Pages:
Author

Topic: [ANN] [BSV] [Bitcoin SV] Original Satoshi Vision - page 57. (Read 226395 times)

hv_
legendary
Activity: 2534
Merit: 1055
Clean Code and Scale
Discuss facts


https://mobile.twitter.com/finhstamsterdam/status/1288490297689878528

"Also all banks in the EU should immediately stop putting their customers names/adrress into payment messages that end up in the US or are sent to the US. The ruling is immediately effective. .... "


not ppl
hv_
legendary
Activity: 2534
Merit: 1055
Clean Code and Scale
https://coingeek.com/bitcoin-sv-developer-zone-offers-open-platform-to-learn-about-working-on-bsv/

The only BitCoin that works

Smart Contracts incl - not broken like for btc, not hoobby like eth - lowest fees, highest stability

see more to come - also attacks from haters (but they help pushing that to the critical ppl, who are able to think)

 Grin
hv_
legendary
Activity: 2534
Merit: 1055
Clean Code and Scale

Hey welcome here! find it here https://bitcoinsv.io/roadmap-new/

big thanks

Just no post yet, but paranouidilah gave you his trustshit already, no reference...

Boy, welcome to that forum and don't expect some ve understood original BitCoin
member
Activity: 963
Merit: 57
say it with me , BSV is a shit fraud Smiley
Then why is it in the top 10 market cap coin? Is coinmarketcap ranking that much not reliable? Whom did they scam? And which coin is not a scam in your opinion, Ripple?
hv_
legendary
Activity: 2534
Merit: 1055
Clean Code and Scale
say it with me , BSV is a shit fraud Smiley

nope, but ETH is the turing - COPMLETE FRAUD

https://www.youtube.com/watch?v=YOh_ghmeDAM

newbie
Activity: 39
Merit: 0
newbie
Activity: 66
Merit: 0
the value is based on technological practicality to enter the pantheon of the rule of 3.[/size]
What's the pantheon of the rule of threes?

For example in the USA: in the last century, there were a lot of car manufacturers, several hundreds, all of them have been bought out and today there are only 3 (Big Three) general motors ford and chrysler left.

Can be applicable to cryptoBlockchain practical, mass adapted and used.
newbie
Activity: 39
Merit: 0
the value is based on technological practicality to enter the pantheon of the rule of 3.[/size]
What's the pantheon of the rule of threes?
newbie
Activity: 66
Merit: 0
Dr Craig S Wright and other ingenious enthusiasts have long understood this. They advance technological research to build new communication networks. It's unfortunate that many people and companies can't see beyond the tip of their nose, others here are clearly greedy, childish and guilty of their actions. These are facts.

I join in your very interesting debate. It is clear that Metanet (BSV) has a very broad spectrum of applications such as creating digital assets from personal data, so users remain truly "masters" of their distributed data. Many viewers don't understand why there is weather data on BSV, they don't understand that it is an application-scaled test, the goal is to create routed data and then complete information in private blockchained networks that collect the data as Op_Return "digital assets". At another scale, users can create secure and private personal networks (like bubbles). Thus these digital assets from personal data that can be transferred, exchanged or sold to private individuals, institutes, associations and companies who wish to do so as the BSV NFT functions already allow on the https://memo.sv/ marketplace.

The entire communication chain is thus secured using BSV blockchain technology (large blocks) to connect a number of immaterial or physical catalysts such as sensors or on-board A.I. rods, such as cameras, microphones and thermal sensors. This also applies to smart contracts (Oracles) in sidechain under the BSV ecosystem by secure public and private data transfers in layers while remaining auditable. (as CLOAK technology)


Potential use cases include home energy monitoring, health and preventive care, car maintenance, insurance, home security and many others, deep learnig, I.A, IoT, ID even democratic voting.

The market will also connect consumers to businesses that wish to purchase or use their block-compatible data as digital assets. Driving data collected over a year can be exchanged for discounted car insurance, or purchase, lifestyle and consumer data can be sold to advertisers, brands or market researchers.

This is one of the potentials that BSV Ecosystem exploits for you as a user.

