How to Generate Bitcoins from Your Home Computer

Looking on Linkedin, Fidelity is hiring Bitcoin miner engineers. Doing some further research it turns out they are hosting miners with a big colocation start up building mines around the us. First colo is 300mw and I think in Georgia. The job listings here are for other cities. Very cool.

Looking on Linkedin, Fidelity is hiring Bitcoin miner engineers. Doing some further research it turns out they are hosting miners with a big colocation start up building mines around the us. First colo is 300mw and I think in Georgia. The job listings here are for other cities. Very cool. submitted by BitkingRoss to Bitcoin [link] [comments]

A U.S. court has found an ex Microsoft software engineer guilty of embezzling millions of dollars and turning it into Bitcoin. The defendant is said to have defrauded Microsoft out of a total of $10 million, according to a statement from the Department of Justice.

A U.S. court has found an ex Microsoft software engineer guilty of embezzling millions of dollars and turning it into Bitcoin. The defendant is said to have defrauded Microsoft out of a total of $10 million, according to a statement from the Department of Justice. submitted by fomotrade to EOtrade [link] [comments]

Bitcoin Clowns: Engineer-Turned-Award-Winning-Novelist, Vann Chow, Penned the World's First Action-Packed Crime Fiction About Bitcoin and Cryptocurrency

Bitcoin Clowns: Engineer-Turned-Award-Winning-Novelist, Vann Chow, Penned the World's First Action-Packed Crime Fiction About Bitcoin and Cryptocurrency submitted by prnewswireadmin to prnewswire [link] [comments]

Remember when reddit hired a "cryptocurrency engineer" and we made fun of how stupid that was? Turns out he spent the entire duration of his employment working on a port of Bitcoin to JavaScript. He has since been fired.

submitted by dhamster to circlebroke2 [link] [comments]

Controls Engineer salary structure (no amounts talk please)

Hey there ya'll,
I recently started with a company as a controls engineer earlier this year. I've never held such a position, and I don't know very many people that do or worked with any in the past. Thus, I don't have much of a data pool to reference when it comes to expected benefits or salary structures.
In my job description I'm more of a "C&I" and I'm often referred to as such by those I'm working with or for. It's a European company that has just stepped into the NA market for their products (and plan to expand). We work primarily with Siemens PLCs, making all major program/HMI changes necessary for the function of the plant for now and the future. We also commission the equipment our company wrote the programming for. We dabble a little in other software needed to support our equipment (Movitools/Simotion/Lenze L-force engineer to E&H, Vega, etc). We're not exactly required to turn wrenches or physically work on things, but its not beyond our position to adjust sensors, photoeyes, etc in the absence of an electrician to "just get the machine up."
Currently I'm a Salary (OT Exempt) employee. I get no written benefit of COMP time (but our manager is tracking out OT hours to use as comp time), no bonuses, and per HR if we work fewer than 40hrs a week we are supposed to be docked pay. My question to you is: What is your typical salary structure (no $ figures, just if your hourly, salary non-exempt, salary exempt, paid in bananas and bitcoin, etc) and/or what benefits do you receive in your role?
I know there's some freelance guys in here, or traveling guys that work for a central hub to provide controls support. My question though is more for the controls engineers/technicians in a M-F gig. However, other folks in the sub may be curious, so please clarify your role if you answer.
Thank you for your input.
submitted by Mangonesailor to PLC [link] [comments]

Bitcoin mentioned around Reddit: How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine /r/linux

Bitcoin mentioned around Reddit: How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine /linux submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Bitcoin Newcomers FAQ - Please read!

Welcome to the /Bitcoin Sticky FAQ

You've probably been hearing a lot about Bitcoin recently and are wondering what's the big deal? Most of your questions should be answered by the resources below but if you have additional questions feel free to ask them in the comments.
It all started with the release of the release of Satoshi Nakamoto's whitepaper however that will probably go over the head of most readers so we recommend the following videos for a good starting point for understanding how bitcoin works and a little about its long term potential:
Some other great resources include Lopp.net, the Princeton crypto series and James D'Angelo's Bitcoin 101 Blackboard series.
Some excellent writing on Bitcoin's value proposition and future can be found at the Satoshi Nakamoto Institute.
Some Bitcoin statistics can be found here and here. Developer resources can be found here. Peer-reviewed research papers can be found here.
Potential upcoming protocol improvements and scaling resources here and here.
The number of times Bitcoin was declared dead by the media can be found here (LOL!)

Key properties of Bitcoin

Where can I buy bitcoins?

Bitcoin.org and BuyBitcoinWorldwide.com are helpful sites for beginners. You can buy or sell any amount of bitcoin (even just a few dollars worth) and there are several easy methods to purchase bitcoin with cash, credit card or bank transfer. Some of the more popular resources are below, also check out the bitcoinity exchange resources for a larger list of options for purchases.
Here is a listing of local ATMs. If you would like your paycheck automatically converted to bitcoin use Bitwage.
Note: Bitcoins are valued at whatever market price people are willing to pay for them in balancing act of supply vs demand. Unlike traditional markets, bitcoin markets operate 24 hours per day, 365 days per year. Preev is a useful site that that shows how much various denominations of bitcoin are worth in different currencies. Alternatively you can just Google "1 bitcoin in (your local currency)".

Securing your bitcoins

With bitcoin you can "Be your own bank" and personally secure your bitcoins OR you can use third party companies aka "Bitcoin banks" which will hold the bitcoins for you.
Note: For increased security, use Two Factor Authentication (2FA) everywhere it is offered, including email!
2FA requires a second confirmation code to access your account making it much harder for thieves to gain access. Google Authenticator and Authy are the two most popular 2FA services, download links are below. Make sure you create backups of your 2FA codes.
Google Auth Authy OTP Auth
Android Android N/A
iOS iOS iOS

Watch out for scams

As mentioned above, Bitcoin is decentralized, which by definition means there is no official website or Twitter handle or spokesperson or CEO. However, all money attracts thieves. This combination unfortunately results in scammers running official sounding names or pretending to be an authority on YouTube or social media. Many scammers throughout the years have claimed to be the inventor of Bitcoin. Websites like bitcoin(dot)com and the btc subreddit are active scams. Almost all altcoins (shitcoins) are marketed heavily with big promises but are really just designed to separate you from your bitcoin. So be careful: any resource, including all linked in this document, may in the future turn evil. Don't trust, verify. Also as they say in our community "Not your keys, not your coins".

Where can I spend bitcoins?

Check out spendabit or bitcoin directory for millions of merchant options. Also you can spend bitcoin anywhere visa is accepted with bitcoin debit cards such as the CashApp card. Some other useful site are listed below.
Store Product
Gyft Gift cards for hundreds of retailers including Amazon, Target, Walmart, Starbucks, Whole Foods, CVS, Lowes, Home Depot, iTunes, Best Buy, Sears, Kohls, eBay, GameStop, etc.
Spendabit, Overstock and The Bitcoin Directory Retail shopping with millions of results
ShakePay Generate one time use Visa cards in seconds
NewEgg and Dell For all your electronics needs
Bitwa.la, Coinbills, Piixpay, Bitbill.eu, Bylls, Coins.ph, Bitrefill, LivingRoomofSatoshi, Coinsfer, and more Bill payment
Menufy, Takeaway and Thuisbezorgd NL Takeout delivered to your door
Expedia, Cheapair, Destinia, Abitsky, SkyTours, the Travel category on Gyft and 9flats For when you need to get away
Cryptostorm, Mullvad, and PIA VPN services
Namecheap, Porkbun Domain name registration
Stampnik Discounted USPS Priority, Express, First-Class mail postage
Coinmap and AirBitz are helpful to find local businesses accepting bitcoins. A good resource for UK residents is at wheretospendbitcoins.co.uk.
There are also lots of charities which accept bitcoin donations.

Merchant Resources

There are several benefits to accepting bitcoin as a payment option if you are a merchant;
If you are interested in accepting bitcoin as a payment method, there are several options available;

Can I mine bitcoin?

Mining bitcoins can be a fun learning experience, but be aware that you will most likely operate at a loss. Newcomers are often advised to stay away from mining unless they are only interested in it as a hobby similar to folding at home. If you want to learn more about mining you can read more here. Still have mining questions? The crew at /BitcoinMining would be happy to help you out.
If you want to contribute to the bitcoin network by hosting the blockchain and propagating transactions you can run a full node using this setup guide. If you would prefer to keep it simple there are several good options. You can view the global node distribution here.

Earning bitcoins

Just like any other form of money, you can also earn bitcoins by being paid to do a job.
Site Description
WorkingForBitcoins, Bitwage, Cryptogrind, Coinality, Bitgigs, /Jobs4Bitcoins, BitforTip, Rein Project Freelancing
Lolli Earn bitcoin when you shop online!
OpenBazaar, Purse.io, Bitify, /Bitmarket, 21 Market Marketplaces
/GirlsGoneBitcoin NSFW Adult services
A-ads, Coinzilla.io Advertising
You can also earn bitcoins by participating as a market maker on JoinMarket by allowing users to perform CoinJoin transactions with your bitcoins for a small fee (requires you to already have some bitcoins.

Bitcoin-Related Projects

The following is a short list of ongoing projects that might be worth taking a look at if you are interested in current development in the bitcoin space.
Project Description
Lightning Network Second layer scaling
Blockstream, Rootstock and Drivechain Sidechains
Hivemind and Augur Prediction markets
Tierion and Factom Records & Titles on the blockchain
BitMarkets, DropZone, Beaver and Open Bazaar Decentralized markets
JoinMarket and Wasabi Wallet CoinJoin implementation
Coinffeine and Bisq Decentralized bitcoin exchanges
Keybase Identity & Reputation management
Abra Global P2P money transmitter network
Bitcore Open source Bitcoin javascript library

Bitcoin Units

One Bitcoin is quite large (hundreds of £/$/€) so people often deal in smaller units. The most common subunits are listed below:
Unit Symbol Value Info
bitcoin BTC 1 bitcoin one bitcoin is equal to 100 million satoshis
millibitcoin mBTC 1,000 per bitcoin used as default unit in recent Electrum wallet releases
bit bit 1,000,000 per bitcoin colloquial "slang" term for microbitcoin (μBTC)
satoshi sat 100,000,000 per bitcoin smallest unit in bitcoin, named after the inventor
For example, assuming an arbitrary exchange rate of $10000 for one Bitcoin, a $10 meal would equal:
For more information check out the Bitcoin units wiki.
Still have questions? Feel free to ask in the comments below or stick around for our weekly Mentor Monday thread. If you decide to post a question in /Bitcoin, please use the search bar to see if it has been answered before, and remember to follow the community rules outlined on the sidebar to receive a better response. The mods are busy helping manage our community so please do not message them unless you notice problems with the functionality of the subreddit.
Note: This is a community created FAQ. If you notice anything missing from the FAQ or that requires clarification you can edit it here and it will be included in the next revision pending approval.
Welcome to the Bitcoin community and the new decentralized economy!
submitted by BitcoinFan7 to Bitcoin [link] [comments]

Subreddit Stats: programming top posts from 2019-10-22 to 2020-10-21 06:41 PDT

Period: 364.67 days
Submissions Comments
Total 1000 180545
Rate (per day) 2.74 491.84
Unique Redditors 629 34951
Combined Score 1178903 2688497

Top Submitters' Top Submissions

  1. 47468 points, 49 submissions: iamkeyur
    1. One Guy Ruined Hacktoberfest 2020 (3039 points, 584 comments)
    2. AWS forked my project and launched it as its own service (2956 points, 810 comments)
    3. Privacy analysis of Tiktok’s app and website (2858 points, 234 comments)
    4. 98.css – design system for building faithful recreations of Windows 98 UIs (2781 points, 318 comments)
    5. Microsoft demos language model that writes code based on signature and comment (2621 points, 614 comments)
    6. Why does HTML think “chucknorris” is a color? (2565 points, 531 comments)
    7. Windows 95 UI Design (2309 points, 665 comments)
    8. The Linux codebase has over 3k TODO comments, many from over a decade ago (2119 points, 369 comments)
    9. eBay is port scanning visitors to their website (1829 points, 236 comments)
    10. Using const/let instead of var can make JavaScript code run 10× slower in Webkit (1814 points, 525 comments)
  2. 44853 points, 28 submissions: speckz
    1. From August, Chrome will start blocking ads that consume 4MB of network data, 15 seconds of CPU usage in any 30 second period, or 60 seconds of total CPU usage (8434 points, 590 comments)
    2. How To Spot Toxic Software Jobs From Their Descriptions (6246 points, 1281 comments)
    3. A Facebook crawler was making 7M requests per day to my stupid website (2662 points, 426 comments)
    4. Apple, Your Developer Documentation is Garbage (2128 points, 432 comments)
    5. The code I’m still ashamed of (2016) (2105 points, 429 comments)
    6. Slack Is Fumbling Developers And The Rise Of Developer Discords (2095 points, 811 comments)
    7. The Chromium project finds that around 70% of our serious security bugs are memory safety problems. Our next major project is to prevent such bugs at source. (1959 points, 418 comments)
    8. Advice to Myself When Starting Out as a Software Developer (1934 points, 257 comments)
    9. Software patents are another kind of disease (1893 points, 419 comments)
    10. My favourite Git commit (1772 points, 206 comments)
  3. 35237 points, 28 submissions: whackri
    1. It is perfectly OK to only code at work, you can have a life too (6765 points, 756 comments)
    2. Kernighan's Law - Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by definition, not smart enough to debug it. (5171 points, 437 comments)
    3. The entire Apollo 11 computer code that helped get us to the Moon is available on github. (3841 points, 433 comments)
    4. Raytracing - in Excel! (2478 points, 168 comments)
    5. Writing userspace USB drivers for abandoned devices (1689 points, 84 comments)
    6. Drum Machine in Excel (1609 points, 60 comments)
    7. fork() can fail: this is important (1591 points, 264 comments)
    8. Learn how computers add numbers and build a 4 bit adder circuit (1548 points, 66 comments)
    9. Heroes Of Might And Magic III engine written from scratch (open source, playable) (1453 points, 84 comments)
    10. Apollo Guidance Computer: Restoring the computer that put man on the Moon (1277 points, 47 comments)
  4. 14588 points, 11 submissions: pimterry
    1. I'm a software engineer going blind, how should I prepare? (4237 points, 351 comments)
    2. The 2038 problem is already affecting some systems (1988 points, 518 comments)
    3. TLDR pages: Simplified, community-driven man pages (1897 points, 182 comments)
    4. JetBrains Mono: A Typeface for Developers (1728 points, 456 comments)
    5. BlurHash: extremely compact representations of image placeholders (930 points, 159 comments)
    6. Let's Destroy C (855 points, 290 comments)
    7. Shared Cache is Going Away (833 points, 192 comments)
    8. XML is almost always misused (766 points, 538 comments)
    9. Wireshark has a new packet diagram view (688 points, 24 comments)
    10. fork() can fail: this is important (460 points, 299 comments)
  5. 14578 points, 9 submissions: magenta_placenta
    1. Trello handed over user's personal account to user's previous company (2962 points, 489 comments)
    2. Feds: IBM did discriminate against older workers in making layoffs - “Analysis shows it was primarily older workers (85.85%) in the total potential pool of those considered for layoff,” the EEOC wrote (2809 points, 509 comments)
    3. Stripe Workers Who Relocate Get $20,000 Bonus and a Pay Cut - Stripe Inc. plans to make a one-time payment of $20,000 to employees who opt to move out of San Francisco, New York or Seattle, but also cut their base salary by as much as 10% (2765 points, 989 comments)
    4. US court fully legalized website scraping and technically prohibited it - On September 9, the U.S. 9th circuit court of Appeals ruled that web scraping public sites does not violate the CFAA (Computer Fraud and Abuse Act) (2014 points, 327 comments)
    5. I Suspect many Task Deadlines are Designed to Force Engineers to Work for Free (1999 points, 553 comments)
    6. Intent to Deprecate and Freeze: The User-Agent string (1012 points, 271 comments)
    7. Contractor admits planting logic bombs in his software to ensure he’d get new work (399 points, 182 comments)
    8. AlphaStar: Grandmaster level in StarCraft II using multi-agent reinforcement learning (396 points, 97 comments)
    9. Half of the websites using WebAssembly use it for malicious purposes - WebAssembly not that popular: Only 1,639 sites of the Top 1 Million use WebAssembly (222 points, 133 comments)
  6. 13750 points, 3 submissions: pedrovhb
    1. Bubble sort visualization (7218 points, 276 comments)
    2. Breadth-first search visualization (3874 points, 96 comments)
    3. Selection sort visualization (2658 points, 80 comments)
  7. 11833 points, 1 submission: flaming_bird
    1. 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code (11833 points, 956 comments)
  8. 11208 points, 10 submissions: PowerOfLove1985
    1. No cookie consent walls — and no, scrolling isn’t consent, says EU data protection body (5975 points, 890 comments)
    2. Redesigning uBlock Origin (1184 points, 162 comments)
    3. Playing Around With The Fuchsia Operating System (696 points, 164 comments)
    4. Microsoft's underwater data centre resurfaces after two years (623 points, 199 comments)
    5. Microsoft Paint/Paintbrush in Javascript (490 points, 58 comments)
    6. GitHub shuts off access to Aurelia repository, citing trade sanctions (478 points, 81 comments)
    7. How 3D Game Rendering Works: Texturing (475 points, 22 comments)
    8. Simdjson: Parsing Gigabytes of JSON per Second (441 points, 90 comments)
    9. How 1500 bytes became the MTU of the internet (435 points, 60 comments)
    10. It’s OK for your open source library to be a bit shitty (411 points, 130 comments)
  9. 10635 points, 8 submissions: michalg82
    1. Turning animations to 60fps using AI (3449 points, 234 comments)
    2. Bug #1463112 “Cat sitting on keyboard crashes lightdm” (3150 points, 143 comments)
    3. Heroes Of Might And Magic III engine written from scratch (open source, playable) (1431 points, 172 comments)
    4. Vulkan is coming to Raspberry Pi: first triangle - Raspberry Pi (1318 points, 66 comments)
    5. An EPYC trip to Rome: AMD is Cloudflare's 10th-generation Edge server CPU (431 points, 60 comments)
    6. Microsoft cancels GDC 2020 presence due to coronavirus concerns (Following Sony, Facebook, Kojima Productions, Epic Games, Unity, and more) (371 points, 52 comments)
    7. Moving from reCAPTCHA to hCaptcha - The Cloudflare Blog (278 points, 71 comments)
    8. How much of a genius-level move was using binary space partitioning in Doom? (207 points, 109 comments)
  10. 10106 points, 10 submissions: SerenityOS
    1. Someone suggested I should host my website on my own OS. For that we'll need a web server, so here's me building a basic web server in C++ for SerenityOS! (2269 points, 149 comments)
    2. I've been learning about OS security lately. Here's me making a local root exploit for SerenityOS, and then fixing the kernel bugs that made it possible! (1372 points, 87 comments)
    3. SerenityOS was hacked in a 36c3 CTF! (Exploit and write-up) (1236 points, 40 comments)
    4. One week ago, I started building a JavaScript engine for SerenityOS. Here’s me integrating it with the web browser and adding some simple API’s like alert()! (1169 points, 63 comments)
    5. Implementing macOS-style "purgeable memory" in my kernel. This technique is amazing and helps apps be better memory usage citizens! (1131 points, 113 comments)
    6. SerenityOS: The second year (900 points, 101 comments)
    7. Using my own C++ IDE to make a little program for decorating my webcam frame (571 points, 33 comments)
    8. This morning I ported git to SerenityOS. It took about an hour and some hacks, but it works! :D (547 points, 64 comments)
    9. Smarter C/C++ inlining with attribute((flatten)) (521 points, 118 comments)
    10. Introduction to SerenityOS GUI programming (390 points, 45 comments)

Top Commenters

  1. XANi_ (10753 points, 821 comments)
  2. dnew (7513 points, 641 comments)
  3. drysart (7479 points, 202 comments)
  4. MuonManLaserJab (6666 points, 233 comments)
  5. SanityInAnarchy (6331 points, 350 comments)
  6. AngularBeginner (6215 points, 59 comments)
  7. SerenityOS (5627 points, 128 comments)
  8. chucker23n (5465 points, 370 comments)
  9. IshKebab (4898 points, 393 comments)
  10. L3tum (4857 points, 199 comments)

Top Submissions

  1. 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code by flaming_bird (11833 points, 956 comments)
  2. hentAI: Detecting and removing censors with Deep Learning and Image Segmentation by 7cmStrangler (9621 points, 395 comments)
  3. US Politicians Want to Ban End-to-End Encryption by CarrotRobber (9427 points, 523 comments)
  4. From August, Chrome will start blocking ads that consume 4MB of network data, 15 seconds of CPU usage in any 30 second period, or 60 seconds of total CPU usage by speckz (8434 points, 590 comments)
  5. Mozilla: The Greatest Tech Company Left Behind by matthewpmacdonald (7566 points, 1087 comments)
  6. Bubble sort visualization by pedrovhb (7218 points, 276 comments)
  7. During lockdown my wife has been suffering mentally from pressure to stay at her desk 100% of the time otherwise after a few minutes her laptop locks and she is recorded as inactive. I wrote this small app to help her escape her desk by periodically moving the cursor. Hopefully it can help others. by silitbang6000 (7193 points, 855 comments)
  8. It is perfectly OK to only code at work, you can have a life too by whackri (6765 points, 756 comments)
  9. Blockchain, the amazing solution for almost nothing by imogenchampagne (6725 points, 1561 comments)
  10. Blockchain, the amazing solution for almost nothing by jessefrederik (6524 points, 1572 comments)

Top Comments

  1. 2975 points: deleted's comment in hentAI: Detecting and removing censors with Deep Learning and Image Segmentation
  2. 2772 points: I_DONT_LIE_MUCH's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
  3. 2485 points: api's comment in Stripe Workers Who Relocate Get $20,000 Bonus and a Pay Cut - Stripe Inc. plans to make a one-time payment of $20,000 to employees who opt to move out of San Francisco, New York or Seattle, but also cut their base salary by as much as 10%
  4. 2484 points: a_false_vacuum's comment in Stack Overflow lays off 15%
  5. 2464 points: iloveparagon's comment in Google engineer breaks down the problems he uses when doing technical interviews. Lots of advice on algorithms and programming.
  6. 2384 points: why_not_both_bot's comment in During lockdown my wife has been suffering mentally from pressure to stay at her desk 100% of the time otherwise after a few minutes her laptop locks and she is recorded as inactive. I wrote this small app to help her escape her desk by periodically moving the cursor. Hopefully it can help others.
  7. 2293 points: ThatInternetGuy's comment in Iranian Maintainer refuses to merge code from Israeli Developer. Cites Iranian regulations.
  8. 2268 points: xequae's comment in I'm a software engineer going blind, how should I prepare?
  9. 2228 points: turniphat's comment in AWS forked my project and launched it as its own service
  10. 2149 points: Rami-Slicer's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
Generated with BBoe's Subreddit Stats
submitted by flpezet to subreddit_stats [link] [comments]

The Blackmail Email Scam (part 6)

IF YOU RECEIVE A BLACKMAIL EMAIL, PLEASE REDACT THE PERSONAL INFORMATION AND POST IT AS A COMMENT ON THIS THREAD SO THAT OTHERS WHO RECEIVE THE SAME EMAIL CAN FIND IT THROUGH GOOGLE.

BLACKMAIL EMAIL SCAMS ARE ALSO SENT VIA SMS (TEXT) AND PHYSICAL MAIL. REGARDLESS OF THE METHOD, THEY ARE SPAM AND THE POST BELOW GIVES YOU INFORMATION AND ADVICE ABOUT WHAT TO DO.

FIRST THREAD: https://reddit.com/Scams/comments/8gsjba/the_blackmail_email_scam/

SECOND THREAD: https://reddit.com/Scams/comments/9srjen/the_blackmail_email_scam_part_2/

THIRD THREAD: https://reddit.com/Scams/comments/biv65o/the_blackmail_email_scam_part_3/

FOURTH THREAD: https://reddit.com/Scams/comments/dohaea/the_blackmail_email_scam_part_4/

FIFTH THREAD: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/

There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password. The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS.
Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times.
Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.

EXAMPLES

Hey, some time ago your computer was infected with my private malware, RAT (Remote Administration Tool).
I know at the time of infection your passwords was: xxxxxxxxxxx
My malware gave me full access to all your accounts, contacts and it also was possible to spy on you over your webcam.
Sometimes when I was bored I was spying on you, then once you started to SATISFYING YOURSELF!
At first I didn't knew how to react as I was shocked, then I decided to record you, I checked on google and found the software: Bandicam and it did the job.
After that I removed my malware to not leave any traces and this email was sent from some hacked account.
I can send the video of you to all your friends, contacts and publish it on social networks and the whole web.
You can stop me and only I can help you out in this situation.
Pay exactly 740$ in Bitcoin (BTC).
It's easy to buy Bitcoin (BTC), for example here: https://paxful.com/buy-bitcoin , https://www.buybitcoinworldwide.com/ , https://www.kraken.com/ , or google another exchanger.
My Bitcoin (BTC) wallet is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Yes that's how the wallet looks like, copy and paste it, it's (cAsE-sEnSEtiVE)
I give you 3 days time to pay.
As I got access to this email account, I will know if this email has already been read, so the time is running.
After receiving the payment, I will remove the video and you can life your live in peace like before.
Learn from the mistake and update your browser before browsing the web next time!
I know XXXX is one of your password on day of hack..
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1004.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1GohL1jDz8BapZhohN2Xry6AKPq6PiJrjw [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too.
I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on.
Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
I know xxxxxxxxxxxx is one of your password on day of hack.. Lets get directly to the point.
Not one person has paid me to check about you.
You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you.
Best solution would be to pay me $1013.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1KzA7GYSyvXCmPpojZ4qTbZGmjjbbSfwBg
[case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Lets get directly to the point.
Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1002.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
My -BTC -address: 1JXvEapcRCvywymcrYZ1rcCfLfNZKri4LP [case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends.
it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.
Hello!
I'm the software engineer who hacked into your device's OS.
I've been observing you for months now. The thing is, you've been infected with malware through the adult website you visited.
In case you're not familiar with it, I'll explain. The Trojan infection gives me full access and control over your computer or any other device on your local. It means that I can see everything on your screen, turn on my camera and microphone, but you do not know about it.
I also have access to all your contacts, social networking data and all your correspondence.
Why didn't your antivirus detect any malware? A: My malware uses a driver, I update its signatures every 4 hours to keep your antivirus silent.
I have made a video showing how you satisfy yourself on the left side of the screen, and on the right side you see the video you have been watching. With one click, I can send this video to all your contacts in the email and social networks. I can also publish access to all your emails and messaging apps that you use.
If you want to prevent this, at that point: Transfer $400(USD) to my bitcoin wallet (if you do not know how to do it, then type in to Google: "Purchase a bitcoin").
My Bitcoin Wallet:1EGBGBptS9yKNPYYU9qUEoPNLptee8CEq9
After getting the payment, I will destroy the video and you won't hear from me again. I will provide you 50 hours (more than two days) to pay. I have a notice that you read this email and the timer started you opened it.
Don't attempt to answer me. It doesn't make any sense (the sender's address is generated by random). Filing a complaint somewhere doesn't make sense, because this email cannot be tracked, and neither can my bitcoin address. I don't make mistakes.
If I find that you shared this message with someone else, the video will be distributed immediately. Good luck with that.
And here are some common keywords used in the email so that this thread can be found by people Googling the email:
"Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No‌ p‌erso‌n has co‌mp‌ensat‌ed, very o‌wn vid‌eo‌ cli‌p, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, i‌nstanta‌neo‌usly ‌erase, actua‌l r‌eco‌rded ma‌t‌eri‌al, n‌egl‌ect this ‌ema‌i‌l, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remo‌v‌e yo‌ur vi‌deo‌ fo‌o‌ta‌ge, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
submitted by EugeneBYMCMB to Scams [link] [comments]

Focusing on building Distribution Channels helped me scale my startup to 7 figures per year. Here's how:

Build Distribution Channels, Don’t Build Products

The number one reason startups fail is because they don’t succeed in getting traction.
In other words, they fail because they don’t succeed in getting enough users or customers for their product or service so that revenues could be greater than expenses.
I know I know, duh, that’s obvious.
But, why do startups fail to get traction?
Most of the time it’s not because the product was bad or the idea didn’t solve a real problem. No, predominantly a startup doesn’t get traction because the founders don’t approach the business from a distribution first perspective. They never spend any time really figuring out how to efficiently get their product in front of their target customer. They don’t invest in building distribution channels.
This brings me to my main point: You should spend most of your time early in your startup’s life building distribution channels, not products.

The Mistake Everyone Makes

You are starting a company.
The reason you are likely starting it is because you have an AWESOME idea for a new product or service that just needs to exist in the world.
Of course, most entrepreneurs who find themselves at this point are going to spend the vast majority of their time and energy on building out their product and turning it into reality.
It makes sense why they would do this. Naturally, the new product and that thing they are creating is what they are so excited and passionate about. The product is what they are in love with. Not the question of, “How are you actually going to get people to use this product?”
So the distribution question gets ignored.
In this circumstance, the entrepreneur is so confident in their idea, and they just know that it will naturally spread like wildfire once they launch it. Why spend any time on marketing when the idea is this good?
The sad truth is that this NEVER happens, and the entrepreneurs who take this approach wind up launching their product to crickets. No one ever finds out about their amazing idea, and no one ever uses their product.
This is the mistake everyone makes. It’s the main reason why so many startups fail.

Distribution First Mentality

To win in business, I think you need to approach every new venture or startup idea from a distribution first mentality.
It should be the question above all other questions when evaluating a new business: “How am I going to get this product or service in front of my target customers at scale?”
If you have a hard time answering this question, then your idea sucks.
You HAVE to have a convincing, plausible, and executable distribution strategy for your product. If you do not, you are doomed to fail along with all of the other entrepreneurs who make the same mistake.
How We Built Distribution First
When starting our cryptocurrency tax software company CryptoTrader.Tax, we started with distribution first.
From the launch of the company, we knew that it was extremely likely that one of the strongest distribution channels for this type of product would be Google Search.
We knew this because we could see that there were THOUSANDS of searches being done on Google every month for questions like, “How to report cryptocurrency on taxes”, “Crypto taxes”, “Is bitcoin taxable”, etc. We used tools like Google Keyword planner, Ahrefs, and Ubersuggest to see keyword volumes on Google.
The distribution channel was the search engine.
So, if we could rank highly on Google for these types of search queries, we’d likely get a consistent flow of users into our website and into our cryptocurrency tax automation app.
It’s that simple. We had an idea for an app, and we came from a distribution first angle: how can we get our app in front of our target customers?
With that question answered, we started focusing on writing high quality content discussing the tax implications of cryptocurrencies. We published this content on our blog, and then focused on getting this content ranking as high as possible in the search results (SEO) for high volume queries like “crypto taxes” and “how to report crypto on taxes”.
Before our product was even complete, we had thousands of people reading our blog content and signing up for the waitlist for an application that would automate all of their crypto tax reporting, a TurboTax-like experience for crypto investors.

Build the Distribution Channel

The examples of wildly successful entrepreneurs who took this same approach and built out distribution channels before launching products are endless.
One of my favorite recent examples is what The Hustle did when launching their subscription informational product Trends. The Hustle is a media company that spent years building a free tech and business newsletter that gets read by millions of people every day (now THAT is a distribution channel). Then, on the back of this distribution channel, they launched a subscription product that helps identify up-and-coming startup Trends for hopeful entrepreneurs.
The result?
Within a year of launch, Trends is making the company tens of millions of dollars.
This is only possible because the Hustle built their distribution first. They can now reap the benefits of owning that distribution in dozens of ways—including launching related products to their audience and making millions.

Conclusion

Spend more time thinking about how you’re going to effectively distribute your product over how you are going to build it. Better yet, build the distribution channel before the product is ever even live. Your chances of success go up exponentially.
If you want to learn about more scrappy marketing tactics that will add jet-fuel level growth to your business, you should subscribe to my email list below.
I blog about all of my marketing tactics that I am using to build my businesses, like the time I made $13,000 by growth hacking Instagram. I then email out all of my best tactics and ideas directly to the people on my email list.
I’ll see you in the inbox!
Original article: https://davidkemmerer.co/distribution-channels/
submitted by stratguy56 to Entrepreneur [link] [comments]

What I currently use for privacy (after almost 2 years of long investing into it)

First of all, my threat model: I'm just an average person that wants to AVOID the maximum I can to be monitored and tracked by the government and big corps, a lot of people out there REALLY hate me and I've gone through lots of harassment and other stuff, I also plan to take my activism and love for freedom more seriously and to do stuff that could potentially lead me to very high danger or even put my life on the line. That being said, my main focus is on something that is privacy-friendly but also something with decent security (no point having a lot of privacy if a script kiddie can just break into it an boom, everything is gone) anonymity is also desirable but I'm pretty aware that true 100% anonymity is simply not possible and to achieve the maximum you can of it currently you'd have to give up A LOT of stuff in which I don't think I really could. So basically, everything that I said + I don't want to give up some hobbies of mine (as playing games etc)
Here's what I use/have done so far, most of it is based on privacytools.io list and research I've done.
Mobile:
Google Pixel 3a XL running GrapheneOS
Apps: Stock apps (Vanadium, Gallery, Clock, Contacts etc) + F-DROID, NewPipe, OsmAnd+, Joplin, Tutanota, K-9 Mail, Aegis Authenticator, KeePassDX, Syncthing, Signal, Librera PRO, Vinyl, Open Camera and Wireguard.
I also use BlahDNS as my private DNS.
Other smartphone stuff/habits: I use a Supershieldz Anti Spy Tempered Glass Screen Protector on my phone and I also have a Faraday Sleeve from Silent Pocket which my phone is on most of the times (I don't have smartphone addiction and would likely advice you to break free from smartphone addiction if you have it). I NEVER use bluetooth (thank god Pixel 3a have a headphone jack so yeah, no bluetooth earphones here) and always keep my Wi-Fi off if I'm not using it.
Computer:
I have a desktop that I built (specs: Asus B450M Gaming, AMD Ryzen 3 3300X, Radeon RX 580 8GB, 16GB DDR4 2666Mhz, 3TB HDD, 480GB SSD) that is dualbooted with QubesOS and Arch Linux.
Qubes is my main OS that I use as daily driver and for my tasks, I use Arch for gaming.
I've installed linux-hardened and its headers packages on my Arch + further kernel hardening using systctl and boot parameters, AppArmor as my MAC system and bubblewrap for sandboxing programs. I also spoof my MAC address and have restricted root access, I've also protected my GRUB with password (and use encrypted boot) and have enabled Microcode updates and have NTP and IPV6 disabled.
Also on Arch, I use iptables as a firewall denying all incoming traffic, and since it's my gaming PC, I don't game on the OS, instead, I use a KVM/QEMU Windows VM for gaming (search "How I Built The "Poor-Shamed" Computer" video to see what I'm talking about) I also use full disk encryption.
Software/Providers:
E-Mails: I use ProtonMail (Plus Account paid with bitcoin) and Tutanota (free account as they don't accept crypto payment yet, come on Tutanota, I've been waiting for it for 2 years already) since I have plus account on ProtonMail it allows me to use ProtonMail Bridge and use it on Claws Mail (desktop) and K-9 Mail (mobile) as for Tutanota I use both desktop and mobile app.
Some other e-mails habits of mine: I use e-mail aliases (ProtonMail plus account provides you with 5) and each alias is used for different tasks (as one for shopping, one for banking, one for accounts etc) and none of my e-mails have my real name on it or something that could be used to identify me. I also highly avoid using stuff that require e-mail/e-mail verification for usage (e-mail is such a pain in the ass tbh) I also make use of Spamgourmet for stuff like temporary e-mail (best service I found for this doing my research, dunno if it's really the best tho, heard that AnonAddy does kinda the same stuff but dunno, recommendations are welcomed)
Browsers/Search Engine: As mentioned, I use Vanadium (Graphene's stock browser) on mobile as it is the recommended browser by Graphene and the one with the best security for Android, for desktop I use a Hardened Firefox (pretty aware of Firefox's security not being that good, but it's the best browser for PC for me as Ungoogled Chromium is still not there in A LOT of things + inherent problems of Chrome as not being able to disable WebRTC unless you use an extension etc) with ghacks-user.js and uBlock Origin (hard mode), uMatrix (globally blocking first party scripts), HTTPS Everywhere (EASE Mode), Decentraleyes (set the recommended rules for both uBlock Origin and uMatrix) and Temporary Containers as addons. I also use Tor Browser (Safest Mode) on a Whonix VM on Qubes sometimes. DuckDuckGo is my to-go search engine and I use DNS over HTTPS on Firefox (BlahDNS as my provider once again)
browsing habits: I avoid JavaScript the maximum I can, if it's really needed, I just allow the scripts temporarely on uBlock Origin/uMatrix and after I'm done I just disable it. I also generally go with old.reddit.com instead of reddit.com (as JavaScript is not required to browse the old client), nitter.net for checking twitter stuff (although I rarely have something peaking my interest on Twitter) and I use invidious.snopyta.org as youtube front-end (I do however use YouTube sometimes if a video I wanna see can't be played on invidious or if I wanna watch a livestream) and html.duckduckgo.com instead of duckduckgo.com other than avoiding JavaScript most of my browsing habits are just common sense at this point I'd say, I also use privatebin (snopyta's instance) instead of pastebin. I also have multiple firefox profiles for different tasks (personal usage, shopping, banking etc)
VPN: I use Mullvad (guess you can mention it here since it's PTIO's recommended) paid with bitcoin and honestly best service available tbh. I use Mullvad's multihop implementation on Wireguard which I manually set myself as I had the time and patience to learn how.
password manager: KeePassXC on desktop and KeePassDX on my smartphone, my password database for my desktop is stored on a USB flash driver I encrypted with VeraCrypt.
some other software on desktop: LibreOffice (as a Microsoft Office substitute), GIMP (Photshop substitute), Vim (I use it for multiple purposes, mainly coding IDE and as a text editor), VLC (media player), Bisq (bitcoin exchange), Wasabi (bitcoin wallet), OBS (screen recording), Syncthing (file sync), qBitTorrent (torrent client) and Element (federated real-time communication software). I sadly couldn't find a good open-source substitute to Sony Vegas (tested many, but none was in the same level of Vegas imo, KDENLive is okay tho) so I just use it on a VM if I need it (Windows VM solely for the purpose of video editing, not the same one I use for gaming)
Other:
router: I have an Asus RT-AC68U with OpenWRT as its firmware. I also set a VPN on it.
cryptocurrency hardware wallet: I store all of my cryptocurrency (Bitcoin and Monero) on a Ledger Nano S, about 97% of my money is on crypto so a hardware wallet is a must for me.
I have lots of USB flash drivers that I use for Live ISOs and for encrypted backups. I also have a USB Data Blocker from PortaPow that I generally use if I need to charge my cellphone in public or in a hotel while on a trip (rare occasion tbh).
I have a Logitech C920e as webcam and a Blue Yeti microphone in which I never let them plugged, I only plug them if it's necessary and after I'm done I just unplug them.
I also have a Nintendo Switch Lite as a gaming console that I most of the times just use offline, I just connect to the internet if needed for a software update and then just turn the Wi-Fi off from it.
Other Habits/Things I've done:
payments: I simply AVOID using credit card, I try to always pay on cash (I live in a third-world country so thank god most of people here still depend on cash only) physically and online I try my best to either by using cryptocurrency or using gift cards/cash by mail if crypto isn't available. I usually buy crypto on Bisq as I just don't trust any KYC exchange (and neither should you) and since there aren't many people here in my area to do face to face bitcoin trade (and I'm skeptical of face to face tbh), I use the Wasabi Wallet (desktop) to coinjoin bitcoin before buying anything as this allows a bit more of privacy, I also coinjoin on Wasabi before sending my bitcoins to my hardware wallet. I also don't have a high consumerism drive so I'm not constantly wanting to buy everything that I see (which helps a lot on this criteria)
social media/accounts: as noted, aside from Signal and Element (which I don't even use that often) I just don't REALLY use any social media (tried Mastodon for a while but I was honestly felt it kinda desert there and most of its userbase from what I've seen were some people I'd just... rather don't hang with tbh) and, althoug not something necessary is something that I really advise people to as social media is literally a poison to your mind.
I also don't own any streaming service like Netflix/Amazon Prime/Spotify etc, I basically pirate series/movies/songs and that's it.
I've also deleted ALL my old accounts from social media (like Twitter etc) and old e-mails. ALL of my important and main accounts have 2FA enabled and are protected by a strong password (I use KeePass to generate a 35 character lenght password with numbers, capital letters, special symbols etc, each account uses a unique password) I also NEVER use my real name on any account and NEVER post any pictures of myself (I rarely take pictures of stuff if anything)
iot/smart devices: aside from my smartphone, I don't have any IOT/smart device as I honestly see no need for them (and most of them are WAY too expensive on third-world countries)
files: I constatly backup all of my files (each two weeks) on encrypted flash drivers, I also use BleachBit for temporary data cleaning and data/file shredding. I also use Syncthing as a substitute to stuff like Google Drive.
Future plans:
learn to self-host and self-host an e-mail/NextCloud (and maybe even a VPN)
find something like BurneHushed but FOSS (if you know any please let me know)
So, how is it? anything that I should do that I'm probably not doing?
submitted by StunningDistrust to privacytoolsIO [link] [comments]

I just wasted 15 minutes debunking some new hit spreading in COVID-sceptic community, so I share it here, so you don't have to.

One of my conspiracy-theory prone friend has sent me a movie clip and asked what I think about it. As usual, I decided to make a quick research, and it turned out pretty quickly, that I can say something about it. So since I wasted 15 minutes for it, let me write it up for you, so you don’t have to do it.
So what is the movie I am talking about? We see a table in some obscure classroom. Behind it a row of people is sitting, with each of them displaying a tiny country flag in front of them. A lady introducing herself as Elke de Klerk speaks. On behalf of Dutch doctors she informs us, that COVID pandemics is a fake, and that they are going to sue Dutch government for harming people with their anti-pandemics activities, or something. Sorry, I haven’t been listening too carefully.
Instead of that, I put my web search engine for a good use. And this is what I found:
So much for facts. Now, let’s use pure logic and think: what is more probable:
– COVID is a sham, but someone managed to bribe practically every doctor on this planet and thousands of scientist, so they falsify data. Millions of people fell for it, and they believe it so much, that some even get sick or die of COVID-19
or
– someone found a few people related to medical science in this or that way and/or made them to record that clip, in which they tell COVID-19 is a sham, so people oppose the governments, that already struggle with tackling the pandemic, in hope to even more destablization of the politics in the EU, which makes a certain guy in Kremlin happy.
William of Ockham aks if you want to borrow his razor?

To sum it up: the COVID is not a fake. This is just a movie clip spreaded by radical right as a part of their disinformation campaign in hope to destablize European politics even further. Don’t fall for it: as conspiracy theorists will tell you: think for yourself. But be skeptical and critical: check sources of everything before you propagate it further on the internet!

Thank you for your attention. I would not link to right-wing/propaganda sources, so I don’t bring traffic to them. You can find them easily if you want.
If you want to use it, feel free. I also placed it on my blog for convienience (my blog is usually just to put translations of my article on something completely different, so I hope it's OK to link it here for that purpose): https://orynski.eu/fact-check-is-covid-pandemics-a-fake-and-are-dutch-doctors-about-to-sue-their-government-for-it/
submitted by Zenon_Czosnek to SGU [link] [comments]

What I see when I see a student with ADHD

I have ADHD.
I was diagnosed at age 12. What happened is I got to middle school, and my life fell apart. It came on like a typhoon. Things seemed alright as I started, but I still remember that October when my family went to sixth-grade check-in.
My twin sister went first. The meeting lasted about four minutes. She and my parents left with smiles all around and talk of getting In N Out on the way home. Then it was my turn.
Every teacher I had stood in a circle. They seemed...different. One by one, they went around and told me that I was shit. Some were nicer than others, but everyone had the same message to convey:
Doesn't complete his homework all the way
Distracts others trying to learn
Unable to follow along in class
Not sure if he can keep up
I then heard my grades: C-, D+, C+, A in PE, C, and an F in Social Studies.
I don't remember being ashamed or embarrassed or anything. I remember being confused. I had gone to school every day and tried hard and thought I was doing what the teacher asked. Nope. Guess I wasn't.
Nobody had much advice for me. They just wanted me to know that I sucked. And that my parents should understand so. I don't know if my parents freaked out or punished me or what. But they weren't happy.
The last to go was my social studies teacher, Sven.
He asked me if I knew how to read.
I politely nodded my head.
But he wasn't sure. He talked about all the symptoms he had seen from me. To counter, I pulled a grad-level book on the Cold War off a shelf and read a page aloud while trying not to cry. People were even more confused.
Some estimate that a child with ADHD will receive 20,000 more negative comments before the age of 12 than a non-ADHD child will. I can't speak to that exactly, but I can say that this was not the only time I've had a room full of people upset with me for reasons I never saw coming. It doesn't get much easier.
Sven caught up to us as we walked to the car. He was cagey with his reasoning, but he told us that there might be something up with my brain. He recommended I get tested by a psychiatrist and see what she had to say. I've since come to my conclusions where he got such an idea.
The testing was fun. I've always liked tests. Didn't mention it, but they also thought I couldn't read in 2nd grade. Lol. That one went away after I took a standardized exam and scored in the 99th percentile of the nation in reading. I thought standardized tests were fun, you see.
I moved a bunch of colored balls into colored holes and tried to remember what color things were after 10 minutes and everything else you might expect. I didn't know what I was even doing, but I felt I could hang.
Three weeks later, I got my results. The only part I remember is that my psychiatrist noted that in her entire career, she had never met someone who scored higher on specific tasks and yet lower on others. My chart looked like OJ Simpson’s polygraph.
I could keep going, and in another article, I will. But this is how I got diagnosed. And the key to all of it was Sven. Everything makes perfect sense after the fact, but only when you realize that a single teacher served as the link that completes the narrative. I do not know where I am today without him.
I got lucky that this story takes place in 2003, and at a private school with teachers who genuinely cared about me. For reasons a lawyer in the comments needs to help me understand better, public school teachers seem loath to alert students of disabilities of any kind. This includes ADHD but also things like autism, dyslexia, and mood disorders. Things that seem apparent to me in a way that makes it seem impossible that no other teacher in the past 13 years hasn’t also picked up on them.
That means many students go through primary schooling while having no idea they have a problem at all. When I mention to a student they might have ADHD, they are first confused, but then some memories come back. The first is that someone, usually a sports or music coach, had once told them the same thing. The other is that they remember a lot of teachers saying weird stuff they didn't understand at the time. Stuff like, "You’re so talented. I just wish you could be better focused. Have you talked to anyone about why you could be having trouble?" To me, those sound like hints from a teacher who has been told by her bosses not to put the school at risk.
I am not a teacher. I'm a private consultant and can pretty much say whatever I want. I am also not a doctor - people would die - but I am a concerned adult who has taken courses in spotting learning disabilities. I'm also someone who will do absolutely anything to make sure his students have the best chance for success now and in the future. I'm also someone who asked both my ADHD-psychiatrist (hi!) and ADHD-therapist (hi!!!!!) if I had the right to tell students if I suspected something; they both went, Ya, dude. Totally.
So I try to be Sven. I try to pay attention to what my students do and say and provide feedback that can help them. I'd like to note what that feedback is here to make sure people don't miss it because my pieces go on for way too long.
If you are a high school student who suspects he or she has ADHD, your best course of action is to talk with your parents and look into being tested by a professional psychiatrist who specializes in the topic. These tests are expensive, and mental health insurance in America sucks balls. But this is the fastest, most straightforward route to getting the help you need.
Option two is to try and work with/through your public high school to get them to pay for it. This site has some good info. My guess is that this method will suck. Public schools don't have a lot of funding and will not want to spend it on you. That's not your problem. You will almost certainly need your parents to back you up on this one and sit through a lot of boring meetings. I assume a lot of people will tell you a lot of reasons why they can't help you. Your response every time should be some version of, "Sure. But I need help with this. And I'm not going to stop until I get the support I need. So what do I do from here?" Then you blankly stare at them and refuse to leave until they get you at least to the next step. I'm not sure how well this will work. If you do attempt or have attempted this method, please DM me or contact my Email with your experience. I want to know if this is even worth my student's time.
If you can not afford traditional testing or do not feel your parents would support such testing, your best option is to wait until the day you turn 18 and then register for a telehealth company specializing in ADHD. The one I use and recommend is HelloAhead.com. They're neat. They do not take traditional insurance, but their rates are much lower than most doctors. They are cheap enough that I feel an average 18-year old who wants help could find a way to afford it on his or her own. The downside with these sites is the waiting times can be long. Took me like five months. Other such sites are popping up, and while I can't vouch for them, they all seem to offer a similar service.
Those paragraphs are what I want every student here to know. I'm much more comfortable having a trained doctor tell you what the deal is than I am trying to do it myself.
But I have to see something if I want to be Sven. The question then is, how do I see it? For spotting ADHD, it's shockingly simple. And I'll get to the real reason at the end. But for now, here is what I see when I see a student with ADHD.
The best way I can describe their lives is "endless chaos"
The chaos isn't always bad! Rarely it's fun chaos, but often it's just chaos chaos. This chaos exists in both physical and mental forms.
Physical: Their shit is such a mess. Everything. Most of the work we do is digital, so I see the Google Doc version of their mind. Folders make no sense. Things are labeled inaccurately or not at all. Schools get combined, or separated, or forgotten altogether. It is not a single type of error, but instead a collection of small mistakes and poor decisions that make the work impossible to corral. I have some kids that are messy or lazy, but this is different. It's like if the original folder system I built for them was an amoeba in a petri dish. Leave that dish out for a weekend and come back. The patterns will be remarkably similar to the organizational gore that they then try to utilize.
Mental: There's always a story. "I was late because my car has a flat tire, and the guy was late, so I had to take an Uber." "I didn't know my music essays were due a month early because the form only mentioned there being a recital." "My friend is mad at me, but it's only because she didn't tell me we were the first group presenting, so I spent more time preparing our project".
These stories make sense at first. But after a few weeks, they start to pile up. Then I become the one hearing a story about why they didn't do what I wanted, and I stop being so forgiving.
ADHD is a neurological disorder. Not a mental illness. It's closer to diabetes than it is bi-polar. "ADHD" is a fairly garbage name for the condition because A) it has a stigma, and B) it isn't even accurate. Both attention deficit and hyperactivity are symptoms of ADHD, but they are not the problem itself. It would be like calling clinical depression "low energy and excessive guilt disorder". ADHD is actually an issue involving improper dopamine regulation in the brain combined with under-activity of the brain's executive function component.
The executive function center is the part of your brain that is in charge of making sure all the other parts of your brain play nice and communicate. When the executive function center breaks down...those other parts don't. The result is a failure to plan or coordinate + a need for impulsive stimulation, thus resulting in endless chaos.
This is what I’ll ask you if you DM me, btw. Is your life endless chaos? Sometimes do you like the chaos? Sometimes do you get bored and create the chaos yourself just to see what might happen? But when that chaos stops being so fun, can you make it stop?
They're very, very intelligent
You've probably heard about the "gifted ADHD genius" thing before. I don't think it exists.
My theory has always been that the "gifted ADHD child" is a victim of survivorship bias.
The research states that ADHD has either no or a negative correlation with intelligence.
There is also a startling overlap with ADHD and incarceration.
This means that students who still manage to succeed despite their disorder tend to have advantages that keep them in the game. Namely that they're smart as hell. The other saving grace is that they come from secure support networks that prevent them from unraveling completely. I've heard from such students that their mom or dad works tirelessly to keep their life in order and to make sure they're getting things done. I do not think it is a coincidence that when ADHD students leave for college, things often fall apart.
The fact that there are ADHD kids that others know and still like makes some think ADHD isn't so bad or comes with natural cognitive advantages. Those same people do not become friends with the ADHD dumb kids who would disprove those perceptions. Do you remember that kid in elementary school who was his own worst enemy? He never had friends, and everyone was kind of afraid to even talk with him? He was kind of a bully but mostly just awful? He invited you to his house one time, but your mom wouldn’t let you go? That is my best guess of what a dumb kid with ADHD is like. It sounds cold writing it, but you know which kid I'm talking about right now. Where do you think that kid is today?
I end up with the smart ones—the ones with parents who care. And God damn are these kids smart. They're brilliant, and funny, and likable, and charming. They have something different about them that makes them undeniable. And it's not just me. I worry I play them up too much in my mind, but then I chat with a teacher or coach of theirs. It's always the same thing: Oh, she's brilliant. She can be so frustrating sometimes, tho.
They can be so frustrating sometimes, tho
The word is frustrating. Now bad. Not nasty. Not unlikeable. Frustrating.
I have some students I just don't like that much (no, not you). What tends to be the common theme with them is that they don't have much interest in my help and display a work ethic to match. On the other spectrum are the world beaters (totally you). These kids kick ass and not only follow my advice but often take that advice to the next level in ways that awe and inspire me.
And then there are the kids I think have ADHD. They don't do stuff all the time. They don't finish an essay, or they forget to spell check like I asked, or they write about something that has nothing to do with the outline we built the week before. That's not necessarily the frustrating part. You kids are 17; you make mistakes. Early on, I try to spot these mistakes and point them out. Even the students who don't like me seem to get my point after enough prodding and the problem goes away.
With these kids, the problem does not go away. Or if it does, another problem pops right back up to replace it. It makes me feel like there's nothing I can do. It would be easier if the student was just a brat. Then I could either become a brat myself or mentally check out because "hey man, your future”.
I need a name for kids I suspect have ADHD…"MaybeHD"?
Ya. That’s super funny. Say it out loud and try not to laugh.
But these MaybeHD kids do like me. And they do want to get into school. And they do feel bad when I get upset with them. I end up in long, drawn-out conversations with them about why this is important and why they need to make specific work a priority to get into the schools they want to go to. Then they nod meekly and head home. Then they come back next week, and it's the same story.
Frustrating.
They are randomly awesome at the weirdest things
I love weird talents. Things that no one offers up immediately, but then you're chatting, and it comes up naturally. "Oh ya, I love animals! I raise baby pigs in my backyard!"
"You do?"
"Ya!"
At some point, the MaybeHD kid read something or watched a Youtube video that he or she liked. Then they wanted to try it. Six months later, they're making 4k a month selling custom bathrobes on Etsy. There's rarely any logic.
"Do you like baths? Or making clothing?
"Not really. I just thought it looked fun, so I bought a sewing kit and started making things."
There is a noted link between ADHD and entrepreneurship. I see it with my MaybeHD students. They have an insatiable drive and passion for following up on curiosities that other students don't possess. Passion is the wrong word. They have obsessions with mastering concepts in a way that feels beyond their control. The obsession itself drives them to be great.
The literature on the subject is cloudy. But there exists a term in ADHD circles called "Hyperfocus". If you know what "flow" is, it's kind of like that. Only more intense and less controllable. I often see the remnants of past hyperfocuses in their stories. They used to run that pig farm. They used to sell bathrobes. They used to be really into getting good grades at school. But then one day, just as quickly as they picked the skill up, they dropped it. They can seldom tell me why.
Their priorities are completely out of whack
The downside of hyperfocus is that it can be so all-encompassing that other priorities fall by the wayside. One of my favorite students ever is named Elleway. We chatted in our first meeting, and I was instantly intrigued by her background. She said she had designed and prototyped a unit that would automatically roll under parked electric cars for hands-free charging. I hear a lot of impressive stuff in my job, and a lot of it ends up being not that impressive. But then Elleway showed me the prototype video she made back when she was a high school freshman and it blew my mind.
https://youtu.be/Y5Ap2uMbWL4
Can you do that? I sure as hell can't. She wasn't even an engineer. She calmly explained that she had partnered with several older male engineers who had helped turn her idea into reality. Then she had done all the promotional and marketing work herself. Then she got second out of 300 students at a young entrepreneur contest held at Columbia University. Shortly after, a tech CEO came up to her and asked if she would like to work with him to file a patent for the invention. She agreed and is now a trademark holder.
That was all in our first 10 minutes. She then went on to share the half dozen corporations she had worked for. And the three businesses she started. And the graphic design work she made for her website. She told me how she was a Nationally ranked fencer until she lost interest. She was now merely a Nationally ranked golfer.
Then I saw she had a 2.9 GPA and thus zero shot at getting into NYU like she hoped.
I did not initially think Elleway had ADHD. I thought she was a pathological liar. It seemed impossible to me that this same girl who had already taken a grip on the world was then unable to keep up her grades in math. That just isn’t how any -any- of my other ultra high-achieving students behave. Then Elleway showed me pictures of her casually hanging out with Andrew Yang. And then her LinkedIn With a lot of people who do not accept your request unless they want to. I had to figure out what the hell led to all this.
Elleway’s patent and ambition to work on it had taken up all her time. She was so singularly focused on doing what she cared about that the world behind her didn't seem to exist. She was hyperfocused on a goal, but once she reached it, she woke up to a reality that punished her for ignoring everything else.
That's the longing writer's version of the story. The more popular one is that she didn't give a shit about school, was warned repeatedly about the consequences, and ignored them. She got what she deserved. That’s the version the rest of the world had for her.
It goes back to frustrating. I've gotten kids into NYU that don't show a fifth the potential that Elleway did. Those kids went to all the camps their parents paid for and entered competitions with a tech doorbell or something lame, and they're just fine. But MaybeHD students are often world-beaters in ways that make them seem so special. They talk endlessly not just about what they're into but how they figured it all out and why it is all so important to them. I believe them, and I want to fight for them. So I give them as much assistance as I possibly can. But then they don't do the increasingly easy tasks I ask for them to complete. Then they suffer the consequences.
Elleway didn't get into NYU. She didn't get in much of anywhere. It eats me up inside, and I feel like I failed her. I don't know how many other people in my position would feel the same way. That's why I have to be Sven.
This is getting long, and I'm getting depressed. Here's the TL: DR of what I see when I see a student with ADHD
...
Me. I see me. And it can hurt really bad knowing what a condition like ADHD does to a young person's life.
My life is endless chaos. I've been out of food for nine days. My house looks like Badger from Breaking Bad bought a loft in Palo Alto. I am still writing this at 3:25 AM when I have to be up for work at nine. My cat has started doing this thing where she sleeps in her food bowl when it gets empty. It's equal parts adorable and humiliating.
I'm smart as shit. I know it. I made up half-ideas. That article is absolute fire. I got published on Cracked.com five times in 2011 when that meant something. I went to Tulane on a half-ride merit scholarship, used to win creative writing contests, and have done a bunch of other writery stuff that made people stand up and go, "Woah".
But I only made it to college because my mom carried me there, kicking and screaming. She packaged my life together, and I held on for the ride. Then I got to school and made it two months before she got an Email alerting her that Tulane was planning to revoke the remaining $70,000 of my $80,000 scholarship due to my grades. I barely scraped by and survived. But the shame and frustration in her voice when she read me that letter over the phone haunts me to this day.
I analyze handwriting. And I turned a Reddit account into a successful business in four months. And I collect college T-shirts from schools my students go to. And I own Bitcoin I bought in 2011 for $4.50 each. And I'm teaching myself piano with a video game. And I'm exercising with a video game. And I'm ranked 42nd in Northern California at Super Smash Bros Ultimate. And I’ve tried the nachos at over 100 Taquerias in the Bay Area. And I own a really cute cat.
But I've spent 15* hours this week writing this instead of a sequel to that Costco piece. I have one coming where I edit my Common App essay from 2009. It's a great idea and a great article. One that will drive significantly more business to my site than this piece will. Hell, I predict this piece is likely to lose me business because I come off like a mess in it. But it's what I want to write, so I feel like I have no choice.
*The 15 hours is a guess. I have no idea how long it takes me to write and edit these things. I start typing and X hours later look up and realize how hungry I am and how much I need to pee. The writing controls me.
I see myself in my MaybeHD students. I see their unfettered curiosity and flair for taking as much good from the world as possible. I see their infectious enthusiasm and ability to quickly forgive others because they know too well how it feels to want forgiveness themselves.
Yet I also see their inattention to detail, their weak excuses, and their general confusion that makes me realize they couldn't fix some problems if their lives depended on it. I see their sadness and shame when those mistakes pile up. I see when the chaos stops being fun, and they want out, but they don't know how. I don't know what I, as their consultant, can do. But as Sven, I can recommend they go talk to someone else...
Hey, so, I was considering hiring you and all...but you seem kind of bad. Why should I trust you?
Because a couple of years ago, I got back on my medication and turned my life around. You aren't reading this if I don't reach out for help and trust a trained psychiatrist to guide me. There are no groups of friends in Delaware or Connecticut comparing their half-ideas lists. There sure as shit isn't a CollegeWithMattie.com.
I still have ADHD. But one of the greatest things about ADHD is that it is -without rival- the most treatable form of mental illness or dysfunction known to man. It is not curable, but there are endless medical and non-medical options available for those willing to reach out and get the help they need. My story is that it was only by getting re-medicated that I then could learn and use coping mechanisms that allow me to achieve the type of life I've always wanted.
Christ, 4,400 words. You know, I'm also submitting this for a class I'm in. That's why all the backlinks are to actual sources instead of links herding you into my website. Hi Amy! That's one more thing. ADHD people are hyper-efficient...Kind of.
Alright. If you're still here reading this, you might be suspecting some things about yourself. My DMs are open if you want to chat, but again, I am not a doctor. I will say that right now, as you prepare to head to college, is a really good time to get this all figured out. College is a giant reset button on your life. Figure these problems out now so that by the time you head off for your next chapter, you will have given yourself the best possible chance to succeed.
Endless chaos.
Here is the bold part again:
If you are a student in high school who suspects he or she has ADHD, your best course of action is to talk with your parents and look into being tested by a professional psychiatrist who specializes in the topic. These tests are expensive, and mental health insurance in America (still) sucks balls. But this is the fastest, most straightforward route to getting the help you need.
Option two is to try and work with/through your public high school to get them to pay for it. This site has some good info. My guess is that this method will kind of suck. Public schools don't have a lot of funding and will not want to spend it on you. That's not your problem. You will almost certainly need your parents to back you up on this one and sit through a lot of boring meetings. I assume a lot of people will tell you a lot of reasons why they can't help you. Your response every time should be some version of, "Sure. But I need help with this. And I'm not going to stop until I get the support I need. So what do I do from here?" Then you blankly stare at them and refuse to leave until they get you at least to the next step. This will suck and I'm not sure how well it will work. If you do attempt or have attempted this method, please DM me or contact my Email with your experience. I want to know if this is even worth my student's time.
If you can not afford traditional testing, or if you do not feel your parents would support such testing, your best option is to wait until the day you turn 18 and then register for a telehealth company that specializes in ADHD. The one I use and recommend is HelloAhead.com. They're neat. They do not take traditional insurance, but their rates are much lower than most doctors. They are cheap enough that I feel an average 18-year old who wants help could find a way to afford it on his or her own. The downside with these sites is the waiting times can be really long. Took me like five months. Other such sites are popping up, and while I can't vouch for them, they all seem to offer a similar service.
Update: The lines aren't that long anymore! Monday was Elleway's 18th birthday. She sent me a screengrab of her upcoming Ahead appointment in early September. She told me she spent the entire day crying because all her friends were going off to great schools and that she was stuck at home. I've told Elleway that I plan to help her reapply to NYU this year. I doubt I will ever want to see another student succeed as much as I will with her.
submitted by CollegeWithMattie to ApplyingToCollege [link] [comments]

[Article] O V E R D A R K

So I'm looking through my old yearbooks, and I'm realizing that I missed out on a crucial part of my life: during high school, I was supposed to have a punk phase. I can't believe I missed it! It seemed like everyone was rocking their unruly hair, their unkempt clothes, and their general disaffection towards life. Man, Green Day released new records, and there was an unrelenting hatred for all types of authority figures...
Wait, this is just a slab of concrete with newspaper articles from 2020 stapled to it, isn't it.
Regardless, the universe is telling me it's time for me to reclaim my lost childhood experiences; to go back to a better time. Unfortunately, latent legal issues surrounding my controversial "BONG HiTS 4 JESUS" sign prevent me from going within 500 feet of any type of school, so winning the basketball championship and visiting the aquarium are right out. But I can still be the moodiest, edgiest, darkest person on the planet, and now that I've beaten Shadow the Hedgehog all the way through and went to Hot Topic, it's time to build a commander deck that's truly me. Presenting: RAMSES O V E R D A R K!
[[Ramses Overdark]] {2}{U}{U}{B}{B} Legendary Creature — Human Assassin {T}: Destroy target enchanted creature. 4/3 
Ramses is the bad boy your mother would never let take you to IHOP. Not that he'd care; his business is killing, and he's efficient at it too, costing the least out of any commander I've ever written about. You want to sit around and drink tea with your little enchanted princess friends? Ramses Overdark is here to tell you how the real world works. Nothing personnel, kid.

Commander For You

Like a TI-83 Silver Edition, Ramses is a stone-cold calculating problem solver, but he only gets that way with some preparation. See, killing is a business, Ramses' business, and the one thing every business needs is synergy. So call me Nathan Fielder, because I'm going to unveil the plan that will keep this enterprise running smoothly:

Half Up-Front

As a teenager, I procrastinated from my task of being edgy by protesting government-backed financial institutions with the Bitcoin community, and one thing you learn there very quickly is that assassination ain't cheap.
The first and most obvious barrier to breaking 18 U.S. Code § 1117 is his six mana casting cost, and unlike Gabriel, Ramses demands something a little more tangible than a green thumb to appease him. We're going to use the usual fare: rings, trinkets, stones, lockets, relics... archives... spheres? With you as an investor, Ramses' business (which is killing) will make a killing, letting us take full advantage of Revel in Riches as both a ramp tool and backup win condition.
Ramses will also often require additional gas to keep going, whether it be finding a steady stream of enchantments to throw onto enemies, or to finding ways to close out games.

Murder, Inc.

Enchantment payoffs are few and far between in Dimir, so we're keeping this build a bit creature-light; but the ones we take with are absolutely vital for our success. While Ramses is no Cleopatra, he's still managed to form relationships with some important Greek allies:

Poaching Employees

Our deck only runs sixteen creatures, and while being a lone-wolf is edgy, it's not the type of edge I want to be. I feel like I'm a Halloween bobbing apple -- razor edgy; the type of edge that speaks to people, in the very depths of their soul, and causes them to rebel against the man. In the end, I will be so edgy that even those rotten adults will realize I'm right.
Enchant opposing creatures with reanimation-on-death enchantments:
Once opposing creatures are enchanted with one of these Auras, they become juicy targets for Ramses, as killing them will put them into play under your control. Unfortunately, six isn't a critical mass for Ramses; to ensure that Ramses' business isn't killed by a lack of clientele, let's use some recursive enchantments.
Rounding out the auras, we've got a few utility spells we can play for neat effects:
A lot of creatures are going to end up dead, which makes Rise of the Dark Realms a great end-game finisher. But that's boring. Are you ready to learn Ramses' true dark secret? Because here's where I blow your mind.

Drake in the 99 Non-Dragons

Your real win condition is some random uncommon from Urza's Saga.
That makes no sense.
It makes total sense. You start by playing Iridescent Drake, so...
This combo will make you feel like Joker, because your opponents will never see it coming.
You've got some redundancy in the deck in case things don't pan out: use Fallen Ideal as your sacrifice outlet and win condition to swing with an evasive infinity/infinity attacker, or deal damage using Grim Guardian's Constellation trigger. Should Iridescent Drake be interacted with (which is illegal, by the way), use Ill Gotten Gains to get your combo pieces back to hand and recur some protective counterspells.
I'm not a punk, I'm a goddamn dragon genius. Finally, the deck is truly me!

Conclusion

In conclusion, the Ramses Overdark deck for the Commander format is a fun and powerful budget deck for you to try. I hope you enjoyed reading my paper as much as I enjoyed writing-
...Buh?
Oh. I guess I reverted to hastily written high school paper writing. Is that really what I sounded like?
You know, people say you never really realize what you have until it's gone. It's easy to look to memories of better days and feel that melancholy drop in your stomach. It's natural to feel wistful for a time past when rain drips down the window. But the truth is also that you don't really realize what you don't have until you obtain it. Our experiences may be painful now, but that's no reason to give up hope. You can get over darkness. Look forward instead of back, because in that future lies a wiser you.

The Hit-List

https://scryfall.com/@michael_celani/decks/1985f0a7-552f-4b9d-a5cc-9593e5f0da04
submitted by Gamesfreak13563 to EDH [link] [comments]

Why Osana takes so long? (Programmer's point of view on current situation)

I decided to write a comment about «Why Osana takes so long?» somewhere and what can be done to shorten this time. It turned into a long essay. Here's TL;DR of it:
The cost of never paying down this technical debt is clear; eventually the cost to deliver functionality will become so slow that it is easy for a well-designed competitive software product to overtake the badly-designed software in terms of features. In my experience, badly designed software can also lead to a more stressed engineering workforce, in turn leading higher staff churn (which in turn affects costs and productivity when delivering features). Additionally, due to the complexity in a given codebase, the ability to accurately estimate work will also disappear.
Junade Ali, Mastering PHP Design Patterns (2016)
Longer version: I am not sure if people here wanted an explanation from a real developer who works with C and with relatively large projects, but I am going to do it nonetheless. I am not much interested in Yandere Simulator nor in this genre in general, but this particular development has a lot to learn from for any fellow programmers and software engineers to ensure that they'll never end up in Alex's situation, especially considering that he is definitely not the first one to got himself knee-deep in the development hell (do you remember Star Citizen?) and he is definitely not the last one.
On the one hand, people see that Alex works incredibly slowly, equivalent of, like, one hour per day, comparing it with, say, Papers, Please, the game that was developed in nine months from start to finish by one guy. On the other hand, Alex himself most likely thinks that he works until complete exhaustion each day. In fact, I highly suspect that both those sentences are correct! Because of the mistakes made during early development stages, which are highly unlikely to be fixed due to the pressure put on the developer right now and due to his overall approach to coding, cost to add any relatively large feature (e.g. Osana) can be pretty much comparable to the cost of creating a fan game from start to finish. Trust me, I've seen his leaked source code (don't tell anybody about that) and I know what I am talking about. The largest problem in Yandere Simulator right now is its super slow development. So, without further ado, let's talk about how «implementing the low hanging fruit» crippled the development and, more importantly, what would have been an ideal course of action from my point of view to get out. I'll try to explain things in the easiest terms possible.
  1. else if's and lack any sort of refactoring in general
The most «memey» one. I won't talk about the performance though (switch statement is not better in terms of performance, it is a myth. If compiler detects some code that can be turned into a jump table, for example, it will do it, no matter if it is a chain of if's or a switch statement. Compilers nowadays are way smarter than one might think). Just take a look here. I know that it's his older JavaScript code, but, believe it or not, this piece is still present in C# version relatively untouched.
I refactored this code for you using C language (mixed with C++ since there's no this pointer in pure C). Take a note that else if's are still there, else if's are not the problem by itself.
The refactored code is just objectively better for one simple reason: it is shorter, while not being obscure, and now it should be able to handle, say, Trespassing and Blood case without any input from the developer due to the usage of flags. Basically, the shorter your code, the more you can see on screen without spreading your attention too much. As a rule of thumb, the less lines there are, the easier it is for you to work with the code. Just don't overkill that, unless you are going to participate in International Obfuscated C Code Contest. Let me reiterate:
Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away.
Antoine de Saint-Exupéry
This is why refactoring — activity of rewriting your old code so it does the same thing, but does it quicker, in a more generic way, in less lines or simpler — is so powerful. In my experience, you can only keep one module/class/whatever in your brain if it does not exceed ~1000 lines, maybe ~1500. Splitting 17000-line-long class into smaller classes probably won't improve performance at all, but it will make working with parts of this class way easier.
Is it too late now to start refactoring? Of course NO: better late than never.
  1. Comments
If you think that you wrote this code, so you'll always easily remember it, I have some bad news for you: you won't. In my experience, one week and that's it. That's why comments are so crucial. It is not necessary to put a ton of comments everywhere, but just a general idea will help you out in the future. Even if you think that It Just Works™ and you'll never ever need to fix it. Time spent to write and debug one line of code almost always exceeds time to write one comment in large-scale projects. Moreover, the best code is the code that is self-evident. In the example above, what the hell does (float) 6 mean? Why not wrap it around into the constant with a good, self-descriptive name? Again, it won't affect performance, since C# compiler is smart enough to silently remove this constant from the real code and place its value into the method invocation directly. Such constants are here for you.
I rewrote my code above a little bit to illustrate this. With those comments, you don't have to remember your code at all, since its functionality is outlined in two tiny lines of comments above it. Moreover, even a person with zero knowledge in programming will figure out the purpose of this code. It took me less than half a minute to write those comments, but it'll probably save me quite a lot of time of figuring out «what was I thinking back then» one day.
Is it too late now to start adding comments? Again, of course NO. Don't be lazy and redirect all your typing from «debunk» page (which pretty much does the opposite of debunking, but who am I to judge you here?) into some useful comments.
  1. Unit testing
This is often neglected, but consider the following. You wrote some code, you ran your game, you saw a new bug. Was it introduced right now? Is it a problem in your older code which has shown up just because you have never actually used it until now? Where should you search for it? You have no idea, and you have one painful debugging session ahead. Just imagine how easier it would be if you've had some routines which automatically execute after each build and check that environment is still sane and nothing broke on a fundamental level. This is called unit testing, and yes, unit tests won't be able to catch all your bugs, but even getting 20% of bugs identified at the earlier stage is a huge boon to development speed.
Is it too late now to start adding unit tests? Kinda YES and NO at the same time. Unit testing works best if it covers the majority of project's code. On the other side, a journey of a thousand miles begins with a single step. If you decide to start refactoring your code, writing a unit test before refactoring will help you to prove to yourself that you have not broken anything without the need of running the game at all.
  1. Static code analysis
This is basically pretty self-explanatory. You set this thing once, you forget about it. Static code analyzer is another «free estate» to speed up the development process by finding tiny little errors, mostly silly typos (do you think that you are good enough in finding them? Well, good luck catching x << 4; in place of x <<= 4; buried deep in C code by eye!). Again, this is not a silver bullet, it is another tool which will help you out with debugging a little bit along with the debugger, unit tests and other things. You need every little bit of help here.
Is it too late now to hook up static code analyzer? Obviously NO.
  1. Code architecture
Say, you want to build Osana, but then you decided to implement some feature, e.g. Snap Mode. By doing this you have maybe made your game a little bit better, but what you have just essentially done is complicated your life, because now you should also write Osana code for Snap Mode. The way game architecture is done right now, easter eggs code is deeply interleaved with game logic, which leads to code «spaghettifying», which in turn slows down the addition of new features, because one has to consider how this feature would work alongside each and every old feature and easter egg. Even if it is just gazing over one line per easter egg, it adds up to the mess, slowly but surely.
A lot of people mention that developer should have been doing it in object-oritented way. However, there is no silver bullet in programming. It does not matter that much if you are doing it object-oriented way or usual procedural way; you can theoretically write, say, AI routines on functional (e.g. LISP)) or even logical language if you are brave enough (e.g. Prolog). You can even invent your own tiny programming language! The only thing that matters is code quality and avoiding the so-called shotgun surgery situation, which plagues Yandere Simulator from top to bottom right now. Is there a way of adding a new feature without interfering with your older code (e.g. by creating a child class which will encapsulate all the things you need, for example)? Go for it, this feature is basically «free» for you. Otherwise you'd better think twice before doing this, because you are going into the «technical debt» territory, borrowing your time from the future by saying «I'll maybe optimize it later» and «a thousand more lines probably won't slow me down in the future that much, right?». Technical debt will incur interest on its own that you'll have to pay. Basically, the entire situation around Osana right now is just a huge tale about how just «interest» incurred by technical debt can control the entire project, like the tail wiggling the dog.
I won't elaborate here further, since it'll take me an even larger post to fully describe what's wrong about Yandere Simulator's code architecture.
Is it too late to rebuild code architecture? Sadly, YES, although it should be possible to split Student class into descendants by using hooks for individual students. However, code architecture can be improved by a vast margin if you start removing easter eggs and features like Snap Mode that currently bloat Yandere Simulator. I know it is going to be painful, but it is the only way to improve code quality here and now. This will simplify the code, and this will make it easier for you to add the «real» features, like Osana or whatever you'd like to accomplish. If you'll ever want them back, you can track them down in Git history and re-implement them one by one, hopefully without performing the shotgun surgery this time.
  1. Loading times
Again, I won't be talking about the performance, since you can debug your game on 20 FPS as well as on 60 FPS, but this is a very different story. Yandere Simulator is huge. Once you fixed a bug, you want to test it, right? And your workflow right now probably looks like this:
  1. Fix the code (unavoidable time loss)
  2. Rebuild the project (can take a loooong time)
  3. Load your game (can take a loooong time)
  4. Test it (unavoidable time loss, unless another bug has popped up via unit testing, code analyzer etc.)
And you can fix it. For instance, I know that Yandere Simulator makes all the students' photos during loading. Why should that be done there? Why not either move it to project building stage by adding build hook so Unity does that for you during full project rebuild, or, even better, why not disable it completely or replace with «PLACEHOLDER» text for debug builds? Each second spent watching the loading screen will be rightfully interpreted as «son is not coding» by the community.
Is it too late to reduce loading times? Hell NO.
  1. Jenkins
Or any other continuous integration tool. «Rebuild a project» can take a long time too, and what can we do about that? Let me give you an idea. Buy a new PC. Get a 32-core Threadripper, 32 GB of fastest RAM you can afford and a cool motherboard which would support all of that (of course, Ryzen/i5/Celeron/i386/Raspberry Pi is fine too, but the faster, the better). The rest is not necessary, e.g. a barely functional second hand video card burned out by bitcoin mining is fine. You set up another PC in your room. You connect it to your network. You set up ramdisk to speed things up even more. You properly set up Jenkins) on this PC. From now on, Jenkins cares about the rest: tracking your Git repository, (re)building process, large and time-consuming unit tests, invoking static code analyzer, profiling, generating reports and whatever else you can and want to hook up. More importantly, you can fix another bug while Jenkins is rebuilding the project for the previous one et cetera.
In general, continuous integration is a great technology to quickly track down errors that were introduced in previous versions, attempting to avoid those kinds of bug hunting sessions. I am highly unsure if continuous integration is needed for 10000-20000 source lines long projects, but things can be different as soon as we step into the 100k+ territory, and Yandere Simulator by now has approximately 150k+ source lines of code. I think that probably continuous integration might be well worth it for Yandere Simulator.
Is it too late to add continuous integration? NO, albeit it is going to take some time and skills to set up.
  1. Stop caring about the criticism
Stop comparing Alex to Scott Cawton. IMO Alex is very similar to the person known as SgtMarkIV, the developer of Brutal Doom, who is also a notorious edgelord who, for example, also once told somebody to kill himself, just like… However, being a horrible person, SgtMarkIV does his job. He simply does not care much about public opinion. That's the difference.
  1. Go outside
Enough said. Your brain works slower if you only think about games and if you can't provide it with enough oxygen supply. I know that this one is probably the hardest to implement, but…
That's all, folks.
Bonus: Do you think how short this list would have been if someone just simply listened to Mike Zaimont instead of breaking down in tears?
submitted by Dezhitse to Osana [link] [comments]

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

Bitcoin και Altcoins ΓΙΑ ΗΛΙΘΙΟΥΣ: Όλοι Οι Λόγοι Για να ... vicesat - YouTube YouTube Bitcoin Turning Around For Another Pump? Crypto News 4/30/20 Plane Engine Catches Fire - YouTube

Earn bitcoin for every task that you complete, and receive payment within hours. Thanks to Bitcoin, there's no more waiting for checks or bank transfers to clear. It's free. All you need to start earning is a Bitcoin address for receiving payments. We don't collect any of your personal information—not even your email address. It doesn't get easier than this. It's fun! We are always adding ... Findet sich auf Ihrem Rechner der Trojaner bitcoinminer.sx, sollten Sie ihn entfernen. Wahrscheinlich haben Sie ihn als Teil eines Bundles mit einem anderen Tool aus dem Internet geladen. Der Virus kann Ihre Browsersuche umleiten und persönliche Daten sammeln. Um Bitcoin Mining zu betreiben, müssen Sie einem Miningpool beitreten, was zusätzliche Kosten verursacht. Für das Mining benötigen Sie entsprechende Hardware. Auch hier kommen Kosten auf Sie zu. Je nachdem, wie leistungsfähig Ihr Bitcoin Miner sein soll, zahlen Sie bis zu 2.000 Euro. Es ist nicht bekannt, ob sich Mining auch in Zukunft noch lohnen wird. Wenn Sie nicht genau wissen, was ... DeriBit is a broker platform to trade Bitcoin and Ethereum options and futures operating since 2016. It features an ultra-fast trade matching engine with less than 1MS Latency. All the coins are stored securely thanks to cold storage where the platform keeps 99% of all coins. Other important features of this broker are real-time auditing ... Bitcoin mining is the process of turning computing power into actual Bitcoins. It allows you to generate Bitcoins without the need to actually buy them. Now a lot of people say that mining can’t be done on a home computer and that you need very expensive equipment in order to start mining, but that’s not entirely true. Any computer can be used to mine Bitcoins, even the oldest and weakest ...

[index] [16936] [28571] [33645] [35863] [225] [23272] [5244] [32428] [5634] [31164]

Bitcoin και Altcoins ΓΙΑ ΗΛΙΘΙΟΥΣ: Όλοι Οι Λόγοι Για να ...

Νομίζεις πως κάνοντας Bitcoin mining θα γίνεις πλούσιος? Νομίζεις πως οι επενδύσεις σε κρυπτονομίσματα είναι πιο ... Hello everyone, this tutorial is to show you how to tune your GPU to get a better hash rate. Overclocking for scrypt mining is more complex than bitcoin (rather than just increasing your engine ... How to configure Windows 10 for your Mining Rig to get the best hashrate in ethereum and more. Parts: MSI Pro Series Z270a: http://amzn.to/2sHVqNX Intel Pent... This is Weekly Dose Of Aviation #3 Links to sources: Engine Fire - https://www.youtube.com/watch?v=Dont3uTVqvA Chicken Goes Flying - https://www.youtube.com/... Onecoin promised the world, but only proved to be a trail of destruction. --- About ColdFusion --- ColdFusion is an Australian based online media company ind...

#