodes does not effect the security of the coin unlike bitcoin.

Pro's and Con's

Bitcoin has the lead here for casual everyday transactions being more secure.  There is forced consensus on bitcoin whereas in a DCC the consensus is voluntary.  Node software would likely have to undergo constant research and development to develop protocols that make the network as consensus attaining as possible complete with incentivizing good behavior and punishing bad behavior.

DCC has the lead here for no "Currency destroying" vulnerabilities like the 51% attack.  Many altcoins have died due to 51% attack, and it is only a matter of time to bitcoin also succumbing.

1.02.2021

Toppling the Blockchain: A prime factorization, digital collectible based currency

Archives: Wayback, Archive.is

Bitcoin talk and Archive and Another

The blockchain is top heavy.

The chain can restructure and can throw off the previous awards.  This is why many confirmations of a transaction are needed, to limit the possibilities of a chain restructuring throwing a wrench in your transaction.  This slows down transactions.  China could be secretly mining bitcoin off-chain right now as we speak, and a year from now send their blockchain and destroying all transactions in the last year for example.  This system is flawed.

Also in current cryptocurrencies, only one person can win coins every 10 or so minutes, and therefore they need to be easily tradable.  But what if everyone could earn coins on their own relatively quickly, and even allow for mining offline? (offline mining).  In this idea the miner could always be offline, the only person that needs an internet connection is the person a miner is transferring coins to.

No transactions on-chain.

The secret is that we don't need transactions.  We don't have to facilitate the transfer of the value.  All we need is something (a ledger) that keeps track of which public key owns a coin.  In order to trade the crypto, you wouldn't send the coin to another public key, you would just give the person your private key to the coin.  

First you can prove you own a coin by signing a transaction using your private key to verify you own the public key that owns a coin.  Then someone can give you a product, and you can then give them the private key.  See below heading of "Preventing double spend" for how double spending is prevented in this system.

You could send the private key to another person using encrypted communication, Bluetooth, the mail, verbally, etc.  This is fine because you can have one coin per private key if you want, that way if you want to send someone 10 coins, you just send them 10 private keys.  Or you can assign 10 coins to one key if you want.  It doesn't matter.

Prime Factorization

In our case a "coin" is a prime factorization of a certain length number.  For "coins" to be fungible, the length of number shouldn't change throughout the life of the cryptocurrency.  However there could be a roadmap where every year or month or something you have to factor one more digit number.  So the first year for example would be 300 digit numbers, second year would be 301 digit, or something like that.  

For example we can choose 300 digit numbers, and your prime factorization must be of a 300 digit number that is created, in part, by hashing your public key.  If it was just any random 300 digit number, it would be too easy because you wouldn't have to factor the number to create the prime factorization, you could just multiply random prime numbers together until you got a composite number of 300 digits.  By requiring using the public key hash, it forces you to actually factor a number.  We can also require that the number be odd and that there can be no prime factors greater than 1/2 the length, so no factors bigger than 150 digits.  This negates any "easy to factor" numbers.  We can also stipulate the first and last digits cannot be zeroes to also prevent someone from just searching for easy to factor numbers by adjusting their nonce.

The distributed ledger would look something like this:


Public Key:                                 Nonce:                            Prime factors:                      

H45JY4O9LCVW5G                 346573                            3, 3, 3, 5, 5, 11, 17...                    

JW45OLGU792POQ                 648293                            3, 3, 5, 5, 5, 17, 19...                                                    578208                            7, 7, 11, 11, 13, 17...

NW34KIW87MN24                  825401                            5, 5, 17, 19, 19, 23...                       


The prime factorization represents the prime factors of a compound number that is 300 digits long.  By just multiplying together all the prime factors you can verify that it gives a 300 digit long number that is the product of hashing the given public key with the nonce.  This nonce can be anything and can be selected by the miner randomly.  The public key also can be created by the miner as a hash of their private key and would have to fulfill requirements like types of characters used, length, etc. The number to factor (given as the hash of the nonce and public key) can be greater than 300 digits (preferably using Skein 1024), and truncated down to it's first 300 digits.