There is no question of giving monetary value to BSV. 1BSV will always be equal to 1BSV - 0.00000123 will always be equal to 0.00000123 . Nothing and nowhere here is conveyed in this sense, the value is based on technological practicality to enter the pantheon of the rule of 3.
member
Activity: 602
Merit: 12

http://zpool.ca/

Hi,
We've added BitcoinSV (BSV) to http://zpool.ca/ sha256. See below for connection details.

Fee only: 0.5% or less
BTC payouts are processed once a day for balances above 0.0025
Payouts for all other currencies are made automatically every 4 hours for balances above 0.05 and balances more than 0.0125 are included in one of the payouts each day.

- Sample configurations -
To mine and get paid in BSV:
Code:
-a sha256 -o stratum+tcp://sha256.mine.zpool.ca:3333 -u BSV_ADDRESS -p c=BSV,zap=BSV

Exchange to BTC:
Code:
-a sha256 -o stratum+tcp://sha256.mine.zpool.ca:3333 -u BTC_ADDRESS -p c=BTC
Exchange to BTC but mine only BSV:
Code:
-a sha256 -o stratum+tcp://sha256.mine.zpool.ca:3333 -u BTC_ADDRESS -p c=BTC,zap=BSV

All of our ports are NiceHash friendly, no need to specify any extra details

We also provide stratum servers in:
Europe:
Code:
sha256.eu.mine.zpool.ca:3333 
South East Asia:
Code:
sha256.sea.mine.zpool.ca:3333 
Japan:
Code:
sha256.jp.mine.zpool.ca:3333 

Need hashpower? zpool’s sister provides hash rental services: http://hashtap.ca/

==============================

Support: https://discord.gg/n45n6Jj
Twitter: https://twitter.com/_zpool_
Great, I'll transfer my power for a test
newbie
Activity: 11
Merit: 0
Is there no longer an opportunity to get this BSV coin in the airdrop or in other ways? Purchase only?
full member
Activity: 658
Merit: 124

Can be applied for a contract, a will, transfer of ownership engraved in the blockchain, print a book, or expose a specific data such as a qr code attached to a history on a traceable product like a bottle of wine to avoid counterfeiting would be a scan of the field (pesticide used, maturation time, maturation in casks, logistics used until my acquisition from the supplier, by acts hidden in the digital stone, until my transfer and so on) A chain of custody in short.

While doing my research I understood that the Op_return incremented in the code technically allows to do it. I am wondering if there is an interface that allows you to enter and classify by sector?

Nobody is building with / on top of BSV coz its a waste of time which you just mentioned above. I am not even sure if that makes any sense. Like, retrieval of data from the qr code via smart contract, and then putting that in a blockchain, in a BSV chain, lol, I mean, if thats what you hanker for in your life, then alright lol maybe wanna stuff it with more exotic features? Something more bold, more daunting. From the top of my head: implement a pussy hair plucking tool via G3 (Grapnel 3) Intelligent Solutions tech. They develop blockchain based AI which can be used to give intelligence to a pubic hair plucker.
hv_
legendary
Activity: 2534
Merit: 1055
Clean Code and Scale

No that's another lie, exponentially more scammers rob people using anonymous USD, or other gov fiat. Are you trying to rid the world of filthy fiat that bad people use as well?

Like i said you want to create another NewWorldOrder/Facebook/PayPal/UScoin2.0 go for it, just don't expect anyone sane to use it, regardless how many people Faketoshi sues or newbie accounts shill it to each other.

Quote
The limitation on gold ownership in the US was repealed after President Gerald Ford signed a bill legalizing private ownership of gold coins, bars, and certificates by an Act of Congress, codified in Pub.L. 93–373,[1] which went into effect December 31, 1974.
https://en.wikipedia.org/wiki/Executive_Order_6102

Are you saying US was in wartime from 1933-1974 or you're just generally confused and unable to say anything besides how newbies should buy into your scam?

