Author

Topic: Developers Wanted - combination of Bitcoin and Napster (Read 936 times)

sr. member
Activity: 490
Merit: 250


Announcing Bounty Campaign

  • total pool between $6000 and $12000 (possibly converted to BTC)
  • stay tuned for more details
full member
Activity: 162
Merit: 100
le lenny face
( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°)
legendary
Activity: 3920
Merit: 2349
Eadem mutata resurgo
ok ... a chan-like dev thread, this is new.
sr. member
Activity: 490
Merit: 250
sr. member
Activity: 490
Merit: 250
Does anybody know how to assimilate an advertisement into the file of content the advertisement is advertising on?

Also, heres the github for Nemesis

https://github.com/vintagetrex/Nemesis-Project/blob/master/README.md
sr. member
Activity: 490
Merit: 250
Assume the submitter of the content gets 50% of the currency specific to the submission and the other 50% of the currency goes to the proof of storage mines.  

Now, let's analyze the options available to potential miners of a duplicate submission.  If a duplicate of an earlier submission is resubmitted, will anyone proof of storage mine this currency?

No.  

Why? Because there is no reason to mine when at most you would get 50% of the currency through mining and you could guarantee yourself 50% of the currency of a duplicate submission by submitting the information yourself.  There is no incentive to proof of storage mine duplicate submissions, because you could guarantee yourself more coins by submitting another duplicate yourself.  If you submit a duplicate yourself (higher expected value than mining a duplicate) nobody will mine it (required for your currency to have value) because it would be a high expected value for each potential miner of your currency to just duplicate your submission and resubmit.  

TL;DR currency for original submissions retain value while currency for duplicate submissions have no value
sr. member
Activity: 490
Merit: 250
       x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x
:::-:::+:::-:::______        ____  _________    ____       ___           __________   _________   ____   ________ :::-:::+:::-:::
:::-:::+:::-:::|         \      |    |  |    ______|  |      \     |     \         |     ______| |    ______|  |     | |    _____| :::-:::+:::-:::
:::-:::+:::-:::|     |\   \    |    |  |    |_____    |        \   |       \       |    |_____    |   |______   |    |  |   |_____  :::-:::+:::-:::
:::-:::+:::-:::|     |  \   \  |    |  |     _____|   |    |\   \  |   |\   \     |     _____|   |______    |  |    |  |______   | :::-:::+:::-:::
:::-:::+:::-:::|     |    \   \|    |  |    |______  |    |  \   \|   |  \   \   |    |______    ______|   |  |    |   ______|  | :::-:::+:::-:::
:::-:::+:::-:::|___|      \_____|  |_________| |___|   \____|    \__\ |_________|  |_________| |___| |________| :::-:::+:::-:::
       x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x



_-+-__=88**88=__-+-__-+-__=88**88=__-+-__-+-__=88**88=__-+-_

A long time ago in a galaxy far far away…           ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°)
( ͡° ͜ʖ ͡°) It is a period  of civil  war.  Rebel  spaceships, striking  from a hidden  base, have won their first
victory against  the evil Galactic Empire.  During  the battle, Rebel spies managed to steal secret plans
to the Empire's ultimate  weapon, NSA  Datamining, with enough power to destroy all privacy. Pursued
by the Empire's  sinister  agents,  Nyan Cat  races  home  aboard her Lulz Ship, custodian of  the plans  
that can save the people and restore freedom to the galaxy…………………………………..........………  NEMESIS

[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Claim Specific Coins ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]  

( ͡° ͜ʖ ͡°) A new currency is generated for each submitted claim. A portion (x)  of the generated currency is
transacted  to  a  wallet  backing  a  general use, non claim specific currency.  The portion (1-x) of the
generated claim specific currency  is  transacted  to  the  wallet  that submitted the claim.  Wallets are
pseudonymous.  

()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[[ Mining Networks ]]]]x]]]()]]]x]]]]()]]]x]]]()]]]x]]]()]]]x]]]()

( ͡° ͜ʖ ͡°) Several categories of miners are used.  The  invention  utilizes a resource of inventors, a resource
of processing miners, and a resource of storage miners. Storage  miners may be paid from (x) paid out
as inflation over time,  according to the  portion  of the  storage  network each miner comprises for the
claim. Processing miners are paid with inflation of the general use currency.  

<http://www.youtube.com/watch?v=fosG7tmWTZ8>

_-+-__=88* ||qmVmp|| *88=__-+-__-+-__=88* ||qmVmp|| *88=__-+-__-+-__=88* ||qmVmp|| *88=__-+-_

"Meanwhile, the DEA  teamed  up with the  CCA  //  they tryin to lock us all up  //  they  tryin to  make us new
============ slaves // thats that privately owned prison // get your piece today"===============

x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[[()]]]]x]]]()]]]x]]]]()]]]x]]]()]]]x]]]()]]]x]]]()]]]x]]]()]]]x


// Getting Familiar with the Concept //

Nemesis is an encryption based proposal for a cipher space hosting corporation backed by the inherent value of useful information (inventions, software, movies, music)


- a new claim specific currency is generated for each data submission, a portion of this currency is transacted to the submitter's wallet, the rest is transacted to public wallet, where it is paid out over time to the proof of storage miners, storing the submitted information