Notice that the public key "JW4..." owns 2 coins.  This can be done, but is discouraged.  It is best if each key only owns 1 coin so that you cannot link multiple coins to the same person.  However it is valuable for staking as described in the "staking" section below.

Updating the network of nodes

So say someone sends a message to the network that they just factored a 300 digit number.  They send their public key, the nonce, the prime factorization, and a signature that verifies they own the private key to the public key (that last step is optional, some may want to mine for others public keys without knowing the private key, however making sure the miner owns the key might be best to prevent slavery).  

Now, as a node maintaining a ledger, here is what you do to verify.  You hash the public key with the nonce and truncate to get a 300 digit number.  Next you multiply all the prime factors together and verify it equals that 300 digit number.

If everything checks out, you add a line to your database that says this public key owns this prime factorization; basically that the public key owns a coin.

Preventing double spend

Double spend is one of the only viable ways I can think of to attack this network.  However it really isn't hard to overcome it.

When a transaction happens and the miner wants to send the coin they just mined to compensate someone, they send that person the private key to that coin. Now, what is to stop him from sending the private key to multiple people at once?  Or what is to stop them from remembering (copying) the private key so they continue to have access to it?  

Well, we need another step where the receiver can ensure that they are the only one who has the key. When the recipient receives the private key to the public key, she immediately sends a new message to the network, signed with the current private key (that the giver still knows), of changing the public key to a new number.  She would hash the current public key with her newly chosen private key (that the giver does not know), and a nonce if desired; creating a new public key that the previous owner can no longer claim. A "paper trail" would be kept by the network of what the original public key was, and what it was changed to.  The original public key would need to be always kept so the prime factorization could always be verified.

Bad Nodes

Bad nodes are the only other way that I can forsee an attack on the network.  The way it would work is a bad actor would make a bunch of nodes (not trivial to get many public ip addresses).  Next they would send a coin, the reciever would change the public key of the coin using a new private key, the reciever now thinks they own the coin and give the bad node person a product.  But now that the bad node has the product, they could delete the entry that said the public key was changed.  Or they can create a fraudulent transaction to replace the real transaction that changes the public key to something they themselves have a private key for instead.  This is a double spending attack as well.  This attack can also be done in bitcoin.

So to get around this it might be necessary to not only ping a dozen random nodes that the trasaction has been verified before handing over the product.  You would likely do that but also ping some "trusted nodes" that you know have been honest before.  Also the staking thing below could help determine trusted nodes.  If a bad node is found out, they can be labled a "bad node" and be blacklisted (and their staked coins blacklisted and lost).

Staking


Another thing that could be done is staking, basically a node can be required to sign for (prove ownership of) several coins to make sure that his node has coins staked to its public key, which might increase good behavior.  If there is bad behavior those coins can be mutually deleted from everyone else's ledger.  In this case it would make sense for all the coins to be under one public key, so if that node ever gets blacklisted, coins from that public key would be deleted from all ledgers.  Staking could be optional, and nodes with more at stake, could be rated more highly by people's software wallets.  The higher rated you are, the more people will trust your ledger.

Why run a node?


In bitcoin, not many people run nodes.  Usually only miners run nodes and that is so they can mine.  Mining is basically what incentivizes people to run nodes.  But another reason in bitcoin to run a node is so that you can add transactions to the network.  You have to be running a node connected to the network to send it transactions.
 
In our case, you also need to be running a node to send a transaction to the network.  However you do not need to be running a node to either mine nor send a person a coin.  The only person that needs to have a node running is the person receiving the coin, so they can change the private key via sending a message to the network.

Also donations can be another reason.  If a person is a well respected node, then people could potentially donate coins to them.  Also if a bad node tries to "take back" the coins they gave you, you can alert a trusted node of this and they can help you take back your coins by showing their timestamp for your transaction was before the bad nodes fraudulent transaction.  A good node going to bat helping you recover your transaction might tend to get them tips.

More ideas on incentivizing good nodes would be welcome.

Benefit: "instant" transactions


The transactions are not perfectly instant and they also need an internet connection to confirm by the receiving party,  however they are as fast as possible.  There is no waiting arbitrary lengths of time (blocktimes) for confirmation, you simply send the transaction to the network, then ping the network to make sure it verified and implemented your transaction.  You would likely ping a dozen random nodes or some trusted nodes to make sure they got your transaction. Nodes would likely also ping each-other to make sure their ledgers are all in agreement or dispute discrepancies.

Benefit: improves encryption security 

One benefit to this design is this ledger would be a list of however-many-digit compound numbers, which will narrow down the search for primes in this space, and these primes used to create more secure encryption.  If someone does find a 300 digit prime number, that could certainly be used as a type of coin as well, but those are much less asymmetric, meaning that it is easier to check number for primality than to factor them, and also they are much slower to verify they are prime than multiplying together prime factors.  So unfortunately for this coin design, primes would likely not be useful.  However perhaps another coin can be designed that uses prime numbers exclusively and you can send the primes you find to that network instead.

Another extremely valuable benefit to this coin design is in determining safety of various length RSA numbers.  RSA numbers have had a bounty on them to see if anyone can factor them, to track how safe RSA numbers are for encryption.  These bounties offered large sums of money to see how big of a number could be factored with current technology.  Instead of offering bounties, researchers could watch this coin and get a real-time gauge of how safe RSA numbers are for cryptography in the wild for free; an extremely valuable service.

References:

B-Money

BitGold 

Bitcoin

(Note: I was only familiar with bitcoin white paper before formulating this idea, but it finds an almost identical design as b-money, and solves a few of it's questions.  Also the notion of "digital collectible" is similar to how BitGold defined it.)

Cypherpunk history This history states that b-money is vulnerable to Sybil attacks, which it is by making each node get one vote, but it did include the staking of coins to run a node which dis-incentivizes this.  In our protocol, each node is not equal and does not get an equal vote, trustworthy nodes would get more vote than others based on the choice of which nodes the person sending a coin uses to verify their transaction.  Staking in our design is a voluntary and variable and the users of the coin are the ones who vote on which nodes are trustworthy by who's ledger they trust.

I have been following the digital renminbi and think this would be a good decentralized competitor.

Topplcoin, toppl, topplecoin, restcoin, restfulcoin, flatcoin, off-chain, offcoin

12.14.2020

Dr. Creep is a Mason and predicted the world we live in 2020

Even I have a hard time believing the level of planning and forethought that went into the Plandemic of 2020.

Previously I thought that CodeVid was started in November 2019 (which lines up with this) because that was when the Coronavirus patent was finally approved (November 2019).  I figured they were planning on launching it whenever that patent was approved.

However that seems to have been shortsighted.   It seems they were planning on coronavirus pandemic in 2020 since at least 2013.  Who is "they"?  It appears to be the Masons.

Here is the video time stamped to where he says "Coronavirus 2020 bodies stacking"


Let's look at the Dr. Creep lyrics from 2013.  I will bold important predictor parts, current future parts in red.

Song Title: Pandemic

“They always start with a kind of storm, you know, a powerful storm. And there's always this dark, thick rain, like fresh motor oil…The storm started and something happened. His face, his eyes were different”

EXCERPTS FROM FILMS AND VIDEO FOOTAGE:

“By the time they tried to evacuate the city it was already too late. The infection is everywhere”

DR. CREEP:

Produced by BLAQ MASQ

The Virus is harvesting
What do you mean H7N3?
Begin life in a lab in the first war of vaccines
Million die in the first week in the pandemic dreams
Reality, black death, smallpox, mutated disease
Flu-shot propaganda for all population and troops
Avoid the plague, it might have seeped into the room
It's now airborne with firestorm
Signal our doom
The dead returns with a pissed off zombie mood
The sprinkler system equipped with AuAg
Where they round up survivors? In a cold facility
Watch the process of terror from the hill near the stream
I remain in a gasmask
I still filter my water clean
This isn't past tense or the plague of Athens
Couldn't be eradicated like smallpox in action
Avian influenza in the jetstream is how it happens
2020 combined with CoronaVirus, bodies stacking

EXCERPTS FROM FILMS AND VIDEO FOOTAGE:

“The world is now at the sight of the influenza pandemic”
The State is rioting, using the street outside. It’s coming to your windows
Sequence the virus and determine its origin
“It was a virus”
“Something in the blood”
A virus which should be engineered at a genetic level to be helpful rather than harmful”

SCRATCHES BY DJ MADHANDS (X2):

“This is sick like disease and can't be cured
“Few that remain that became stained with the bloodshed
“When the smoke screen fades”
“Death disease”
You feel a burning sensation
“Nothing remains”

LONE NINJA:

You have to act fast
Grab your gas mask
Bad disaster has passed
Anarchy, cataclysm
Stand guard please

Blast your big guns
Havoc's begun
Viral outbreak
Tragic things done
Crowds renounce faith
Atrocious horror witnessed
Broke the hopes of optimistic
Scope is post-apocalyptic

Lone is harsh and vicious, gross and darker
Throwing darts blow apart the wicked
Foes know I'm sadistic
Cold, my aura is sick
Soldiers start resistance
Enemy troops in NBC suits
We shoot, then we regroup
Conquer weak with armed fleet
Bomb the streets with Dr. Creep

EXCERPTS FROM FILMS AND VIDEO FOOTAGE:

The scientific criteria for an influenza pandemic have been met”
“You need a doctor to tell you that”
“This virus is human”
Radio stopped broadcasting. There were reports of infection in Paris and New York”
The army blockades were overrun
“What scientists know about this newer strain…
“Decided to raise the level of influenza pandemic alert

 -----------------------------------------------

My comments:

Notice the "windows" part and "smoke screen".  Remember in Portland CHAZ where cops threw chemical gas bombs and people complained it got into their windows?

It starts with a storm.  This is a reference to the Q movement.

 This says that the virus is in the jet stream (sprayed in chemtrails) which is what I have predicted on april 6th (see bottom of post).

Also important to note the goal of all of this is to kill all religion and have the New World Religion which is controlled by the New World Order.

Weaponized Influenza is next, it is waiting in the wings.

Next song to analyze

-------------------------------------------------------------------

Song title: Planet 2020

DR. CREEP

Excerpt from film "Conan the Barbarian" (1982):
Fire and wind come from the sky, from the gods of the sky
Fire and wind struck down these giants, and in the darkness and chaos

Verse 1:
The war drums poundin from historic mountains
Move toward one challenge, reported immortal owlmen
He afforded some talent, 2020 assorted balance
War soldier gun manage every move recorded is standard
Erase blood spilled by gallons, talons rip through drones
Gods never flew low near the ground where the food grows
Controlled lands but move slow, a new world but who knows
They sold plans to 2 pros and old demands that new froze
Humans chose star wars weaponry in staged events
You stay asleep, they in place, to win gotta face the wind
No death outta make 'em live, chemical cave you went in
Light and dark mason gives torture and blame the men
3rd phase is sent, empire strikes back
I send fire and hype tracks, REVOLUTION invites mass
Confusion when lights crash, night vision-supplied mask
The wolf replies fast, add expenses to my stash

Scratches:

Verse 2:
Ancient orders, a predesigned future, no clear vision
Kings create and stear religion, make you fear the system
Storm trooper gear of minions, they premiere precision
World war near collision, a severe decision
Appear with equipment, attack with surprise
More than rap and a rhyme, they're trackin your mind
Machine crackin your spine with no tappin a line
Genocide without battin an eye, DNA barter for life
I carry critical insights and bloodlines of presidents
Warfare residents from strikes on fake evidence
Write a new testament, nuke over night make sediment
The AI hunts the rest of men, destroy, don't question them
We avoid the strikes to live, thrive in hell's winter
Or stop the bomb, deliver with sacred spell benders
Fight or your garden withers, unload shells on sinners
Sights on a modern Hitler, death toll excel the figures

Ok so a lot there.  Firstly I want to say that using "mason" and "new world" and "owlmen" means I know this guy is an insider Mason who has heard these plans before they happened.

"Gods of the sky" refer to alien invasion, which they will use to help usher in the new world order. Also the cover of this album is an alien invasion.

Genocide, trade your DNA for life.  Basically this predicts the vaccine will change your DNA and you have to get it if you want to avoid the genocide.

Those without it will be hunted by AI and you have to avoid the strikes to survive.  

"Hell's winter" refers to the Grand Solar Minimum and mini ice age we are now in. Hell's winter will probably be in 2024 when a volcano blows causing a "year without summer" and a "hell's winter"

"Sights on a modern Hitler", "death toll excels the figures" refers to an Antichrist, coming to America likely in 2024.  The beast is xi jinping of china and the antichrist will usher in the beast system.  I have predicted that the death toll of this worldwide genocide will be greater than NAZI Germany.


12.07.2020

I got banned from twitter

 I refuse to give twitter my phone number (I don't have one anyway) in order to "reclaim" my account.  I never signed up with one, if they really wanted to contact me they would use the email that's on file.  This isn't about that.  They want me off.  This also happened to my facebook with over 1000 followers, they required a government ID to reclaim my account.  Well I don't negotiate with terrorists.

So if you are reading this you might have found that my twitter "@naturehacker1" is gone.  I don't expect many to have noticed, but maybe if there are one or two of you, sign up for the email list to the right side of this page and feel free to send me an email at any time at teefpowder2.0 at gmail.  Thank you.


What happened to Assange will be the model they use against all of us who speak out.

11.23.2020

REPOST: How to create a crowdsourced and gamified search engine

Original archive link

*This blogger is hosted by google and they literally scrubbed this page from my blogger and the internet!*

Google... they have an utter and seemingly unbreakable monopoly on search.  The only problem is that no one seems to care that much.  Just as long as we can maintain some sort of anonymity, perhaps just not log in when you search or using private browsing we think it is good enough.  Besides search is boring and no one wants to waste their free time thinking about how to make a better search engine.  None of the encrypted or anonymous search engines seem any good.  And they aren't.  But the thing that we have to realize is that neither is google.  Amazing search we have never experienced and we have no idea how amazing it can be.  Keep reading and you will learn how to achieve a search engine that not only gives you literally double the results you are looking for but also instantaneous new content that would take google days or weeks to finally get searchable.


Google is like Encarta.  It seemed amazing when it was in its heyday but once Wikipedia and its billions of pages came around did we realize how limited Encarta really was with its mere tens of thousands of entries.  Google is slow.  Google is incomplete.  But how can this possibly be?  Well the internet isn't just automatically searchable.  Everything that you search has to be indexed by web crawler bots.  Every search engine has to hire these bots to start finding things on the internet for them.  These bots feed website data to a sites database and it is the database that google searches in 0.0002 seconds, not the internet itself.  So if googles bots don't harvest website data far in advance of your search, then you won't find anything.  

Now this web crawling is tough business.  Everyone thinks that the "secret sauce" of google is it's search algorithm.  Basically what that is is the rules of how google orders relevant search results.  This isn't it.  The algorithm is easy.  An algorithm isn't even really needed at all, a simple boolean search is even more powerful and will help you find what you want even better.  So why is google better then?  Its the web crawlers.  Other search engines simply don't have as much content in their database to search compared to google.  So it isn't about algorithm at all, it is about botting.  Google has the botting power.  They likely spend billions of dollars a year in resources to fund their massive constant web crawling campaigns to map out the web.  But like I said this isn't nearly enough.  To really do it well would cost trillions of dollars a year.  And you wonder why yahoo gave up and just uses bing results?  it wasn't because they were too stupid to come up with a good algorithm, they simply couldn't keep up in the botting arms race.  Bet you have never heard of any of this have you?  The industry keeps this a closely guarded secret.

Google only searches about 40-70% of the internet and not only that but their search results are days to weeks old and don't take into account recent website changes.

So how could google possibly improve?  They can't put enough ads on their results to get trillons of dollars a year (but boy do they try!  Half the page is ads now!).  If Google can't even do it then how on earth can anyone compete when all they have is a single bot that will take thousands of years to index the whole web?  Easy.  Crowdsource it.  No one could have imagined competing with encarta and their tens of thousands of articles, especially with no money and no manpower.  But along came Jimmy Wales and he upended encarta overnight by just providing people with one thing...a blank page.  He called it wikipedia.  And with no money and no man power the collective beat out the monopoly...and beat them in spades.  So badly it put encarta out of business for good with no shot whatsoever.

So how can we crowdsource a search engine?  How can we encourage people to use their botting power to help us?  Ever heard of bitcoin?  Bitcoin rewards people for using their botting power to scramble data and verify transactions.  The scrambling data thing always made me curious why all these trillions of dollars in botting resources were being used to mess up data when they could have them do something useful.  But if Bitcoin were created by the NSA for example then the NSA could be using all that bot power to be a digital paper shredder for all the spying they are doing on us, to cover up their tracks.  Or mabye the global banking cabal is using bitcoin scrambling data to cover their tracks when trillions of dollars go missing from the US or Federal reserve or one of their other assets.  There is a reason Ron and Rand Paul have never been able to audit the Fed, we don't own the Fed the Fed owns us.  Borrower is slave to the lender.

Anyway the answer is simple, reward people with bragging rights: give them a unique code for crawling the web for us and contributing their findings to an open source database.  It is kind of like a digital trophy.  They can use a php form to submit url data entries to our database themselves.  When you are having millions of people contributing it must be open source, people aren't going to work for you for free, they are only working for themselves.  For the pride of getting their findings in an open source search engine and/or gain a digital trophy to brag to their  friends with.  One way to have a database open source is to perform hourly or so database dumps and have those available to the public to download.  That way their can be competitors with mirror search engines that will have virtually the exact same search results as your search engine they are just an hour or so behind.  Also these mirror search engines can fork off if they want.

So how do we make this work?  Here is my take but there can be other ways.  Once a user submits a URL and associated metadata and/or full text index; a couple things need to happen.  First we need to verify that the url they are submitting isn't already in our database.  If it isn't then we check to make sure their submission is correct (we need to crawl the url ourselves and double check) and then we can let their submission stand (and generate them a shortened url for that url, we will get back to this).  Or if the url is in the database already then we need to see if the current entry is exactly correct.  If it is not exactly correct (which means the site has been updated) then we need to verify that the new submission is exactly correct then we can let it stand.

Once this is done a new shortened URL is given back to the person who just now submitted it (which means the original url contributor is now cut off from the future of the entry...or their submitted data is tied to a historical snapshot of the site) as well as a passkey to access the digital trophies that the shortened url generates.  All traffic generated by the search engine that pertains to that url will go through the shortened url.  This means we can track how much traffic is generated.  For every so many hits then you can award that person so many trophies.  For example every 1000 hits they get 1 Glow trophy OR for 10 hits they get a gleam trophy.  For example they could choose whether to cash out 30 hits for 3 Gleam trophies or keep saving up for a Glow trophy.  You could encourage people to not cash out until they get a Glow by saying if you get some lesser number of hits say 750 or 900 they can get a Glow trophy.  Yet they could convert thier glow trophy for 100 gleam trophies effectively helping them reap a greater profit.  To claim the trophies they login with their shortened url and passkey and can see how many trophies they have earned and can claim them by viewing them.  Preferably they would have their own spreadsheet of all their shortened url's and passkeys.  When they login to any one of their shortened url's they can click "view trophies" the trophies are created but you can only view the codes temporarily.  Once they view their trophies the codes quickly disappear from sight so the person must copy them and paste them in a document like a spreadsheet that they can save.

You could request that the password (passkey) of the shortened url be changed (and emailed OR viewed instantly) if you know your current passkey.

A trophy is simply a key code.  It doesn't have an account or necessarily a person it belongs to.  It is just a trophy.  Someone could perform a random key change for their digital trophy's code if they don't like the look of their current trophy code (or batch of trophies) if they want and have the new one emailed to them OR viewed instantly.

Alternatively you could make your reward just be a form of forum currency for people to swap that they are not allowed to do any RMT (real money trading) with.  Or you could make a cryptocurrency like bitcoin.  But personally I just like the simplicity and elegance of a digital trophy, it just works.

Now that could work.  The only problem is that it seems there is a lot of double checking that needs to happen.  While this is leveraging the botting power of the internet and our double checking effort should be insignificant compared to the enormous difficulty of finding new URL's, it still requires a lot of work.  Perhaps we could leverage millions of dollars worth of botting power to be as effective as trillions of dollars worth but still we don't have millions of dollars.  What we could do is just allow people to have free edit over the database.  I don't want to make wikipedia's mistake by allowing anyone to delete stuff, so I think it should be 'add only'; each person "owns" the url they added to the database and only they can edit the associated metadata/full text index.  They would get trophies for the traffic their url generates so it is in their best interest to keep the entry updated so they generate as much traffic as possible.  Alternatively we could go full wiki and allow people to only add url's and not delete them but allow anyone to change the associated metadata/index.  Now it would be hard to give trophies for anything in this scenario because if the person who submitted the url (analogous to the person who created a wiki page on Dwight Schrute) is given trophies for how many hits they get, it would be in competitors best interest to saboutage the metadata/index for that url so they can reduce the amount of trophies the url submitter is earning.  But it could still work by allowing people to submit entries for free and get rid of trophies like wikipedia does.

Alternatively we could stick with the method of only the person who submits the url can change the data associated with that url.  Then we could allow people to petition to claim a url someone else already claimed by proving they actually own the url themself.  Also they could petition to claim the url by proving the current data in the database associated with the url is innacurate or significantly outdated for more than a week or so.  These two scenarios are pretty much the same, the person could prove they own the url by changing the page's metadata and showing the current entry is outdated.  They could document that at a certain datetime the metadata of a page is different than the current search result in the search engine.  If the true owner of the url is booted by letting their database entry become outdated, they can reclaim the url again by proving they own it again. This will keep people on their toes and continue to update the database as the site is updated.

The key will be for people who don't actually own the domain but own the current entry in the search engine; to cash out their trophies as soon as possible so that if the true owner claims it they have already taken out all the trophies.  Otherwise the new owner will be able to gain all the trophies the previous owner earned.  It can be kind of like a game to raid and gain trophies.  It is gamification of a search engine.

In any of those cases when someone else proves that the current owner of the url entry isn't keeping it accurate, then the shortened url associated with the url would be changed - and the passkey to access the shortened url's unclaimed and future trophies would also be changed and given to the new person who is now the new owner and sole editor of that entry.

I think that latter case is the best case for us right now.  It is a little sad that only one person is allowed to update an entry; but unlike wikipedia where articles can be miles long; this is just metadata and/or a full text index which are more objective and verifiable facts.

Stay tuned for more discussion on this topic and find the "follow by email" box on this page to get an email whenever I post new content.  Thanks!  
-NatureHacker