Never mix apples and oranges

True, usd is bad for tracking and such getting rid of crime (ePay using SWIFT et al much better btw)

BitCoin is built on a public ledger for exactly get fully against that - get rid of all crime (but for a price of reduced privacy, also true) But only true original BitCoin

Have a look what changes your anonymous friends have done to alter btc to help crime AGAIN

Full retards

Sure, these folks must hate everyone debunking that ,little detail' - under the hood of technobubble and best devs doing good for 'features' ( that are no) and dev on btc
full member
Activity: 626
Merit: 234
The trolls lost in disgrace. We drove these nerds out of here. Now we can start our campaign

Bitcoin SV - It's Original Bitcoin. Satoshi Vison

Very big thanks for all supporters, especially hv_

P.S: Nutildah is pwned. Rest in peace granny. Victory is ours
full member
Activity: 626
Merit: 234
hv_
legendary
Activity: 2534
Merit: 1055
Clean Code and Scale
Make pure Bitcoin most scalable, most user friendly, most accessible to the world is the most valuable project ever.

Everyone should have the right to directly interact and get txs published onchain.

Forcing ppl off chain is off human

Not more to say here ( few text is cool to read, better than walls of text that s just distracting any argument)
full member
Activity: 626
Merit: 234
And CSW is a fraud

Postulate #1.
CSW & BSV Project can not be fraud. BSV - it's fully transparent regulated platform, guaranteeing safety of funds in accordance with governing law

Postulate #2.
Anonymous BTC with their anonymous team - Are scammers by definition
jr. member
Activity: 42
Merit: 3
In summary my question is intended for serious people who don't waste their time and who build with BSV:

The idea is not to create shitcoins but rather to create specific references with url captures for example.

Can be applied for a contract, a will, transfer of ownership engraved in the blockchain, print a book, or expose a specific data such as a qr code attached to a history on a traceable product like a bottle of wine to avoid counterfeiting would be a scan of the field (pesticide used, maturation time, maturation in casks, logistics used until my acquisition from the supplier, by acts hidden in the digital stone, until my transfer and so on) A chain of custody in short.

While doing my research I understood that the Op_return incremented in the code technically allows to do it. I am wondering if there is an interface that allows you to enter and classify by sector?

Hi ReD_Yaka_MoZ  and welcome to the Bitcointalk forum, what you are looking to create is possible under BSV look with MemoSV on https://memo.sv/ there is an access to create NFT, chain of custody and access tokens. the cost of deployment is derisory the amount is expressed in Satoshi BSV It's in the order of a few thousand Satoshi BSV so less than 0.01 cents these are the costs of routing and therefore the network costs that will blockchainized your selected information.


Wow thank you very much for your information. That's great! Still, how to find a tutorial or video to help people like me who want to use a cheap secure channel, BSV is the ideal candidate. Thanks again



Edit: I just created a tutorial in multiple languages, I hope this will help people to create something different























Very good job ReD_Yaka_MoZ your tuto/pictures will be displayed now your images will be displayed now Wink
jr. member
Activity: 42
Merit: 3

The idea is not to create shitcoins but rather to create specific references with url captures for example.

Can be applied for a contract, a will, transfer of ownership engraved in the blockchain, print a book, or expose a specific data such as a qr code attached to a history on a traceable product like a bottle of wine to avoid counterfeiting would be a scan of the field (pesticide used, maturation time, maturation in casks, logistics used until my acquisition from the supplier, by acts hidden in the digital stone, until my transfer and so on) A chain of custody in short.

While doing my research I understood that the Op_return incremented in the code technically allows to do it. I am wondering if there is an interface that allows you to enter and classify by sector?