- each data submission is timestamped to prevent forgery (information can be copied but the date cannot be reproduced)

- each submission (claim) can be linked to (cite) a number of previous submissions

- Nemesis has a user interface with two types of advertising space: the first is advertising in a common area, the second is advertising in an information specific area

- advertisers compete for advertising space with bids of the respective currency to the respective wallet with 0 hour contracts, the highest bidder wins

- claim specific currency can be transacted for general use currency at the market price (these are effectively two types of stock: A and B)

- claims (data submissions, new software) can be voted on to elect new source code



heres a few ways of thinking of the Nemesis concept:
1) a combination of bitcoin and pirate bay/megaupload
2) a polymorphic program enacted by voting parties


<http://www.youtube.com/watch?v=A9vGMMPM5Lg>


Nemesis' Game Theory
-The best strategy is to change the rules to your advantage

Rules
The object of the game is to have more value than your competitor at the end of the game

2 parties (partyA, partyB) are in direct competition

Each party has a message (MA, MB) with respective values (VA, VB)

PartyA has a number of constituents NA

PartyB has a number of constituents NB

Once a constituent has been exposed to a message there is no way of proving the removal of the message from the constituent

Competing parties are allowed to pay a competitor's constituents to disclose a message

Constituents can disclose a message to a competitor

If a message is disclosed, the chance a given constituent disclosed the message is 1/N where N is the number of constituents exposed to that message by the party

Constituents make decisions based on the options with the highest expected value governed by the equation:

               Expected Value = Summation from i=0 to n of (Pr(i) * reward(i))

Strategy: the more constituents a party has, the more likely the party's message will be disclosed


Optimal Strategies / Balanced Range

A balanced range is a set of occurrences with neutral expected value.
Decision making against a balanced range is indifferent.
As a result, a balanced range is game theoretically unexploitable.
Whatever action is taken against a balanced range has neutral expectation.
An unbalanced range is exploitable.  
An exploitable strategy is not optimal.  

The current American economic climate is unbalanced.  
The expected value of an invention that takes place within an organization is higher than that of a similar invention invented outside of an organization as a result of legislation forcing independents to play a cooperative game. (while organizations are able to play a non cooperative game through lobbying to change the rules of the game)
This means the current economic climate is exploitable by providing a non cooperative game for the people playing the game (citizens).

EV for a person who could innovate = (chance you innovate) * (monetary value of innovation) * (1 - chance your innovation is stolen)

How the Middle Class, Corporate Elite Exploit the Producing Class


The intellectual producing class increases the wealth of humanity by removing obstacles that once existed as an inefficiency in the economy.  Scientists, innovators, and content creators, produce new wealth for society by using their brains to produce new information that has value to people.  Unfortunately, monetary compensation does not mirror wealth creation.  

Monetary compensation for this type of wealth creation is regulated by the USPTO and the Federal Reserve.  Legislation for the USPTO and the Fed are created by a coalition of voters and corporate lobbyists.  These groups attempt to divert monetary compensation from producers to themselves for their own self interest.  There is a symbiotic relationship between corporations and the middle class: the middle class votes along with corporate lobbyists in exchange for higher paying jobs and more jobs, which corporations can afford by rerouting monetary compensation from wealth producers to themselves.  Both the middle class and corporate America are dependent on this system.  They have a parasitic relationship with the producing class.  

The needs of this coalition grow over time, becoming more dependent on money diverted from producers.  Intellectual Property laws are on a one way path, squeezing money from individual producers while inflating monetary compensation for production inside large organizations.  
...

<http://www.youtube.com/watch?v=aTL4qIIxg8A>

I know you're out there. I can feel you now. I know that you're afraid. You're afraid of us. You're afraid of change. I don't know the future. I didn't come here to tell you how this is going to end. I came here to tell you how it's going to begin. I'm going to hang up this phone, and then I'm going to show these people what you don't want them to see. I'm going to show them a world without you. A world without rules and controls, without borders or boundaries; a world where anything is possible. Where we go from there is a choice I leave to you.


Helpful Skills
•   C++
•   Ruby
•   Python
•   Java
•   Algorithms
•   Encryption
•   Mathematics
•   Game Theory
•   Experience establishing anonymizing networks and software
•   Asic Miners
•   Storage Miners
•   Creativity and Logic

Publicly verifiable proof of storage
Inputs X and Y are hashed together to produce a digest
Input X can be a message M or an encryption and key of message M
Input Y is the randomly generated challenge
The proof is when the hash of X and Y produce a digest with an output of zeroes I.E. 00000000000
A storer must find an input Y that satisfies a digest requirement of a string of zeroes I.E. 0000000000 by randomly generating numbers to use as input Y.  
The proof of storage is a proof of work on information.  The information must be stored to perform work with it.  The storage of the information can be easily proved by checking that the requirement of a string of zeroes was satisfied.

TL;DR: A cryptographic ledger with stock in the ledger that trades similarly to bitcoins.  Each person who submits information to the ledger is compensated with a cryptographic currency specific to the submission.  These information specific currencies get value from advertising rights sold exclusively in the currency.  
Jump to: