Some of you don't understand Cramer's job.
His show is all about positioning the hoi polloi to be fleeced.
Right now, that means keeping whatever gullible masses he has influence over out of Bitcoin so that larger players can get in at a lower price.
|
|
|
Are we really going to refer to BTC .001 as millibitcoins or millibits or millis? There needs to be a different name.
"Mill"
|
|
|
We have added $3.5 billion in market cap this week. No other week compares from this perspective.
You're thinking linearly.
|
|
|
After the epic start to the week, I was fairly sure that Bitcoin would end mid-range ($650) at the end of week.
But now... this damn thing might just finish the week on its highs.
It only has to finish above $670 to make this the best price performing week in Bitcoin history.
The week of June 6, 2011 the weekly weighted price was 98% higher than the prior week. This week still slightly more than one day left, but so far we're only 65%. On the other hand, the volume traded on Mt Gox in USD terms so far this week has blown away all previous records, including the week of the April crash.
|
|
|
Its not a cup and handle formation. Cup and handles are specifically supposed to be U shaped and not V shaped.
lets make up a new term. call it, V shaped TA trap. "The S is for sucks dragon" formation.
|
|
|
I want to have an offline deterministic wallet that's a sort of savings wallet. I'll follow it as read-only on an online computer. But the thing is that I don't want to reuse addresses on the offline one. Is it possible to send BTC from my online wallet to a brand new address on the offline wallet?
Or better yet, is it possible to figure out the offline wallet's next address through the online one, and give that to someone else to send BTC to?
Yes to both. That's why deterministic wallets exist.
|
|
|
Only recently (from BitchicksHusband?) did I see someone mention a sigmoid curve... People have been talking about sigmoid curves since 2010 at least. Haven't you seen this before? The question is, what does your curve look like when adoption is following a sigmoid curve, and the value of the currency you're using as a reference is also collapsing exponentially?
|
|
|
I've been trying to answer the question, "what would the S-curve representing a hyper-monetization event look like on a log scale?"
I'm starting to think it would retain its S shape in both the linear and logarithmic scales.
|
|
|
If the idea is crap then *please* I'd appreciate an explanation. Explanations are extremely important, given that certain organizations are known to infiltrate standards committees and open source projects and steer them away from implementing good security. Even if no such activity is happening in Bitcoin, it's better to not even have the appearance of something shady going on, like an proposal for an obvious security enhancement just being silently rejected with no real explanation.
|
|
|
really creepy. Is there an option to turn off images on this forum?
Use this plugin for Firefox: https://www.requestpolicy.com/It's extremely useful when it comes to increasing your privacy. You'll be amazed after you see just how much tracking is embedded in most webpages.
|
|
|
BitChick = Queen Bitcoin There's more than one contender for that title. Stephanie Murphy would have a fairly strong claim to it. Maybe we should have a poll.
|
|
|
Eagerly looking forward to the day in which I can run btcd and Armory together and not need the Satoshi client at all.
|
|
|
to support your statement: because I am a proven analyst like you can see in this chart, again. on a serious note: I think we really will go higher, break this 700ish and .. well, to da moon. It looks to me more like a classic Trogdor pattern.
|
|
|
Why is he still allowed to post here?
|
|
|
Sure losses, but I dont find it relevant. Fortunately for those of us who aren't paid propaganda agents, this does not exist to serve your personal preferences. If you don't like it, don't click on the thread.
|
|
|
The sweet spot is probably 16 and 32-bit microprocessors: fast enough to handle crypto without pain, small enough that hiding malicious features is very tough for the manufacturer, and cheap enough that the community has a chance of auditing the actual shipped hardware and firmware against the claimed design. It shouldn't be a microprocessor at all. Think something like this, but to perform ECDSA instead: https://en.wikipedia.org/wiki/555_timer_ICTruly secure hardware wallets will need to be built at the level of electrical engineering, not software engineering.
|
|
|
P2SH was something that everyone was supposed to be using by now because of the "obvious" security need; you're proposed reason for a soft-fork and associated system-wide risk is significantly more niche. It won't be niche when the PC platform as a whole is rendered unusable for secure applications by firmware-level, airgap-crossing malware. *Secure hardware wallets need to be here before that happens. *"Secure" means custom silicon specifically hardened against side channel attacks and such, not off the shelf embedded systems containing god-knows-what vulnerabilities.
|
|
|
|