Hi ReD_Yaka_MoZ  and welcome to the Bitcointalk forum, what you are looking to create is possible under BSV look with MemoSV on https://memo.sv/ there is an access to create NFT, chain of custody and access tokens. the cost of deployment is derisory the amount is expressed in Satoshi BSV It's in the order of a few thousand Satoshi BSV so less than 0.01 cents these are the costs of routing and therefore the network costs that will blockchainized your selected information.
hv_
legendary
Activity: 2534
Merit: 1055
Clean Code and Scale
hey it's been a while since I've come to visit.

my question is this, knowing that:

about Secp256k1

Quote

This is a graph of secp256k1's elliptic curve y2 = x3 + 7 over the real numbers. Note that because secp256k1 is actually defined over the field Zp, its graph will in reality look like random scattered points, not anything like this.

secp256k1 refers to the parameters of the elliptic curve used in Bitcoin's public-key cryptography, and is defined in Standards for Efficient Cryptography (SEC) (Certicom Research, http://www.secg.org/sec2-v2.pdf). Currently Bitcoin uses secp256k1 with the ECDSA algorithm, though the same curve with the same public/private keys can be used in some other algorithms such as Schnorr.

secp256k1 was almost never used before Bitcoin became popular, but it is now gaining in popularity due to its several nice properties. Most commonly-used curves have a random structure, but secp256k1 was constructed in a special non-random way which allows for especially efficient computation. As a result, it is often more than 30% faster than other curves if the implementation is sufficiently optimized. Also, unlike the popular NIST curves, secp256k1's constants were selected in a predictable way, which significantly reduces the possibility that the curve's creator inserted any sort of backdoor into the curve.

Technical details
As excerpted from Standards:

The elliptic curve domain parameters over Fp associated with a Koblitz curve secp256k1 are specified by the sextuple T = (p,a,b,G,n,h) where the finite field Fp is defined by:

p = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE FFFFFC2F
= 2256 - 232 - 29 - 28 - 27 - 26 - 24 - 1
The curve E: y2 = x3+ax+b over Fp is defined by:

a = 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
b = 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000007
The base point G in compressed form is:

G = 02 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B 16F81798
and in uncompressed form is:

G = 04 79BE667E F9DCBBAC 55A06295 CE870B07 029BFCDB 2DCE28D9 59F2815B 16F81798 483ADA77 26A3C465 5DA4FBFC 0E1108A8 FD17B448 A6855419 9C47D08F FB10D4B8
Finally the order n of G and the cofactor are:

n = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE BAAEDCE6 AF48A03B BFD25E8C D0364141
h = 01
Properties
secp256k1 has characteristic p, it is defined over the prime field ℤp. Some other curves in common use have characteristic 2, and are defined over a binary Galois field GF(2n), but secp256k1 is not one of them.
As the a constant is zero, the ax term in the curve equation is always zero, hence the curve equation becomes y2 = x3 + 7.


Elliptic Curve Digital Signature Algorithm or ECDSA is a cryptographic algorithm used by Bitcoin to ensure that funds can only be spent by their rightful owners.

A few concepts related to ECDSA:

private key: A secret number, known only to the person that generated it. A private key is essentially a randomly generated number. In Bitcoin, someone with the private key that corresponds to funds on the block chain can spend the funds. In Bitcoin, a private key is a single unsigned 256 bit integer (32 bytes).
public key: A number that corresponds to a private key, but does not need to be kept secret. A public key can be calculated from a private key, but not vice versa. A public key can be used to determine if a signature is genuine (in other words, produced with the proper key) without requiring the private key to be divulged. In Bitcoin, public keys are either compressed or uncompressed. Compressed public keys are 33 bytes, consisting of a prefix either 0x02 or 0x03, and a 256-bit integer called x. The older uncompressed keys are 65 bytes, consisting of constant prefix (0x04), followed by two 256-bit integers called x and y (2 * 32 bytes). The prefix of a compressed key allows for the y value to be derived from the x value.
signature: A number that proves that a signing operation took place. A signature is mathematically generated from a hash of something to be signed, plus a private key. The signature itself is two numbers known as r and s. With the public key, a mathematical algorithm can be used on the signature to determine that it was originally produced from the hash and the private key, without needing to know the private key. Resulting signatures are either 73, 72, or 71 bytes long (with approximate probabilities of 25%, 50%, and 25%, respectively--although sizes even smaller than that are possible with exponentially decreasing probability).

How do we know there isn't a back door in the elliptic curve to open "architect" access and why?

The chance exists - but estimate for your own

next: don't store big bounties on single adresses
Pages:
Jump to: