Bitcoinminer sx: So entfernen Sie den Trojaner - CHIP
Earn Free Bitcoin By Simply Browsing The Internet
Looking on Linkedin, Fidelity is hiring Bitcoin miner engineers. Doing some further research it turns out they are hosting miners with a big colocation start up building mines around the us. First colo is 300mw and I think in Georgia. The job listings here are for other cities. Very cool.
A U.S. court has found an ex Microsoft software engineer guilty of embezzling millions of dollars and turning it into Bitcoin. The defendant is said to have defrauded Microsoft out of a total of $10 million, according to a statement from the Department of Justice.
Controls Engineer salary structure (no amounts talk please)
Hey there ya'll, I recently started with a company as a controls engineer earlier this year. I've never held such a position, and I don't know very many people that do or worked with any in the past. Thus, I don't have much of a data pool to reference when it comes to expected benefits or salary structures. In my job description I'm more of a "C&I" and I'm often referred to as such by those I'm working with or for. It's a European company that has just stepped into the NA market for their products (and plan to expand). We work primarily with Siemens PLCs, making all major program/HMI changes necessary for the function of the plant for now and the future. We also commission the equipment our company wrote the programming for. We dabble a little in other software needed to support our equipment (Movitools/Simotion/Lenze L-force engineer to E&H, Vega, etc). We're not exactly required to turn wrenches or physically work on things, but its not beyond our position to adjust sensors, photoeyes, etc in the absence of an electrician to "just get the machine up." Currently I'm a Salary (OT Exempt) employee. I get no written benefit of COMP time (but our manager is tracking out OT hours to use as comp time), no bonuses, and per HR if we work fewer than 40hrs a week we are supposed to be docked pay. My question to you is: What is your typical salary structure (no $ figures, just if your hourly, salary non-exempt, salary exempt, paid in bananas and bitcoin, etc) and/or what benefits do you receive in your role? I know there's some freelance guys in here, or traveling guys that work for a central hub to provide controls support. My question though is more for the controls engineers/technicians in a M-F gig. However, other folks in the sub may be curious, so please clarify your role if you answer. Thank you for your input.
You've probably been hearing a lot about Bitcoin recently and are wondering what's the big deal? Most of your questions should be answered by the resources below but if you have additional questions feel free to ask them in the comments. It all started with the release of the release of Satoshi Nakamoto's whitepaper however that will probably go over the head of most readers so we recommend the following videos for a good starting point for understanding how bitcoin works and a little about its long term potential:
Limited Supply - There will only ever be 21,000,000 bitcoins created and they are issued in a predictable fashion, you can view the inflation schedule here. Once they are all issued Bitcoin will be truly deflationary. The halving countdown can be found here.
Open source - Bitcoin code is fully auditable. You can read the source code yourself here.
Accountable - The public ledger is transparent, all transactions are seen by everyone.
Decentralized - Bitcoin is globally distributed across thousands of nodes with no single point of failure and as such can't be shut down similar to how Bittorrent works. You can even run a node on a Raspberry Pi.
Censorship resistant - No one can prevent you from interacting with the bitcoin network and no one can censor, alter or block transactions that they disagree with, see Operation Chokepoint.
Push system - There are no chargebacks in bitcoin because only the person who owns the address where the bitcoins reside has the authority to move them.
Low fee scaling - On chain transaction fees depend on network demand and how much priority you wish to assign to the transaction. Most wallets calculate on chain fees automatically but you can view current fees here and mempool activity here. On chain fees may rise occasionally due to network demand, however instant micropayments that do not require confirmations are happening via the Lightning Network, a second layer scaling solution currently rolling out on the Bitcoin mainnet.
Borderless - No country can stop it from going in/out, even in areas currently unserved by traditional banking as the ledger is globally distributed.
Portable - Bitcoins are digital so they are easier to move than cash or gold. They can even be transported by simply memorizing a string of words for wallet recovery (while cool this method is generally not recommended due to potential for insecure key generation by inexperienced users. Hardware wallets are the preferred method for new users due to ease of use and additional security).
Bitcoin.org and BuyBitcoinWorldwide.com are helpful sites for beginners. You can buy or sell any amount of bitcoin (even just a few dollars worth) and there are several easy methods to purchase bitcoin with cash, credit card or bank transfer. Some of the more popular resources are below, also check out the bitcoinity exchange resources for a larger list of options for purchases.
Here is a listing of local ATMs. If you would like your paycheck automatically converted to bitcoin use Bitwage. Note: Bitcoins are valued at whatever market price people are willing to pay for them in balancing act of supply vs demand. Unlike traditional markets, bitcoin markets operate 24 hours per day, 365 days per year. Preev is a useful site that that shows how much various denominations of bitcoin are worth in different currencies. Alternatively you can just Google "1 bitcoin in (your local currency)".
Securing your bitcoins
With bitcoin you can "Be your own bank" and personally secure your bitcoins OR you can use third party companies aka "Bitcoin banks" which will hold the bitcoins for you.
If you prefer to "Be your own bank" and have direct control over your coins without having to use a trusted third party, then you will need to create your own wallet and keep it secure. If you want easy and secure storage without having to learn computer security best practices, then a hardware wallet such as the Trezor, Ledger or ColdCard is recommended. Alternatively there are many software wallet options to choose from here depending on your use case.
If you prefer to let third party "Bitcoin banks" manage your coins, try Gemini but be aware you may not be in control of your private keys in which case you would have to ask permission to access your funds and be exposed to third party risk.
Note: For increased security, use Two Factor Authentication (2FA) everywhere it is offered, including email! 2FA requires a second confirmation code to access your account making it much harder for thieves to gain access. Google Authenticator and Authy are the two most popular 2FA services, download links are below. Make sure you create backups of your 2FA codes.
As mentioned above, Bitcoin is decentralized, which by definition means there is no official website or Twitter handle or spokesperson or CEO. However, all money attracts thieves. This combination unfortunately results in scammers running official sounding names or pretending to be an authority on YouTube or social media. Many scammers throughout the years have claimed to be the inventor of Bitcoin. Websites like bitcoin(dot)com and the btc subreddit are active scams. Almost all altcoins (shitcoins) are marketed heavily with big promises but are really just designed to separate you from your bitcoin. So be careful: any resource, including all linked in this document, may in the future turn evil. Don't trust, verify. Also as they say in our community "Not your keys, not your coins".
Where can I spend bitcoins?
Check out spendabit or bitcoin directory for millions of merchant options. Also you can spend bitcoin anywhere visa is accepted with bitcoin debit cards such as the CashApp card. Some other useful site are listed below.
Mining bitcoins can be a fun learning experience, but be aware that you will most likely operate at a loss. Newcomers are often advised to stay away from mining unless they are only interested in it as a hobby similar to folding at home. If you want to learn more about mining you can read more here. Still have mining questions? The crew at /BitcoinMining would be happy to help you out. If you want to contribute to the bitcoin network by hosting the blockchain and propagating transactions you can run a full node using this setup guide. If you would prefer to keep it simple there are several good options. You can view the global node distribution here.
Just like any other form of money, you can also earn bitcoins by being paid to do a job.
You can also earn bitcoins by participating as a market maker on JoinMarket by allowing users to perform CoinJoin transactions with your bitcoins for a small fee (requires you to already have some bitcoins.
The following is a short list of ongoing projects that might be worth taking a look at if you are interested in current development in the bitcoin space.
One Bitcoin is quite large (hundreds of £/$/€) so people often deal in smaller units. The most common subunits are listed below:
one bitcoin is equal to 100 million satoshis
1,000 per bitcoin
used as default unit in recent Electrum wallet releases
1,000,000 per bitcoin
colloquial "slang" term for microbitcoin (μBTC)
100,000,000 per bitcoin
smallest unit in bitcoin, named after the inventor
For example, assuming an arbitrary exchange rate of $10000 for one Bitcoin, a $10 meal would equal:
For more information check out the Bitcoin units wiki. Still have questions? Feel free to ask in the comments below or stick around for our weekly Mentor Monday thread. If you decide to post a question in /Bitcoin, please use the search bar to see if it has been answered before, and remember to follow the community rules outlined on the sidebar to receive a better response. The mods are busy helping manage our community so please do not message them unless you notice problems with the functionality of the subreddit. Note: This is a community created FAQ. If you notice anything missing from the FAQ or that requires clarification you can edit it here and it will be included in the next revision pending approval. Welcome to the Bitcoin community and the new decentralized economy!
2975 points: deleted's comment in hentAI: Detecting and removing censors with Deep Learning and Image Segmentation
2772 points: I_DONT_LIE_MUCH's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
2485 points: api's comment in Stripe Workers Who Relocate Get $20,000 Bonus and a Pay Cut - Stripe Inc. plans to make a one-time payment of $20,000 to employees who opt to move out of San Francisco, New York or Seattle, but also cut their base salary by as much as 10%
2464 points: iloveparagon's comment in Google engineer breaks down the problems he uses when doing technical interviews. Lots of advice on algorithms and programming.
2384 points: why_not_both_bot's comment in During lockdown my wife has been suffering mentally from pressure to stay at her desk 100% of the time otherwise after a few minutes her laptop locks and she is recorded as inactive. I wrote this small app to help her escape her desk by periodically moving the cursor. Hopefully it can help others.
2293 points: ThatInternetGuy's comment in Iranian Maintainer refuses to merge code from Israeli Developer. Cites Iranian regulations.
2268 points: xequae's comment in I'm a software engineer going blind, how should I prepare?
2228 points: turniphat's comment in AWS forked my project and launched it as its own service
2149 points: Rami-Slicer's comment in 20GB leak of Intel data: whole Git repositories, dev tools, backdoor mentions in source code
There have been many recent posts about the blackmail email scam, so I have written this post and will keep it stickied until the posts about the scam die down. Blackmail email scams have that name because they started as an email spam campaign, however there have also been reports of these scams being sent via SMS and physical mail. If you are reading this because you have received one of these emails and you are worried, you can stop worrying. The blackmail email scam is a spam campaign that is sent out to thousands of addresses at a time. The threats are lies and you do not have anything to worry about. In many cases, the emails will contain some sort of privileged information about you such as your name, part or all of your phone number, and your password.The emails may also look like they were sent from your own email address. The data is gathered from data breaches, and if the email looks like it came from your account that is due to email spoofing. You can use the service Have I Been Pwned? to see if you are in any publicly known data breaches. If you receive an email that contains a password that you currently use, you should immediately change that. Current recommended password guidelines say that you should use a different, complex password for every account. You can generate and save passwords using a password manager for convenience. You should also be using two factor authentication using an app like Google Authenticator instead of receiving codes through SMS. Here are some news articles about this scam. Here is a story from Brian Krebs, and here is a story from the New York Times. Below are a few examples, but if you receive an email that is similar but not the same as the examples you see, that does not matter and does not mean that the email is real. The spammers constantly switch up their templates in order to bypass spam filters, so it's normal to receive an email that hasn't yet been posted online.
Hey, some time ago your computer was infected with my private malware, RAT (Remote Administration Tool). I know at the time of infection your passwords was: xxxxxxxxxxx My malware gave me full access to all your accounts, contacts and it also was possible to spy on you over your webcam. Sometimes when I was bored I was spying on you, then once you started to SATISFYING YOURSELF! At first I didn't knew how to react as I was shocked, then I decided to record you, I checked on google and found the software: Bandicam and it did the job. After that I removed my malware to not leave any traces and this email was sent from some hacked account. I can send the video of you to all your friends, contacts and publish it on social networks and the whole web. You can stop me and only I can help you out in this situation. Pay exactly 740$ in Bitcoin (BTC). It's easy to buy Bitcoin (BTC), for example here: https://paxful.com/buy-bitcoin , https://www.buybitcoinworldwide.com/ , https://www.kraken.com/ , or google another exchanger. My Bitcoin (BTC) wallet is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Yes that's how the wallet looks like, copy and paste it, it's (cAsE-sEnSEtiVE) I give you 3 days time to pay. As I got access to this email account, I will know if this email has already been read, so the time is running. After receiving the payment, I will remove the video and you can life your live in peace like before. Learn from the mistake and update your browser before browsing the web next time! I know XXXX is one of your password on day of hack.. Lets get directly to the point. Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean). When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam. immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1004. We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video. My -BTC -address: 1GohL1jDz8BapZhohN2Xry6AKPq6PiJrjw [case SeNSiTiVe, copy & paste it] You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid. if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message. I know xxxxxxxxxxxx is one of your password on day of hack.. Lets get directly to the point. Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean). When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam. immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1013. We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video. My -BTC -address: 1KzA7GYSyvXCmPpojZ4qTbZGmjjbbSfwBg [case SeNSiTiVe, copy & paste it] You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid. if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message. Lets get directly to the point. Not one person has paid me to check about you. You do not know me and you're probably thinking why you are getting this email? in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean). When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam. immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account. after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you. Best solution would be to pay me $1002. We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video. My -BTC -address: 1JXvEapcRCvywymcrYZ1rcCfLfNZKri4LP [case SeNSiTiVe, copy & paste it] You could go on your life like this never happened and you will not ever hear back again from me. You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google). if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too. I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid. if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on. Nevertheless, if i do get paid, i will destroy the recording immediately. If you need proof, reply with Yeah then i will send out your video recording to your 8 friends. it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message. Hello! I'm the software engineer who hacked into your device's OS. I've been observing you for months now. The thing is, you've been infected with malware through the adult website you visited. In case you're not familiar with it, I'll explain. The Trojan infection gives me full access and control over your computer or any other device on your local. It means that I can see everything on your screen, turn on my camera and microphone, but you do not know about it. I also have access to all your contacts, social networking data and all your correspondence. Why didn't your antivirus detect any malware? A: My malware uses a driver, I update its signatures every 4 hours to keep your antivirus silent. I have made a video showing how you satisfy yourself on the left side of the screen, and on the right side you see the video you have been watching. With one click, I can send this video to all your contacts in the email and social networks. I can also publish access to all your emails and messaging apps that you use. If you want to prevent this, at that point: Transfer $400(USD) to my bitcoin wallet (if you do not know how to do it, then type in to Google: "Purchase a bitcoin"). My Bitcoin Wallet:1EGBGBptS9yKNPYYU9qUEoPNLptee8CEq9 After getting the payment, I will destroy the video and you won't hear from me again. I will provide you 50 hours (more than two days) to pay. I have a notice that you read this email and the timer started you opened it. Don't attempt to answer me. It doesn't make any sense (the sender's address is generated by random). Filing a complaint somewhere doesn't make sense, because this email cannot be tracked, and neither can my bitcoin address. I don't make mistakes. If I find that you shared this message with someone else, the video will be distributed immediately. Good luck with that. And here are some common keywords used in the email so that this thread can be found by people Googling the email: "Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, .br, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material""Marlware, international hacker group, No person has compensated, very own video clip, software on the adult, porno sitio, one of your pass word, specific pixel, sexual content web portal, a malware on the adult, a malware on the, double-screen, is a reasonable price tag for our little secret, you have a good taste lmao, I placed a malware on the adult vids, your browser began operating as a RDP, had been abusing yourself in front of computer display, you are one of those people that downloaded the malicious, I made a split-screen video, While you were watching the video, your web browser acted as, malware on the porn website and guess what, an unique pixel, you jerked off while watching an online video, When you pressed the play button the virus begins saving all the things thru, ja.scr, My malicious soft started your front cam, and also send the video link to all of yourfriends, I infected your gadget with a malware and now, AnywaysI downloaded all contacts, my program quickly got into your system, To a time where you jerk off watching","For the present moment I have at my disposal all, When you arouse sexually watching porno, In such a way all needed compromising material and contact, All information to yours SNSs user accounts, You watched sexual content portal and toss","Hello! WannaCry is back! All your, in front of the screen browsing adult stuff, As you flog the dummy watching, U are going to be offered 5 days after checking this notice, RAT 68006, the damnific malware, pastime and entertainment there, not my single victim, beat the dummy, buff the muffin, choke a chicken, front camera capturing video, with you frigging, with you chaturbating, with you masturbating, web digicam, U are going to have 5 dayss, i utilize just hacked wi, pressured this trojan to, glue a pair of videos, glue two videos, the RAT, if you want me to destroy this whole video, downloaded all contacts from your computer, your list of contacts or relatives will, I made a video that shows how you masturbate, hacked you through a virus in an ad on a porn website, my illiteracy, nоt mind on my illiterаcy, I рilfered all рrivy bаckground, videоtaре with yоur masturbаtion, my delеtеrious soft, cаmеra shооt the videоtaрe, you sеlf-аbusing, Differently I will send the video to all your colleagues and friends, your front-camera made the videotape with you self-abusing, RAT 98390 malware, the minute you went to one adult page, information to contact info I discovered on your devices and remember there is a lot of these, not including Double VPN As a result, I forced my malware to hook up to a mic, web camera and catch the video from it, poisoned a number of adult sites, video clip to fit on a single tv screen, This letter has invisible monitoring program inside and i will be aware of when you are going to check, doing ur stuff and a clip u jerked to, the investigation will last, I uploaded our malicious program on your device, furthermore malware saved exactly the video you chose, its a record with your wanking, friends will see u taking proper care of yourself, Your system is controlled by the malicious program, If you were more careful while playing with yourself, that whacking off to adult web-sites is, adult website which was poisoned with my malware, nor i think that jerking off to porn sites is really a gross thing, so I dgf lmao, proof just reply to this email with, if you want me to destroy all this compromising evidence, will send your video to 5 contacts, amount in Usd that can cope with this scenario, You are welcome to contact your local authorities, If you want proof, reply with, i pride myself in being apart of an internet group, so i dgf, I take good care of my being anonymous, information related to the RAT virus, been able get in to all ur units, to all of your contacts including, search engines like goo, case sensitive, so copy,, and at this moment I, It is a non-nego, don't waste my perso, thi s mes, back while visiting, showe ring, what should you do ?, porno webpage, this embarrassing situation, navigated to the page, bare-assed, on well-known websites and publications, I got an order from someone to kill you and your family, immediately kill your family, is an explosive device, My mercenary is, explosive device detonates, triggered your webcam, piquant websites, my exploit downloaded, replenish btc wallet, instantaneously erase, actual recorded material, neglect this email, my RAT trojan, video you jerked, I used keylogger, your disk dump, malware intercepts, installed a malware, remove your video footage, RAT onto your computer, greasy stimulating actions, excentric preferrables, porn web-page, to your Tax Department, network will be DDoS, friends, WannaCry, building a protection policy, in Tax Departament, Yours service going, we pass CloudFlare, hear fake-experts, backuped phone, -1663, of your joys, digits your phone, (porno), BIG pervert, both files and scale, naughty video clips, Soy un hacker, I installed spyware, n website with teen, malware on the porn website, very own recorded material, ιs yοur ραssρhrαse, after seeing the video of you jerking off, τhιηκ οf ιτ αs α dοηατιοη, split-screen video, 𝐄𝐧𝐭𝐢𝐫𝐞 𝐯𝐢𝐝𝐞𝐨 𝐜𝐥𝐢𝐩 𝐮𝐧𝐝𝐞𝐫𝐭𝐚𝐤𝐢𝐧𝐠 𝐫𝐚𝐮𝐧𝐜𝐡𝐲 𝐦𝐚𝐭𝐭𝐞𝐫𝐬, 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐞𝐧𝐭𝐞𝐫𝐞𝐝 𝐭𝐡𝐚𝐭 𝐩𝐨𝐫𝐧𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐬𝐢𝐭𝐞, 𝐇𝐨𝐰 𝐰𝐢𝐥𝐥 𝐲𝐨𝐮 𝐩𝐮𝐭 𝐭𝐨𝐠𝐞𝐭𝐡𝐞𝐫 𝐭𝐡𝐞 𝐩𝐚𝐲𝐦𝐞𝐧𝐭"
Focusing on building Distribution Channels helped me scale my startup to 7 figures per year. Here's how:
Build Distribution Channels, Don’t Build Products
The number one reason startups fail is because they don’t succeed in getting traction. In other words, they fail because they don’t succeed in getting enough users or customers for their product or service so that revenues could be greater than expenses. I know I know, duh, that’s obvious. But, why do startups fail to get traction? Most of the time it’s not because the product was bad or the idea didn’t solve a real problem. No, predominantly a startup doesn’t get traction because the founders don’t approach the business from a distribution first perspective. They never spend any time really figuring out how to efficiently get their product in front of their target customer. They don’t invest in building distribution channels. This brings me to my main point: You should spend most of your time early in your startup’s life building distribution channels, not products.
The Mistake Everyone Makes
You are starting a company. The reason you are likely starting it is because you have an AWESOME idea for a new product or service that just needs to exist in the world. Of course, most entrepreneurs who find themselves at this point are going to spend the vast majority of their time and energy on building out their product and turning it into reality. It makes sense why they would do this. Naturally, the new product and that thing they are creating is what they are so excited and passionate about. The product is what they are in love with. Not the question of, “How are you actually going to get people to use this product?” So the distribution question gets ignored. In this circumstance, the entrepreneur is so confident in their idea, and they just know that it will naturally spread like wildfire once they launch it. Why spend any time on marketing when the idea is this good? The sad truth is that this NEVER happens, and the entrepreneurs who take this approach wind up launching their product to crickets. No one ever finds out about their amazing idea, and no one ever uses their product. This is the mistake everyone makes. It’s the main reason why so many startups fail.
Distribution First Mentality
To win in business, I think you need to approach every new venture or startup idea from a distribution first mentality. It should be the question above all other questions when evaluating a new business: “How am I going to get this product or service in front of my target customers at scale?” If you have a hard time answering this question, then your idea sucks. You HAVE to have a convincing, plausible, and executable distribution strategy for your product. If you do not, you are doomed to fail along with all of the other entrepreneurs who make the same mistake. How We Built Distribution First When starting our cryptocurrency tax software company CryptoTrader.Tax, we started with distribution first. From the launch of the company, we knew that it was extremely likely that one of the strongest distribution channels for this type of product would be Google Search. We knew this because we could see that there were THOUSANDS of searches being done on Google every month for questions like, “How to report cryptocurrency on taxes”, “Crypto taxes”, “Is bitcoin taxable”, etc. We used tools like Google Keyword planner, Ahrefs, and Ubersuggest to see keyword volumes on Google. The distribution channel was the search engine. So, if we could rank highly on Google for these types of search queries, we’d likely get a consistent flow of users into our website and into our cryptocurrency tax automation app. It’s that simple. We had an idea for an app, and we came from a distribution first angle: how can we get our app in front of our target customers? With that question answered, we started focusing on writing high quality content discussing the tax implications of cryptocurrencies. We published this content on our blog, and then focused on getting this content ranking as high as possible in the search results (SEO) for high volume queries like “crypto taxes” and “how to report crypto on taxes”. Before our product was even complete, we had thousands of people reading our blog content and signing up for the waitlist for an application that would automate all of their crypto tax reporting, a TurboTax-like experience for crypto investors.
Build the Distribution Channel
The examples of wildly successful entrepreneurs who took this same approach and built out distribution channels before launching products are endless. One of my favorite recent examples is what The Hustle did when launching their subscription informational product Trends. The Hustle is a media company that spent years building a free tech and business newsletter that gets read by millions of people every day (now THAT is a distribution channel). Then, on the back of this distribution channel, they launched a subscription product that helps identify up-and-coming startup Trends for hopeful entrepreneurs. The result? Within a year of launch, Trends is making the company tens of millions of dollars. This is only possible because the Hustle built their distribution first. They can now reap the benefits of owning that distribution in dozens of ways—including launching related products to their audience and making millions.
Spend more time thinking about how you’re going to effectively distribute your product over how you are going to build it. Better yet, build the distribution channel before the product is ever even live. Your chances of success go up exponentially. If you want to learn about more scrappy marketing tactics that will add jet-fuel level growth to your business, you should subscribe to my email list below. I blog about all of my marketing tactics that I am using to build my businesses, like the time I made $13,000 by growth hacking Instagram. I then email out all of my best tactics and ideas directly to the people on my email list. I’ll see you in the inbox! Original article: https://davidkemmerer.co/distribution-channels/
What I currently use for privacy (after almost 2 years of long investing into it)
I just wasted 15 minutes debunking some new hit spreading in COVID-sceptic community, so I share it here, so you don't have to.
One of my conspiracy-theory prone friend has sent me a movie clip and asked what I think about it. As usual, I decided to make a quick research, and it turned out pretty quickly, that I can say something about it. So since I wasted 15 minutes for it, let me write it up for you, so you don’t have to do it. So what is the movie I am talking about? We see a table in some obscure classroom. Behind it a row of people is sitting, with each of them displaying a tiny country flag in front of them. A lady introducing herself as Elke de Klerk speaks. On behalf of Dutch doctors she informs us, that COVID pandemics is a fake, and that they are going to sue Dutch government for harming people with their anti-pandemics activities, or something. Sorry, I haven’t been listening too carefully. Instead of that, I put my web search engine for a good use. And this is what I found:
no mainstream or even somehow reliable media outlet covered that as a story (unless we generously count a portal of Polish radical right). I found one article in Dutch in some strange source, which pretty much impartially relates the story. That confirms that Elke de Klerk might be real, as they say about her. They merely confirm that she is seeking other doctors who want to join her in suing the government.
the clip firstly appeared at websites such as infowars. You know, the one spreading extreme right-wing propaganda, let’s agree that it is not the most reliable source. Other sources are of similar provienience.
the movie is watermarked by Oracle Films. Very little is known of that company. They have a simple website where they write that they offer media services for krypto-currency industry. (It could mean that they themselves take Bitcoin payments. Handy if you don’t want to know who paid for it, right?)
internet websearch for practicing doctors in the Netherlands does not know anyone called de Klerk. The web search does not show any researcher of that name either. There is Elke de Clerck at Gent University, but I found her photo and she looks nothing like the lady from the clip. Also, Gent is in Belgium, not in Holland. There is also Elke de Klerk in Belgium. She practices as a GP on the outskirts of Antwerp. In the Dutch article I mentioned above you can read that Elke de Klerk has no right to practice as a doctor in the Netherlands and that she has been trained in Belgium, so that can be her. It is suggested that she has no right to practice in the Netherlands, but it does not say if she hasn’t nostrified her diploma, or if she was stripped of it.
when Elke de Klerk finishes, another lady takes the microphone (or, to be frank, an old model of Zoom voice recorder – I recognized it, as I have an identical one at home. Very professional, Oracle Films, good job!). This lady is really easy to find, it is indeed professor Dolores Cahill from Dublin. You might heard about her in July, when she was kicked out of her job for spreading anti-science nonsense in the interview with right wing Youtuber. Interestingly enough, Dolores Cahill is also a politician – she is one of the leaders of radical right, anti EU party in Ireland. The fringe party with no parliamentary representation, which comes not as a suprise when we remember that over 90% of Irish people are happy to be in the EU. She is also anti-vaxxer pro-epidemic and she is a speaker on the Irish anti-mask wearing marches.
So much for facts. Now, let’s use pure logic and think: what is more probable: – COVID is a sham, but someone managed to bribe practically every doctor on this planet and thousands of scientist, so they falsify data. Millions of people fell for it, and they believe it so much, that some even get sick or die of COVID-19 or – someone found a few people related to medical science in this or that way and/or made them to record that clip, in which they tell COVID-19 is a sham, so people oppose the governments, that already struggle with tackling the pandemic, in hope to even more destablization of the politics in the EU, which makes a certain guy in Kremlin happy. William of Ockham aks if you want to borrow his razor?
To sum it up: the COVID is not a fake. This is just a movie clip spreaded by radical right as a part of their disinformation campaign in hope to destablize European politics even further. Don’t fall for it: as conspiracy theorists will tell you: think for yourself. But be skeptical and critical: check sources of everything before you propagate it further on the internet!
I have ADHD. I was diagnosed at age 12. What happened is I got to middle school, and my life fell apart. It came on like a typhoon. Things seemed alright as I started, but I still remember that October when my family went to sixth-grade check-in. My twin sister went first. The meeting lasted about four minutes. She and my parents left with smiles all around and talk of getting In N Out on the way home. Then it was my turn. Every teacher I had stood in a circle. They seemed...different. One by one, they went around and told me that I was shit. Some were nicer than others, but everyone had the same message to convey: Doesn't complete his homework all the way Distracts others trying to learn Unable to follow along in class Not sure if he can keep up I then heard my grades: C-, D+, C+, A in PE, C, and an F in Social Studies. I don't remember being ashamed or embarrassed or anything. I remember being confused. I had gone to school every day and tried hard and thought I was doing what the teacher asked. Nope. Guess I wasn't. Nobody had much advice for me. They just wanted me to know that I sucked. And that my parents should understand so. I don't know if my parents freaked out or punished me or what. But they weren't happy. The last to go was my social studies teacher, Sven. He asked me if I knew how to read. I politely nodded my head. But he wasn't sure. He talked about all the symptoms he had seen from me. To counter, I pulled a grad-level book on the Cold War off a shelf and read a page aloud while trying not to cry. People were even more confused. Some estimate that a child with ADHD will receive 20,000 more negative comments before the age of 12 than a non-ADHD child will. I can't speak to that exactly, but I can say that this was not the only time I've had a room full of people upset with me for reasons I never saw coming. It doesn't get much easier. Sven caught up to us as we walked to the car. He was cagey with his reasoning, but he told us that there might be something up with my brain. He recommended I get tested by a psychiatrist and see what she had to say. I've since come to my conclusions where he got such an idea. The testing was fun. I've always liked tests. Didn't mention it, but they also thought I couldn't read in 2nd grade. Lol. That one went away after I took a standardized exam and scored in the 99th percentile of the nation in reading. I thought standardized tests were fun, you see. I moved a bunch of colored balls into colored holes and tried to remember what color things were after 10 minutes and everything else you might expect. I didn't know what I was even doing, but I felt I could hang. Three weeks later, I got my results. The only part I remember is that my psychiatrist noted that in her entire career, she had never met someone who scored higher on specific tasks and yet lower on others. My chart looked like OJ Simpson’s polygraph. I could keep going, and in another article, I will. But this is how I got diagnosed. And the key to all of it was Sven. Everything makes perfect sense after the fact, but only when you realize that a single teacher served as the link that completes the narrative. I do not know where I am today without him. I got lucky that this story takes place in 2003, and at a private school with teachers who genuinely cared about me. For reasons a lawyer in the comments needs to help me understand better, public school teachers seem loath to alert students of disabilities of any kind. This includes ADHD but also things like autism, dyslexia, and mood disorders. Things that seem apparent to me in a way that makes it seem impossible that no other teacher in the past 13 years hasn’t also picked up on them. That means many students go through primary schooling while having no idea they have a problem at all. When I mention to a student they might have ADHD, they are first confused, but then some memories come back. The first is that someone, usually a sports or music coach, had once told them the same thing. The other is that they remember a lot of teachers saying weird stuff they didn't understand at the time. Stuff like, "You’re so talented. I just wish you could be better focused. Have you talked to anyone about why you could be having trouble?" To me, those sound like hints from a teacher who has been told by her bosses not to put the school at risk. I am not a teacher. I'm a private consultant and can pretty much say whatever I want. I am also not a doctor - people would die - but I am a concerned adult who has taken courses in spotting learning disabilities. I'm also someone who will do absolutely anything to make sure his students have the best chance for success now and in the future. I'm also someone who asked both my ADHD-psychiatrist (hi!) and ADHD-therapist (hi!!!!!) if I had the right to tell students if I suspected something; they both went, Ya, dude. Totally. So I try to be Sven. I try to pay attention to what my students do and say and provide feedback that can help them. I'd like to note what that feedback is here to make sure people don't miss it because my pieces go on for way too long. If you are a high school student who suspects he or she has ADHD, your best course of action is to talk with your parents and look into being tested by a professional psychiatrist who specializes in the topic. These tests are expensive, and mental health insurance in America sucks balls. But this is the fastest, most straightforward route to getting the help you need. Option two is to try and work with/through your public high school to get them to pay for it.This site has some good info. My guess is that this method will suck. Public schools don't have a lot of funding and will not want to spend it on you. That's not your problem. You will almost certainly need your parents to back you up on this one and sit through a lot of boring meetings. I assume a lot of people will tell you a lot of reasons why they can't help you. Your response every time should be some version of, "Sure. But I need help with this. And I'm not going to stop until I get the support I need. So what do I do from here?" Then you blankly stare at them and refuse to leave until they get you at least to the next step. I'm not sure how well this will work. If you do attempt or have attempted this method, please DM me or contact my Email with your experience. I want to know if this is even worth my student's time. If you can not afford traditional testing or do not feel your parents would support such testing, your best option is to wait until the day you turn 18 and then register for a telehealth company specializing in ADHD. The one I use and recommend isHelloAhead.com. They're neat. They do not take traditional insurance, but their rates are much lower than most doctors. They are cheap enough that I feel an average 18-year old who wants help could find a way to afford it on his or her own. The downside with these sites is the waiting times can be long. Took me like five months. Other such sites are popping up, and while I can't vouch for them, they all seem to offer a similar service. Those paragraphs are what I want every student here to know. I'm much more comfortable having a trained doctor tell you what the deal is than I am trying to do it myself. But I have to see something if I want to be Sven. The question then is, how do I see it? For spotting ADHD, it's shockingly simple. And I'll get to the real reason at the end. But for now, here is what I see when I see a student with ADHD. The best way I can describe their lives is "endless chaos" The chaos isn't always bad! Rarely it's fun chaos, but often it's just chaos chaos. This chaos exists in both physical and mental forms. Physical: Their shit is such a mess. Everything. Most of the work we do is digital, so I see the Google Doc version of their mind. Folders make no sense. Things are labeled inaccurately or not at all. Schools get combined, or separated, or forgotten altogether. It is not a single type of error, but instead a collection of small mistakes and poor decisions that make the work impossible to corral. I have some kids that are messy or lazy, but this is different. It's like if the original folder system I built for them was an amoeba in a petri dish. Leave that dish out for a weekend and come back. The patterns will be remarkably similar to the organizational gore that they then try to utilize. Mental: There's always a story. "I was late because my car has a flat tire, and the guy was late, so I had to take an Uber." "I didn't know my music essays were due a month early because the form only mentioned there being a recital." "My friend is mad at me, but it's only because she didn't tell me we were the first group presenting, so I spent more time preparing our project". These stories make sense at first. But after a few weeks, they start to pile up. Then I become the one hearing a story about why they didn't do what I wanted, and I stop being so forgiving. ADHD is a neurological disorder. Not a mental illness. It's closer to diabetes than it is bi-polar. "ADHD" is a fairly garbage name for the condition because A) it has a stigma, and B) it isn't even accurate. Both attention deficit and hyperactivity are symptoms of ADHD, but they are not the problem itself. It would be like calling clinical depression "low energy and excessive guilt disorder". ADHD is actually an issue involving improper dopamine regulation in the brain combined with under-activity of the brain's executive function component. The executive function center is the part of your brain that is in charge of making sure all the other parts of your brain play nice and communicate. When the executive function center breaks down...those other parts don't. The result is a failure to plan or coordinate + a need for impulsive stimulation, thus resulting in endless chaos. This is what I’ll ask you if you DM me, btw. Is your life endless chaos? Sometimes do you like the chaos? Sometimes do you get bored and create the chaos yourself just to see what might happen? But when that chaos stops being so fun, can you make it stop? They're very, very intelligent You've probably heard about the "gifted ADHD genius" thing before. I don't think it exists. My theory has always been that the "gifted ADHD child" is a victim of survivorship bias. The research states that ADHD has either no or a negative correlation with intelligence. There is also a startling overlap with ADHD and incarceration. This means that students who still manage to succeed despite their disorder tend to have advantages that keep them in the game. Namely that they're smart as hell. The other saving grace is that they come from secure support networks that prevent them from unraveling completely. I've heard from such students that their mom or dad works tirelessly to keep their life in order and to make sure they're getting things done. I do not think it is a coincidence that when ADHD students leave for college, things often fall apart. The fact that there are ADHD kids that others know and still like makes some think ADHD isn't so bad or comes with natural cognitive advantages. Those same people do not become friends with the ADHD dumb kids who would disprove those perceptions. Do you remember that kid in elementary school who was his own worst enemy? He never had friends, and everyone was kind of afraid to even talk with him? He was kind of a bully but mostly just awful? He invited you to his house one time, but your mom wouldn’t let you go? That is my best guess of what a dumb kid with ADHD is like. It sounds cold writing it, but you know which kid I'm talking about right now. Where do you think that kid is today? I end up with the smart ones—the ones with parents who care. And God damn are these kids smart. They're brilliant, and funny, and likable, and charming. They have something different about them that makes them undeniable. And it's not just me. I worry I play them up too much in my mind, but then I chat with a teacher or coach of theirs. It's always the same thing: Oh, she's brilliant. She can be so frustrating sometimes, tho. They can be so frustrating sometimes, tho The word is frustrating. Now bad. Not nasty. Not unlikeable. Frustrating. I have some students I just don't like that much (no, not you). What tends to be the common theme with them is that they don't have much interest in my help and display a work ethic to match. On the other spectrum are the world beaters (totally you). These kids kick ass and not only follow my advice but often take that advice to the next level in ways that awe and inspire me. And then there are the kids I think have ADHD. They don't do stuff all the time. They don't finish an essay, or they forget to spell check like I asked, or they write about something that has nothing to do with the outline we built the week before. That's not necessarily the frustrating part. You kids are 17; you make mistakes. Early on, I try to spot these mistakes and point them out. Even the students who don't like me seem to get my point after enough prodding and the problem goes away. With these kids, the problem does not go away. Or if it does, another problem pops right back up to replace it. It makes me feel like there's nothing I can do. It would be easier if the student was just a brat. Then I could either become a brat myself or mentally check out because "hey man, your future”. I need a name for kids I suspect have ADHD…"MaybeHD"? Ya. That’s super funny. Say it out loud and try not to laugh. But these MaybeHD kids do like me. And they do want to get into school. And they do feel bad when I get upset with them. I end up in long, drawn-out conversations with them about why this is important and why they need to make specific work a priority to get into the schools they want to go to. Then they nod meekly and head home. Then they come back next week, and it's the same story. Frustrating. They are randomly awesome at the weirdest things I love weird talents. Things that no one offers up immediately, but then you're chatting, and it comes up naturally. "Oh ya, I love animals! I raise baby pigs in my backyard!" "You do?" "Ya!" At some point, the MaybeHD kid read something or watched a Youtube video that he or she liked. Then they wanted to try it. Six months later, they're making 4k a month selling custom bathrobes on Etsy. There's rarely any logic. "Do you like baths? Or making clothing? "Not really. I just thought it looked fun, so I bought a sewing kit and started making things." There is a noted link between ADHD and entrepreneurship. I see it with my MaybeHD students. They have an insatiable drive and passion for following up on curiosities that other students don't possess. Passion is the wrong word. They have obsessions with mastering concepts in a way that feels beyond their control. The obsession itself drives them to be great. The literature on the subject is cloudy. But there exists a term in ADHD circles called "Hyperfocus". If you know what "flow" is, it's kind of like that. Only more intense and less controllable. I often see the remnants of past hyperfocuses in their stories. They used to run that pig farm. They used to sell bathrobes. They used to be really into getting good grades at school. But then one day, just as quickly as they picked the skill up, they dropped it. They can seldom tell me why. Their priorities are completely out of whack The downside of hyperfocus is that it can be so all-encompassing that other priorities fall by the wayside. One of my favorite students ever is named Elleway. We chatted in our first meeting, and I was instantly intrigued by her background. She said she had designed and prototyped a unit that would automatically roll under parked electric cars for hands-free charging. I hear a lot of impressive stuff in my job, and a lot of it ends up being not that impressive. But then Elleway showed me the prototype video she made back when she was a high school freshman and it blew my mind. https://youtu.be/Y5Ap2uMbWL4 Can you do that? I sure as hell can't. She wasn't even an engineer. She calmly explained that she had partnered with several older male engineers who had helped turn her idea into reality. Then she had done all the promotional and marketing work herself. Then she got second out of 300 students at a young entrepreneur contest held at Columbia University. Shortly after, a tech CEO came up to her and asked if she would like to work with him to file a patent for the invention. She agreed and is now a trademark holder. That was all in our first 10 minutes. She then went on to share the half dozen corporations she had worked for. And the three businesses she started. And the graphic design work she made for her website. She told me how she was a Nationally ranked fencer until she lost interest. She was now merely a Nationally ranked golfer. Then I saw she had a 2.9 GPA and thus zero shot at getting into NYU like she hoped. I did not initially think Elleway had ADHD. I thought she was a pathological liar. It seemed impossible to me that this same girl who had already taken a grip on the world was then unable to keep up her grades in math. That just isn’t how any -any- of my other ultra high-achieving students behave. Then Elleway showed me pictures of her casually hanging out with Andrew Yang. And then her LinkedIn With a lot of people who do not accept your request unless they want to. I had to figure out what the hell led to all this. Elleway’s patent and ambition to work on it had taken up all her time. She was so singularly focused on doing what she cared about that the world behind her didn't seem to exist. She was hyperfocused on a goal, but once she reached it, she woke up to a reality that punished her for ignoring everything else. That's the longing writer's version of the story. The more popular one is that she didn't give a shit about school, was warned repeatedly about the consequences, and ignored them. She got what she deserved. That’s the version the rest of the world had for her. It goes back to frustrating. I've gotten kids into NYU that don't show a fifth the potential that Elleway did. Those kids went to all the camps their parents paid for and entered competitions with a tech doorbell or something lame, and they're just fine. But MaybeHD students are often world-beaters in ways that make them seem so special. They talk endlessly not just about what they're into but how they figured it all out and why it is all so important to them. I believe them, and I want to fight for them. So I give them as much assistance as I possibly can. But then they don't do the increasingly easy tasks I ask for them to complete. Then they suffer the consequences. Elleway didn't get into NYU. She didn't get in much of anywhere. It eats me up inside, and I feel like I failed her. I don't know how many other people in my position would feel the same way. That's why I have to be Sven. This is getting long, and I'm getting depressed. Here's the TL: DR of what I see when I see a student with ADHD ... Me. I see me. And it can hurt really bad knowing what a condition like ADHD does to a young person's life. My life is endless chaos. I've been out of food for nine days. My house looks like Badger from Breaking Bad bought a loft in Palo Alto. I am still writing this at 3:25 AM when I have to be up for work at nine. My cat has started doing this thing where she sleeps in her food bowl when it gets empty. It's equal parts adorable and humiliating. I'm smart as shit. I know it. I made up half-ideas. That article is absolute fire. I got published on Cracked.com five times in 2011 when that meant something. I went to Tulane on a half-ride merit scholarship, used to win creative writing contests, and have done a bunch of other writery stuff that made people stand up and go, "Woah". But I only made it to college because my mom carried me there, kicking and screaming. She packaged my life together, and I held on for the ride. Then I got to school and made it two months before she got an Email alerting her that Tulane was planning to revoke the remaining $70,000 of my $80,000 scholarship due to my grades. I barely scraped by and survived. But the shame and frustration in her voice when she read me that letter over the phone haunts me to this day. I analyze handwriting. And I turned a Reddit account into a successful business in four months. And I collect college T-shirts from schools my students go to. And I own Bitcoin I bought in 2011 for $4.50 each. And I'm teaching myself piano with a video game. And I'm exercising with a video game. And I'm ranked 42nd in Northern California at Super Smash Bros Ultimate. And I’ve tried the nachos at over 100 Taquerias in the Bay Area. And I own a really cute cat. But I've spent 15* hours this week writing this instead of a sequel to that Costco piece. I have one coming where I edit my Common App essay from 2009. It's a great idea and a great article. One that will drive significantly more business to my site than this piece will. Hell, I predict this piece is likely to lose me business because I come off like a mess in it. But it's what I want to write, so I feel like I have no choice. *The 15 hours is a guess. I have no idea how long it takes me to write and edit these things. I start typing and X hours later look up and realize how hungry I am and how much I need to pee. The writing controls me. I see myself in my MaybeHD students. I see their unfettered curiosity and flair for taking as much good from the world as possible. I see their infectious enthusiasm and ability to quickly forgive others because they know too well how it feels to want forgiveness themselves. Yet I also see their inattention to detail, their weak excuses, and their general confusion that makes me realize they couldn't fix some problems if their lives depended on it. I see their sadness and shame when those mistakes pile up. I see when the chaos stops being fun, and they want out, but they don't know how. I don't know what I, as their consultant, can do. But as Sven, I can recommend they go talk to someone else... Hey, so, I was considering hiring you and all...but you seem kind of bad. Why should I trust you? Because a couple of years ago, I got back on my medication and turned my life around. You aren't reading this if I don't reach out for help and trust a trained psychiatrist to guide me. There are no groups of friends in Delaware or Connecticut comparing their half-ideas lists. There sure as shit isn't a CollegeWithMattie.com. I still have ADHD. But one of the greatest things about ADHD is that it is -without rival- the most treatable form of mental illness or dysfunction known to man. It is not curable, but there are endless medical and non-medical options available for those willing to reach out and get the help they need. My story is that it was only by getting re-medicated that I then could learn and use coping mechanisms that allow me to achieve the type of life I've always wanted. Christ, 4,400 words. You know, I'm also submitting this for a class I'm in. That's why all the backlinks are to actual sources instead of links herding you into my website. Hi Amy! That's one more thing. ADHD people are hyper-efficient...Kind of. Alright. If you're still here reading this, you might be suspecting some things about yourself. My DMs are open if you want to chat, but again, I am not a doctor. I will say that right now, as you prepare to head to college, is a really good time to get this all figured out. College is a giant reset button on your life. Figure these problems out now so that by the time you head off for your next chapter, you will have given yourself the best possible chance to succeed. Endless chaos. Here is the bold part again: If you are a student in high school who suspects he or she has ADHD, your best course of action is to talk with your parents and look into being tested by a professional psychiatrist who specializes in the topic. These tests are expensive, and mental health insurance in America (still) sucks balls. But this is the fastest, most straightforward route to getting the help you need. Option two is to try and work with/through your public high school to get them to pay for it.This site has some good info. My guess is that this method will kind of suck. Public schools don't have a lot of funding and will not want to spend it on you. That's not your problem. You will almost certainly need your parents to back you up on this one and sit through a lot of boring meetings. I assume a lot of people will tell you a lot of reasons why they can't help you. Your response every time should be some version of, "Sure. But I need help with this. And I'm not going to stop until I get the support I need. So what do I do from here?" Then you blankly stare at them and refuse to leave until they get you at least to the next step. This will suck and I'm not sure how well it will work. If you do attempt or have attempted this method, please DM me or contact my Email with your experience. I want to know if this is even worth my student's time. If you can not afford traditional testing, or if you do not feel your parents would support such testing, your best option is to wait until the day you turn 18 and then register for a telehealth company that specializes in ADHD. The one I use and recommend isHelloAhead.com. They're neat. They do not take traditional insurance, but their rates are much lower than most doctors. They are cheap enough that I feel an average 18-year old who wants help could find a way to afford it on his or her own. The downside with these sites is the waiting times can be really long. Took me like five months. Other such sites are popping up, and while I can't vouch for them, they all seem to offer a similar service. Update: The lines aren't that long anymore! Monday was Elleway's 18th birthday. She sent me a screengrab of her upcoming Ahead appointment in early September. She told me she spent the entire day crying because all her friends were going off to great schools and that she was stuck at home. I've told Elleway that I plan to help her reapply to NYU this year. I doubt I will ever want to see another student succeed as much as I will with her.
So I'm looking through my old yearbooks, and I'm realizing that I missed out on a crucial part of my life: during high school, I was supposed to have a punk phase. I can't believe I missed it! It seemed like everyone was rocking their unruly hair, their unkempt clothes, and their general disaffection towards life. Man, Green Day released new records, and there was an unrelenting hatred for all types of authority figures... Wait, this is just a slab of concrete with newspaper articles from 2020 stapled to it, isn't it. Regardless, the universe is telling me it's time for me to reclaim my lost childhood experiences; to go back to a better time. Unfortunately, latent legal issues surrounding my controversial "BONG HiTS 4 JESUS" sign prevent me from going within 500 feet of any type of school, so winning the basketball championship and visiting the aquarium are right out. But I can still be the moodiest, edgiest, darkest person on the planet, and now that I've beaten Shadow the Hedgehog all the way through and went to Hot Topic, it's time to build a commander deck that's truly me. Presenting: RAMSESO V E R D A R K!
Ramses is the bad boy your mother would never let take you to IHOP. Not that he'd care; his business is killing, and he's efficient at it too, costing the least out of any commander I've ever written about. You want to sit around and drink tea with your little enchanted princess friends? Ramses Overdark is here to tell you how the real world works. Nothing personnel, kid.
Commander For You
Like a TI-83 Silver Edition, Ramses is a stone-cold calculating problem solver, but he only gets that way with some preparation. See, killing is a business, Ramses' business, and the one thing every business needs is synergy. So call me Nathan Fielder, because I'm going to unveil the plan that will keep this enterprise running smoothly:
Procure the payment.
Keep your friends close.
Keep your enemies closer.
Go to work.
As a teenager, I procrastinated from my task of being edgy by protesting government-backed financial institutions with the Bitcoin community, and one thing you learn there very quickly is that assassination ain't cheap. The first and most obvious barrier to breaking 18 U.S. Code § 1117 is his six mana casting cost, and unlike Gabriel, Ramses demands something a little more tangible than a green thumb to appease him. We're going to use the usual fare: rings, trinkets, stones, lockets, relics... archives... spheres? With you as an investor, Ramses' business (which is killing) will make a killing, letting us take full advantage of Revel in Riches as both a ramp tool and backup win condition. Ramses will also often require additional gas to keep going, whether it be finding a steady stream of enchantments to throw onto enemies, or to finding ways to close out games.
And don't forget about the artifacts that sacrifice themselves for cards: In a pinch, you can throw Curator's Ward onto them instead of Ramses.
Enchantment payoffs are few and far between in Dimir, so we're keeping this build a bit creature-light; but the ones we take with are absolutely vital for our success. While Ramses is no Cleopatra, he's still managed to form relationships with some important Greek allies:
Hateful Eidolon is another great draw engine. You're going to be enchanting enemy creatures constantly, so it'll be a steady stream of card advantage.
Protean Thaumaturge can transform into copies of anything on the board, and since you're usually targeting huge threats, he's straight value.
If you prefer just taking creatures instead of becoming them, Rootwater Matriarch is the mother everyone wants to follow, as she takes control of enemy enchanted creatures.
Man, she's way cooler than my mom. Incidentally, these control changing effects can go away, so lets include a sacrifice outlet, like Blasting Station.
Nighthowler is both the name of my new punk band and a decent Bestow creature. Cast it as a creature directly, or use it to build up Ramses' hit-list first.
Blightcaster lets you snipe less relevant creatures while you go for the big ones. I like saying "pew!" when I ping things. Please, take me seriously.
Grim Guardian is an Aristocrats-style payoff for enchantments, which is exactly the sort of talent Ramses' agents should be recruiting.
Rootwater Shaman gives your enchantments flash, making your targets subtle and you s n e a k y. Pretty sus, bro.
Agent of Erebos is repeatable graveyard exile, which isn't necessarily worth a slot but it pisses off Sandy, my Muldrotha-playing ex-wife.
Our deck only runs sixteen creatures, and while being a lone-wolf is edgy, it's not the type of edge I want to be. I feel like I'm a Halloween bobbing apple -- razor edgy; the type of edge that speaks to people, in the very depths of their soul, and causes them to rebel against the man. In the end, I will be so edgy that even those rotten adults will realize I'm right. Enchant opposing creatures with reanimation-on-death enchantments:
Once opposing creatures are enchanted with one of these Auras, they become juicy targets for Ramses, as killing them will put them into play under your control. Unfortunately, six isn't a critical mass for Ramses; to ensure that Ramses' business isn't killed by a lack of clientele, let's use some recursive enchantments.
Remember Dragon Fangs from the last article? Dragon Shadow and Dragon Wings come back to haunt your opponents, auto-enchanting beefy boys at your discretion to give Ramses a target.
Echoing Fallen Angel from Ramses' set League of Legends, Fallen Ideal is a recursive enchantment that's also a sacrifice outlet.
The "Most 2020 Mood Award" goes to Despondency, which lowers a creature's power and keeps comin' back, again and again.
Screams from Within is unique in that it will auto-attach after death instead of coming back to your hand. Be aware that if you've got no enemy targets, it's gonna end up on Ramses.
Slow Motion's Pendrell-type effect might be enough to save you a Ramses activation if your opponent doesn't care enough to pay the toll.
Rounding out the auras, we've got a few utility spells we can play for neat effects:
Ramses' weapon of choice is obviously the Doom Blade, which he'll cast for you if his target is enchanted with Chime of Night.
If you prefer opponents to discard cards instead, Dying Wail's got you covered.
Your opponents will be at world's end when you exile their big threats off the top of their deck with Dead Man's Chest. This is the type of luxury even Gonti's jealous of!
And here's some spicy tech for you: Ensoul Artifact lets Ramses remove an artifact with his ability.
A lot of creatures are going to end up dead, which makes Rise of the Dark Realms a great end-game finisher. But that's boring. Are you ready to learn Ramses' true dark secret? Because here's where I blow your mind.
...lets you sacrifice Iridescent Drake to Blasting Station which...
...deals 1 damage and triggers the enchantment which means...
..Iridescent Drake goes onto the battlefield, returning...
This combo will make you feel like Joker, because your opponents will never see it coming. You've got some redundancy in the deck in case things don't pan out: use Fallen Ideal as your sacrifice outlet and win condition to swing with an evasive infinity/infinity attacker, or deal damage using Grim Guardian's Constellation trigger. Should Iridescent Drake be interacted with (which is illegal, by the way), use Ill Gotten Gains to get your combo pieces back to hand and recur some protective counterspells. I'm not a punk, I'm a goddamn dragon genius. Finally, the deck is truly me!
In conclusion, the Ramses Overdark deck for the Commander format is a fun and powerful budget deck for you to try. I hope you enjoyed reading my paper as much as I enjoyed writing- ...Buh? Oh. I guess I reverted to hastily written high school paper writing. Is that really what I sounded like? You know, people say you never really realize what you have until it's gone. It's easy to look to memories of better days and feel that melancholy drop in your stomach. It's natural to feel wistful for a time past when rain drips down the window. But the truth is also that you don't really realize what you don't have until you obtain it. Our experiences may be painful now, but that's no reason to give up hope. You can get over darkness. Look forward instead of back, because in that future lies a wiser you.
Why Osana takes so long? (Programmer's point of view on current situation)
I decided to write a comment about «Why Osana takes so long?» somewhere and what can be done to shorten this time. It turned into a long essay. Here's TL;DR of it:
The cost of never paying down this technical debt is clear; eventually the cost to deliver functionality will become so slow that it is easy for a well-designed competitive software product to overtake the badly-designed software in terms of features. In my experience, badly designed software can also lead to a more stressed engineering workforce, in turn leading higher staff churn (which in turn affects costs and productivity when delivering features). Additionally, due to the complexity in a given codebase, the ability to accurately estimate work will also disappear. Junade Ali, Mastering PHP Design Patterns (2016)
Longer version: I am not sure if people here wanted an explanation from a real developer who works with C and with relatively large projects, but I am going to do it nonetheless. I am not much interested in Yandere Simulator nor in this genre in general, but this particular development has a lot to learn from for any fellow programmers and software engineers to ensure that they'll never end up in Alex's situation, especially considering that he is definitely not the first one to got himself knee-deep in the development hell (do you remember Star Citizen?) and he is definitely not the last one. On the one hand, people see that Alex works incredibly slowly, equivalent of, like, one hour per day, comparing it with, say, Papers, Please, the game that was developed in nine months from start to finish by one guy. On the other hand, Alex himself most likely thinks that he works until complete exhaustion each day. In fact, I highly suspect that both those sentences are correct! Because of the mistakes made during early development stages, which are highly unlikely to be fixed due to the pressure put on the developer right now and due to his overall approach to coding, cost to add any relatively large feature (e.g. Osana) can be pretty much comparable to the cost of creating a fan game from start to finish. Trust me, I've seen his leaked source code (don't tell anybody about that) and I know what I am talking about. The largest problem in Yandere Simulator right now is its super slow development. So, without further ado, let's talk about how «implementing the low hanging fruit» crippled the development and, more importantly, what would have been an ideal course of action from my point of view to get out. I'll try to explain things in the easiest terms possible.
else if's and lack any sort of refactoring in general
Perfection is achieved, not when there is nothing more to add, but when there is nothing left to take away. Antoine de Saint-Exupéry
This is why refactoring — activity of rewriting your old code so it does the same thing, but does it quicker, in a more generic way, in less lines or simpler — is so powerful. In my experience, you can only keep one module/class/whatever in your brain if it does not exceed ~1000 lines, maybe ~1500. Splitting 17000-line-long class into smaller classes probably won't improve performance at all, but it will make working with parts of this class way easier. Is it too late now to start refactoring? Of course NO: better late than never.
If you think that you wrote this code, so you'll always easily remember it, I have some bad news for you: you won't. In my experience, one week and that's it. That's why comments are so crucial. It is not necessary to put a ton of comments everywhere, but just a general idea will help you out in the future. Even if you think that It Just Works™ and you'll never ever need to fix it. Time spent to write and debug one line of code almost always exceeds time to write one comment in large-scale projects. Moreover, the best code is the code that is self-evident. In the example above, what the hell does (float) 6 mean? Why not wrap it around into the constant with a good, self-descriptive name? Again, it won't affect performance, since C# compiler is smart enough to silently remove this constant from the real code and place its value into the method invocation directly. Such constants are here for you. I rewrote my code above a little bit to illustrate this. With those comments, you don't have to remember your code at all, since its functionality is outlined in two tiny lines of comments above it. Moreover, even a person with zero knowledge in programming will figure out the purpose of this code. It took me less than half a minute to write those comments, but it'll probably save me quite a lot of time of figuring out «what was I thinking back then» one day. Is it too late now to start adding comments? Again, of course NO. Don't be lazy and redirect all your typing from «debunk» page (which pretty much does the opposite of debunking, but who am I to judge you here?) into some useful comments.
This is often neglected, but consider the following. You wrote some code, you ran your game, you saw a new bug. Was it introduced right now? Is it a problem in your older code which has shown up just because you have never actually used it until now? Where should you search for it? You have no idea, and you have one painful debugging session ahead. Just imagine how easier it would be if you've had some routines which automatically execute after each build and check that environment is still sane and nothing broke on a fundamental level. This is called unit testing, and yes, unit tests won't be able to catch all your bugs, but even getting 20% of bugs identified at the earlier stage is a huge boon to development speed. Is it too late now to start adding unit tests? Kinda YES and NO at the same time. Unit testing works best if it covers the majority of project's code. On the other side, a journey of a thousand miles begins with a single step. If you decide to start refactoring your code, writing a unit test before refactoring will help you to prove to yourself that you have not broken anything without the need of running the game at all.
This is basically pretty self-explanatory. You set this thing once, you forget about it. Static code analyzer is another «free estate» to speed up the development process by finding tiny little errors, mostly silly typos (do you think that you are good enough in finding them? Well, good luck catching x << 4; in place of x <<= 4; buried deep in C code by eye!). Again, this is not a silver bullet, it is another tool which will help you out with debugging a little bit along with the debugger, unit tests and other things. You need every little bit of help here. Is it too late now to hook up static code analyzer? Obviously NO.
Say, you want to build Osana, but then you decided to implement some feature, e.g. Snap Mode. By doing this you have maybe made your game a little bit better, but what you have just essentially done is complicated your life, because now you should also write Osana code for Snap Mode. The way game architecture is done right now, easter eggs code is deeply interleaved with game logic, which leads to code «spaghettifying», which in turn slows down the addition of new features, because one has to consider how this feature would work alongside each and every old feature and easter egg. Even if it is just gazing over one line per easter egg, it adds up to the mess, slowly but surely. A lot of people mention that developer should have been doing it in object-oritented way. However, there is no silver bullet in programming. It does not matter that much if you are doing it object-oriented way or usual procedural way; you can theoretically write, say, AI routines on functional (e.g. LISP)) or even logical language if you are brave enough (e.g. Prolog). You can even invent your own tiny programming language! The only thing that matters is code quality and avoiding the so-called shotgun surgery situation, which plagues Yandere Simulator from top to bottom right now. Is there a way of adding a new feature without interfering with your older code (e.g. by creating a child class which will encapsulate all the things you need, for example)? Go for it, this feature is basically «free» for you. Otherwise you'd better think twice before doing this, because you are going into the «technical debt» territory, borrowing your time from the future by saying «I'll maybe optimize it later» and «a thousand more lines probably won't slow me down in the future that much, right?». Technical debt will incur interest on its own that you'll have to pay. Basically, the entire situation around Osana right now is just a huge tale about how just «interest» incurred by technical debt can control the entire project, like the tail wiggling the dog. I won't elaborate here further, since it'll take me an even larger post to fully describe what's wrong about Yandere Simulator's code architecture. Is it too late to rebuild code architecture? Sadly, YES, although it should be possible to split Student class into descendants by using hooks for individual students. However, code architecture can be improved by a vast margin if you start removing easter eggs and features like Snap Mode that currently bloat Yandere Simulator. I know it is going to be painful, but it is the only way to improve code quality here and now. This will simplify the code, and this will make it easier for you to add the «real» features, like Osana or whatever you'd like to accomplish. If you'll ever want them back, you can track them down in Git history and re-implement them one by one, hopefully without performing the shotgun surgery this time.
Again, I won't be talking about the performance, since you can debug your game on 20 FPS as well as on 60 FPS, but this is a very different story. Yandere Simulator is huge. Once you fixed a bug, you want to test it, right? And your workflow right now probably looks like this:
Fix the code (unavoidable time loss)
Rebuild the project (can take a loooong time)
Load your game (can take a loooong time)
Test it (unavoidable time loss, unless another bug has popped up via unit testing, code analyzer etc.)
And you can fix it. For instance, I know that Yandere Simulator makes all the students' photos during loading. Why should that be done there? Why not either move it to project building stage by adding build hook so Unity does that for you during full project rebuild, or, even better, why not disable it completely or replace with «PLACEHOLDER» text for debug builds? Each second spent watching the loading screen will be rightfully interpreted as «son is not coding» by the community. Is it too late to reduce loading times? Hell NO.
Or any other continuous integration tool. «Rebuild a project» can take a long time too, and what can we do about that? Let me give you an idea. Buy a new PC. Get a 32-core Threadripper, 32 GB of fastest RAM you can afford and a cool motherboard which would support all of that (of course, Ryzen/i5/Celeron/i386/Raspberry Pi is fine too, but the faster, the better). The rest is not necessary, e.g. a barely functional second hand video card burned out by bitcoin mining is fine. You set up another PC in your room. You connect it to your network. You set up ramdisk to speed things up even more. You properly set up Jenkins) on this PC. From now on, Jenkins cares about the rest: tracking your Git repository, (re)building process, large and time-consuming unit tests, invoking static code analyzer, profiling, generating reports and whatever else you can and want to hook up. More importantly, you can fix another bug while Jenkins is rebuilding the project for the previous one et cetera. In general, continuous integration is a great technology to quickly track down errors that were introduced in previous versions, attempting to avoid those kinds of bug hunting sessions. I am highly unsure if continuous integration is needed for 10000-20000 source lines long projects, but things can be different as soon as we step into the 100k+ territory, and Yandere Simulator by now has approximately 150k+ source lines of code. I think that probably continuous integration might be well worth it for Yandere Simulator. Is it too late to add continuous integration?NO, albeit it is going to take some time and skills to set up.
Stop caring about the criticism
Stop comparing Alex to Scott Cawton. IMO Alex is very similar to the person known as SgtMarkIV, the developer of Brutal Doom, who is also a notorious edgelord who, for example, also once told somebody to kill himself, just like… However, being a horrible person, SgtMarkIV does his job. He simply does not care much about public opinion. That's the difference.
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/ Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners? And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess. First, let's consider some principles of Bitcoin.
You the HODLer should be the one who controls where your money goes. Your keys, your coins.
You the HODLer should be able to coordinate and make contracts with other people regarding your funds.
You the HODLer should be able to do the above without anyone watching over your shoulder and judging you.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so). So, how does Taproot affect those principles?
Taproot and Your /Coins
Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash). (technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input). However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits! Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh? With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save! And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well! (P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1) Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service! So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win! (even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot) And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!
Taproot and Your Contracts
No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade. So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust. Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade. However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade. In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address. Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants). But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer). Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos). (technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).
Taproot and Your Contracts, Part 2: Cryptographic Boogaloo
Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code. This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded. And you can do that, with HTLCs, today. Of course, HTLCs do have problems:
Privacy. Everyone scraping the Bitcoin blockchain can see any HTLCs, and preimages used to claim them.
This can be mitigated by using offchain techniques so HTLCs are never published onchain in the happy case. Lightning would probably in practice be the easiest way to do this offchain. Of course, there are practical limits to what you can pay on Lightning. If you are buying something expensive, then Lightning might not be practical. For example, the "software" you are activating is really the firmware of a car, and what you are buying is not the software really but the car itself (with the activation of the car firmware being equivalent to getting the car keys).
Even offchain techniques need an onchain escape hatch in case of unresponsiveness! This means that, if something bad happens during payment, the HTLC might end up being published onchain anyway, revealing the fact that some special contract occurred.
And an HTLC that is claimed with a preimage onchain will also publicly reveal the preimage onchain. If that preimage is really the activation key of a software than it can now be pirated. If that preimage is really the activation key for your newly-bought cryptographic car --- well, not your keys, not your car!
Trust requirement. You are trusting the developer that it gives you the hash of an actual valid activation key, without any way to validate that the activation key hidden by the hash is actually valid.
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar". Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you. Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige). (Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key). So:
Privacy: PTLCs are private even if done onchain. Nobody else can learn what the private key behind the public key is, except you who knows the adaptor signature that when combined with the complete onchain signature lets you know what the private key of the activation key is. Somebody scraping the blockchain will not learn the same information even if all PTLCs are done onchain!
Lightning is still useful for reducing onchain use, and will also get PTLCs soon after Taproot is activated, but even if something bad happens and a PTLC has to go onchain, it doesn't reveal anything!
Trust issues can be proven more easily with a public-private keypair than with a hash-preimage pair.
For example, the developer of the software you are buying could provide a signature signing a message saying "unlock access to the full version for 1 day". You can check if feeding this message and signature to the program will indeed unlock full-version access for 1 day. Then you can check if the signature is valid for the purported pubkey whose private key you will pay for. If so, you can now believe that getting the private key (by paying for it in a PTLC) would let you generate any number of "unlock access to the full version for 1 day" message+signatures, which is equivalent to getting full access to the software indefinitely.
For the car, the manufacturer can show that signing a message "start the engine" and feeding the signature to the car's fimrware will indeed start the engine, and maybe even let you have a small test drive. You can then check if the signature is valid for the purported pubkey whose privkey you will pay for. If so, you can now believe that gaining knowledge of the privkey will let you start the car engine at any time you want.
(pedantry: the signatures need to be unique else they could be replayed, this can be done with a challenge-response sequence for the car, where the car gathers entropy somehow (it's a car, it probably has a bunch of sensors nowadays so it can get entropy for free) and uses the gathered entropy to challenge you to sign a random number and only start if you are able to sign the random number; for the software, it could record previous signatures somewhere in the developer's cloud server and refuse to run if you try to replay a previously-seen signature.)
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script. (technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)
Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable?? Well, in theory yes. In practice, they probably are not. It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash. When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key. So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key. (public keys should be public, that's why they're called public keys, LOL) And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions. So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort. Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers. For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
Current quantum computers can barely crack prime factorization problem for primes of 5 bits.
The 256-bit elliptic curve use by Bitcoin is, by my (possibly wrong) understanding, equivalent to 4096-bit primes, so you can see a pretty big gap between now (5 bit primes) and what is needed (4096 bit primes).
A lot of financial non-Bitcoin systems use the equivalent of 3072-bit primes or less, and are probably easier targets to crack than the equivalent-to-4096-bit-primes Bitcoin.
Quantum computers capable of cracking Bitcoin are still far off.
Pay-to-public-key-hash is not as protective as you might think.
We will probably see banks get cracked before Bitcoin, so the banking system is a useful canary-in-a-coal-mine to see whether we should panic about being quantum vulnerable.
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).
If you are a singlesig HODL-only Bitcoin user, Taproot will not affect you positively or negatively. Importantly: Taproot does no harm!
If you use or intend to use multisig, Taproot will be a positive for you.
If you transact onchain regularly using typical P2PKH/P2WPKH addresses, you get a minor reduction in feerates since multisig users will likely switch to Taproot to get smaller tx sizes, freeing up blockspace for yours.
If you are using multiparticipant setups for special systems of trade, Taproot will be a positive for you.
Remember: Lightning channels are multipartiicpiant setups for special systems of lightning-fast offchain trades!
I Wanna Be The Taprooter!
So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!
If you have developer experience especially in C, C++, or related languages
Review the Taproot code! There is one pull request in Bitcoin Core, and one in libsecp256k1. I deliberately am not putting links here, to avoid brigades of nontechnical but enthusiastic people leaving pointless reviews, but if you are qualified you know how to find them!
But I am not a cryptographeBitcoin Core contributomathematician/someone as awesome as Pieter Wuille
That's perfectly fine! The cryptographers have been over the code already and agree the math is right and the implementation is right. What is wanted is the dreary dreary dreary software engineering: are the comments comprehensive and understandable? no misspellings in the comments? variable names understandable? reasonable function naming convention? misleading coding style? off-by-one errors in loops? conditions not covered by tests? accidental mixups of variables with the same types? missing frees? read-before-init? better test coverage of suspicious-looking code? missing or mismatching header guards? portability issues? consistent coding style? you know, stuff any coder with a few years of experience in coding anything might be able to catch. With enough eyes all bugs are shallow!
If you are running a mining pool/mining operation/exchange/custodial service/SPV server
Be prepared to upgrade!
One of the typical issues with upgrading software is that subtle incompatibilities with your current custom programs tend to arise, disrupting operations and potentially losing income due to downtime. If so, consider moving to the two-node setup suggested by gmax, which is in the last section of my previous post. With this, you have an up-to-date "public" node and a fixed-version "private" node, with the public node protecting the private node from any invalid chainsplits or invalid transactions. Moving to this setup from a typical one-node setup should be smooth and should not disrupt operations (too much).
If you are running your own fullnode for fun or for your own wallet
Be prepared to upgrade! The more nodes validating the new rules (even if you are a non-mining node!), the safer every softfork will be!
If you are using an SPV wallet or custodial wallet/service (including hardware wallets using the software of the wallet provider)
Contact your wallet provider / SPV server and ask for a statement on whether they support Taproot, and whether they are prepared to upgrade for Taproot! Make it known to them that Taproot is something you want!
But I Hate Taproot!!
Raise your objections to Taproot now, or forever hold your peace! Maybe you can raise them here and some of the devs (probably nullc, he goes everywhere, even in rbtc!) might be able to see your objections! Or if your objections are very technical, head over to the appropriate pull request and object away!
Maybe you simply misunderstand something, and we can clarify it here!
Or maybe you do have a good objection, and we can make Taproot better by finding a solution for it!
Earn bitcoin for every task that you complete, and receive payment within hours. Thanks to Bitcoin, there's no more waiting for checks or bank transfers to clear. It's free. All you need to start earning is a Bitcoin address for receiving payments. We don't collect any of your personal information—not even your email address. It doesn't get easier than this. It's fun! We are always adding ... Findet sich auf Ihrem Rechner der Trojaner bitcoinminer.sx, sollten Sie ihn entfernen. Wahrscheinlich haben Sie ihn als Teil eines Bundles mit einem anderen Tool aus dem Internet geladen. Der Virus kann Ihre Browsersuche umleiten und persönliche Daten sammeln. Um Bitcoin Mining zu betreiben, müssen Sie einem Miningpool beitreten, was zusätzliche Kosten verursacht. Für das Mining benötigen Sie entsprechende Hardware. Auch hier kommen Kosten auf Sie zu. Je nachdem, wie leistungsfähig Ihr Bitcoin Miner sein soll, zahlen Sie bis zu 2.000 Euro. Es ist nicht bekannt, ob sich Mining auch in Zukunft noch lohnen wird. Wenn Sie nicht genau wissen, was ... DeriBit is a broker platform to trade Bitcoin and Ethereum options and futures operating since 2016. It features an ultra-fast trade matching engine with less than 1MS Latency. All the coins are stored securely thanks to cold storage where the platform keeps 99% of all coins. Other important features of this broker are real-time auditing ... Bitcoin mining is the process of turning computing power into actual Bitcoins. It allows you to generate Bitcoins without the need to actually buy them. Now a lot of people say that mining can’t be done on a home computer and that you need very expensive equipment in order to start mining, but that’s not entirely true. Any computer can be used to mine Bitcoins, even the oldest and weakest ...
Bitcoin και Altcoins ΓΙΑ ΗΛΙΘΙΟΥΣ: Όλοι Οι Λόγοι Για να ...
Νομίζεις πως κάνοντας Bitcoin mining θα γίνεις πλούσιος? Νομίζεις πως οι επενδύσεις σε κρυπτονομίσματα είναι πιο ... Hello everyone, this tutorial is to show you how to tune your GPU to get a better hash rate. Overclocking for scrypt mining is more complex than bitcoin (rather than just increasing your engine ... How to configure Windows 10 for your Mining Rig to get the best hashrate in ethereum and more. Parts: MSI Pro Series Z270a: http://amzn.to/2sHVqNX Intel Pent... This is Weekly Dose Of Aviation #3 Links to sources: Engine Fire - https://www.youtube.com/watch?v=Dont3uTVqvA Chicken Goes Flying - https://www.youtube.com/... Onecoin promised the world, but only proved to be a trail of destruction. --- About ColdFusion --- ColdFusion is an Australian based online media company ind...