Bitcoin Forum
May 04, 2024, 07:55:51 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 [22] 23 24 25 26 »
421  Alternate cryptocurrencies / Altcoin Discussion / Re: Nemesis DAC Invention - Innovative Business Model on: January 02, 2014, 07:07:36 PM
Proof of Storage Protocol Outline:
-proving storage of message M over a period of work W

M is encrypted to make cipher1 (this is to create a random string)
computer generates a random string S1 and concatenates it with C1 to make C1 + S1
computer hashes C1 + S1
storage is proved when hash of (C1 + S1) is a string of zeroes of desired length
computer broadcasts (C1 , S1) to the network as proof and collects mining reward

- this solves the problem of having a network store and host content as the file must be both stored over a period of work (which can be related to time in terms of hashes/second) and must broadcast the stored file with the correct challenge
422  Alternate cryptocurrencies / Altcoin Discussion / Nemesis Distributed Autonomous Corporation - Innovative Business Model on: January 02, 2014, 06:37:42 PM
The biggest difference between a DAC and a Wal-Street Corporation is the ability to not meet regulations.  This allows a DAC to employ an incentive system to effectively pay for new information.  I am referring to a decentralized intellectual property system (previously titled 'Nemesis') and will outline it in this thread.  A system of currencies is utilized to maintain an array data structure.  It is both a self standing IP system and an exploit of government based IP systems such as the USPTO.  The system retains value for original content submitters, replacing the social function of a government IP system.  

Legal Tool                  Exploit
copyright                                    censorship preventing coin/network
contract, Non Disclosure Agreement      anonymizing software


The system consists of two types of currency:

Type I
-based on proof of work
-prevents double spending
-stock in the entire system as a whole
-only one of these currencies

Type II
-based on proof of storage
-prevents censorship by distributing storage and hosting of content
-stock in specific content
-one of these currencies is generated for each content submission

How to make Type II currencies retain value for original content submissions
-content submitter gets 50% of type II currency for submitting content
-submitter's coins in type II currency are paid out at the same rate as to mining
-this prevents a person from profiting from copying and resubmitting previously submitted content
   -based on game theory analysis of incentive for miners
   -a miner cannot gain more than 50% of a currency
   -rather than mining the currency for a duplicate submission a person would rather duplicate again and resubmit the content to get 50% of the currency
   -lack of incentive to mine duplicate submissions means duplicate submissions have no value


define "terminal address" - an address that cannot send coins; it can only receive coins
-there is one terminal address associated with Type I currency
-there is one terminal address associated with each Type II currency

Advertising System
-There is an advertising slot associated with the Type I currency and an advertising slot associated with each content submission and Type II currency
-advertising bids are made by sending a bid to a terminal address with the associated currency type
-ads are stored and hosted along with the content
-demand for advertising creates demand for currencies
-permanent removal of coins from circulation through advertising causes the number of outstanding coins to decrease

this system will have a larger market cap than Google but the value will be spread out because large amounts of it will go to the people who submit the content
423  Alternate cryptocurrencies / Altcoin Discussion / Re: [SHS] Shares [Second Generation Crypto Currency] [Project Announcement] on: January 02, 2014, 06:33:45 PM
can anyone explain how proof of stake is different from traditional inflation/interest paid by a bank? O wait NO because its the same thing. 

If you want to raise money at least state what the graph for coin availability will look like.  It sure would suck to donate 1 BTC in exchange for 100,000 shares only to find out that the total shares outstanding will be 50,000,000 within the first few months. 

HAHAHA.  What is the purpose of this coin?
424  Alternate cryptocurrencies / Altcoin Discussion / Re: [ANN][DTC]Datacoin Bounties Thread! on: December 21, 2013, 09:05:25 PM
I made a video discussing the advantages of the autonomous corporate model over the wal street corporate model.

http://www.youtube.com/watch?v=JZJgtGL2sT4

DUThsBqGpckW5oPqciTnukXM2QuWHXDzpG
425  Alternate cryptocurrencies / Altcoin Discussion / Re: [DTC] Someone tried to gain control over Datacoin, but he failed on: December 21, 2013, 08:59:11 PM
interesting
426  Alternate cryptocurrencies / Altcoin Discussion / Re: Datacoin [Unofficial] Team Listed Here! on: December 21, 2013, 09:55:08 AM
Hi, can I join the team?
Hi, what is your expertise, what role to you want to take?

I'm good at inventing stuff.  I would specifically contribute good ideas for incentive.  I mostly create logical ideas and do some theoretical work.  This will help give datacoin a cohesive vision for the future.  Programming isn't my forte, but I understand computers.  I can help a lot with the "baby coins" and how to generate advertising revenue.  

I also have a question on DTC specs.  What is the maximum number of DTC in existance not including potential "baby coins"
427  Alternate cryptocurrencies / Altcoin Discussion / Re: Datacoin [Unofficial] Team Listed Here! on: December 21, 2013, 09:23:10 AM
Hi, can I join the team?
428  Alternate cryptocurrencies / Altcoin Discussion / Re: Nemesis - the open source intellectual property system on: December 21, 2013, 08:11:02 AM
A considerable amount of the ideas in this datacoin thread are also represented in this thread.

https://bitcointalk.org/index.php?topic=338480.100


now accepting datacoins:

D86uHZ94hGYbNbA1GePZ2avFqEhRGz2TYv
429  Alternate cryptocurrencies / Altcoin Discussion / Re: Nemesis - the open source intellectual property system on: December 21, 2013, 01:40:37 AM
bump

datacoin has launched.  The concept seems to be largely based on the ideas presented in this thread.  YAY!!

the people should demand a coin that rewards each individual for his/her specific contribution of information.  It will be the long term market winner, eventually overtaking Bitcoin.
430  Alternate cryptocurrencies / Altcoin Discussion / Re: Proposal: Datacoin - A decentralized data storage cryptocurrency on: December 21, 2013, 12:59:34 AM
Hi, I would like to work with you.  I think I have some theoretical cryptography skills to add.  I would like to ask how/if your storage will be mathematically proved?  It seems very exploitable, which wouldn't be good if the concept came to be worth lots of money.  I think you need a format of proof of storage, but I'm not sure you have it yet.  Thats ok I already did that work so I can help you out there. 

Also, the current "datacoin" is not like your proposal because it is very limited.  Don't be discouraged by that at all.  It is simply a way to prove a file existed at some time, not a way to have distributed hosting of a file.  

this was me

vintagetrex, inventor of the decentralized intellectual property system, a free market solution to compensating inventors
431  Bitcoin / Project Development / Re: [ANNOUNCE] Whitepaper for Bitstorage - a peer to peer, cloud storage network on: December 21, 2013, 12:48:38 AM
Is there some mechanism for preventing a single node storing a single copy of the data, and then spoofing multiple identities and claiming payment as-if the data were stored across multiple nodes?


there is a single hash verifiable solution to this through an arrangement of proof of storage where storage of a file is proved over a period of work (# of randomly generated strings and hashes).  I theorized this solution with some help from wolf0

these were me.  I got onto my account.  Check out my ideas.  They are well formed. 
432  Bitcoin / Project Development / Re: Developers Wanted - combination of Bitcoin and Napster on: November 25, 2013, 06:22:20 PM


Announcing Bounty Campaign

  • total pool between $6000 and $12000 (possibly converted to BTC)
  • stay tuned for more details
433  Bitcoin / Project Development / Re: Developers Wanted - combination of Bitcoin and Napster on: November 22, 2013, 06:14:54 PM


434  Bitcoin / Project Development / Re: I need a IDEA on: November 22, 2013, 06:13:33 PM
make a website that is a user interface for Nemesis' content

https://bitcointalk.org/index.php?topic=338080.0

you need organize the content into categories and provide a search function
435  Alternate cryptocurrencies / Altcoin Discussion / Re: Nemesis - the open source intellectual property system on: November 21, 2013, 02:45:12 AM
Project GitHub (new info)

https://github.com/vintagetrex/Nemesis-Project/blob/master/README.md

Someone please find out how to embed the advertisements in the proof of storage file.  Smiley
436  Bitcoin / Project Development / Re: Developers Wanted - combination of Bitcoin and Napster on: November 20, 2013, 07:12:03 PM
Does anybody know how to assimilate an advertisement into the file of content the advertisement is advertising on?

Also, heres the github for Nemesis

https://github.com/vintagetrex/Nemesis-Project/blob/master/README.md
437  Bitcoin / Project Development / Re: Developers Wanted - combination of Bitcoin and Napster on: November 19, 2013, 04:42:07 AM
Assume the submitter of the content gets 50% of the currency specific to the submission and the other 50% of the currency goes to the proof of storage mines.  

Now, let's analyze the options available to potential miners of a duplicate submission.  If a duplicate of an earlier submission is resubmitted, will anyone proof of storage mine this currency?

No.  

Why? Because there is no reason to mine when at most you would get 50% of the currency through mining and you could guarantee yourself 50% of the currency of a duplicate submission by submitting the information yourself.  There is no incentive to proof of storage mine duplicate submissions, because you could guarantee yourself more coins by submitting another duplicate yourself.  If you submit a duplicate yourself (higher expected value than mining a duplicate) nobody will mine it (required for your currency to have value) because it would be a high expected value for each potential miner of your currency to just duplicate your submission and resubmit.  

TL;DR currency for original submissions retain value while currency for duplicate submissions have no value
438  Bitcoin / Project Development / Developers Wanted - combination of Bitcoin and Napster on: November 18, 2013, 06:36:36 PM
       x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x
:::-:::+:::-:::______        ____  _________    ____       ___           __________   _________   ____   ________ :::-:::+:::-:::
:::-:::+:::-:::|         \      |    |  |    ______|  |      \     |     \         |     ______| |    ______|  |     | |    _____| :::-:::+:::-:::
:::-:::+:::-:::|     |\   \    |    |  |    |_____    |        \   |       \       |    |_____    |   |______   |    |  |   |_____  :::-:::+:::-:::
:::-:::+:::-:::|     |  \   \  |    |  |     _____|   |    |\   \  |   |\   \     |     _____|   |______    |  |    |  |______   | :::-:::+:::-:::
:::-:::+:::-:::|     |    \   \|    |  |    |______  |    |  \   \|   |  \   \   |    |______    ______|   |  |    |   ______|  | :::-:::+:::-:::
:::-:::+:::-:::|___|      \_____|  |_________| |___|   \____|    \__\ |_________|  |_________| |___| |________| :::-:::+:::-:::
       x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x



_-+-__=88*<qm!mp>*88=__-+-__-+-__=88*<qm!mp>*88=__-+-__-+-__=88*<qm!mp>*88=__-+-_

A long time ago in a galaxy far far away…           ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°)
( ͡° ͜ʖ ͡°) It is a period  of civil  war.  Rebel  spaceships, striking  from a hidden  base, have won their first
victory against  the evil Galactic Empire.  During  the battle, Rebel spies managed to steal secret plans
to the Empire's ultimate  weapon, NSA  Datamining, with enough power to destroy all privacy. Pursued
by the Empire's  sinister  agents,  Nyan Cat  races  home  aboard her Lulz Ship, custodian of  the plans  
that can save the people and restore freedom to the galaxy…………………………………..........………  NEMESIS

[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Claim Specific Coins ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]  

( ͡° ͜ʖ ͡°) A new currency is generated for each submitted claim. A portion (x)  of the generated currency is
transacted  to  a  wallet  backing  a  general use, non claim specific currency.  The portion (1-x) of the
generated claim specific currency  is  transacted  to  the  wallet  that submitted the claim.  Wallets are
pseudonymous.  

()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[[ Mining Networks ]]]]x]]]()]]]x]]]]()]]]x]]]()]]]x]]]()]]]x]]]()

( ͡° ͜ʖ ͡°) Several categories of miners are used.  The  invention  utilizes a resource of inventors, a resource
of processing miners, and a resource of storage miners. Storage  miners may be paid from (x) paid out
as inflation over time,  according to the  portion  of the  storage  network each miner comprises for the
claim. Processing miners are paid with inflation of the general use currency.  

<http://www.youtube.com/watch?v=fosG7tmWTZ8>

_-+-__=88* ||qmVmp|| *88=__-+-__-+-__=88* ||qmVmp|| *88=__-+-__-+-__=88* ||qmVmp|| *88=__-+-_

"Meanwhile, the DEA  teamed  up with the  CCA  //  they tryin to lock us all up  //  they  tryin to  make us new
============ slaves // thats that privately owned prison // get your piece today"===============

x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[[()]]]]x]]]()]]]x]]]]()]]]x]]]()]]]x]]]()]]]x]]]()]]]x]]]()]]]x


// Getting Familiar with the Concept //

Nemesis is an encryption based proposal for a cipher space hosting corporation backed by the inherent value of useful information (inventions, software, movies, music)


- a new claim specific currency is generated for each data submission, a portion of this currency is transacted to the submitter's wallet, the rest is transacted to public wallet, where it is paid out over time to the proof of storage miners, storing the submitted information

- each data submission is timestamped to prevent forgery (information can be copied but the date cannot be reproduced)

- each submission (claim) can be linked to (cite) a number of previous submissions

- Nemesis has a user interface with two types of advertising space: the first is advertising in a common area, the second is advertising in an information specific area

- advertisers compete for advertising space with bids of the respective currency to the respective wallet with 0 hour contracts, the highest bidder wins

- claim specific currency can be transacted for general use currency at the market price (these are effectively two types of stock: A and B)

- claims (data submissions, new software) can be voted on to elect new source code



heres a few ways of thinking of the Nemesis concept:
1) a combination of bitcoin and pirate bay/megaupload
2) a polymorphic program enacted by voting parties


<http://www.youtube.com/watch?v=A9vGMMPM5Lg>


Nemesis' Game Theory
-The best strategy is to change the rules to your advantage

Rules
The object of the game is to have more value than your competitor at the end of the game

2 parties (partyA, partyB) are in direct competition

Each party has a message (MA, MB) with respective values (VA, VB)

PartyA has a number of constituents NA

PartyB has a number of constituents NB

Once a constituent has been exposed to a message there is no way of proving the removal of the message from the constituent

Competing parties are allowed to pay a competitor's constituents to disclose a message

Constituents can disclose a message to a competitor

If a message is disclosed, the chance a given constituent disclosed the message is 1/N where N is the number of constituents exposed to that message by the party

Constituents make decisions based on the options with the highest expected value governed by the equation:

               Expected Value = Summation from i=0 to n of (Pr(i) * reward(i))

Strategy: the more constituents a party has, the more likely the party's message will be disclosed


Optimal Strategies / Balanced Range

A balanced range is a set of occurrences with neutral expected value.
Decision making against a balanced range is indifferent.
As a result, a balanced range is game theoretically unexploitable.
Whatever action is taken against a balanced range has neutral expectation.
An unbalanced range is exploitable.  
An exploitable strategy is not optimal.  

The current American economic climate is unbalanced.  
The expected value of an invention that takes place within an organization is higher than that of a similar invention invented outside of an organization as a result of legislation forcing independents to play a cooperative game. (while organizations are able to play a non cooperative game through lobbying to change the rules of the game)
This means the current economic climate is exploitable by providing a non cooperative game for the people playing the game (citizens).

EV for a person who could innovate = (chance you innovate) * (monetary value of innovation) * (1 - chance your innovation is stolen)

How the Middle Class, Corporate Elite Exploit the Producing Class


The intellectual producing class increases the wealth of humanity by removing obstacles that once existed as an inefficiency in the economy.  Scientists, innovators, and content creators, produce new wealth for society by using their brains to produce new information that has value to people.  Unfortunately, monetary compensation does not mirror wealth creation.  

Monetary compensation for this type of wealth creation is regulated by the USPTO and the Federal Reserve.  Legislation for the USPTO and the Fed are created by a coalition of voters and corporate lobbyists.  These groups attempt to divert monetary compensation from producers to themselves for their own self interest.  There is a symbiotic relationship between corporations and the middle class: the middle class votes along with corporate lobbyists in exchange for higher paying jobs and more jobs, which corporations can afford by rerouting monetary compensation from wealth producers to themselves.  Both the middle class and corporate America are dependent on this system.  They have a parasitic relationship with the producing class.  

The needs of this coalition grow over time, becoming more dependent on money diverted from producers.  Intellectual Property laws are on a one way path, squeezing money from individual producers while inflating monetary compensation for production inside large organizations.  
...

<http://www.youtube.com/watch?v=aTL4qIIxg8A>

I know you're out there. I can feel you now. I know that you're afraid. You're afraid of us. You're afraid of change. I don't know the future. I didn't come here to tell you how this is going to end. I came here to tell you how it's going to begin. I'm going to hang up this phone, and then I'm going to show these people what you don't want them to see. I'm going to show them a world without you. A world without rules and controls, without borders or boundaries; a world where anything is possible. Where we go from there is a choice I leave to you.


Helpful Skills
•   C++
•   Ruby
•   Python
•   Java
•   Algorithms
•   Encryption
•   Mathematics
•   Game Theory
•   Experience establishing anonymizing networks and software
•   Asic Miners
•   Storage Miners
•   Creativity and Logic

Publicly verifiable proof of storage
Inputs X and Y are hashed together to produce a digest
Input X can be a message M or an encryption and key of message M
Input Y is the randomly generated challenge
The proof is when the hash of X and Y produce a digest with an output of zeroes I.E. 00000000000
A storer must find an input Y that satisfies a digest requirement of a string of zeroes I.E. 0000000000 by randomly generating numbers to use as input Y.  
The proof of storage is a proof of work on information.  The information must be stored to perform work with it.  The storage of the information can be easily proved by checking that the requirement of a string of zeroes was satisfied.

TL;DR: A cryptographic ledger with stock in the ledger that trades similarly to bitcoins.  Each person who submits information to the ledger is compensated with a cryptographic currency specific to the submission.  These information specific currencies get value from advertising rights sold exclusively in the currency.  
439  Alternate cryptocurrencies / Altcoin Discussion / Re: We need more alt coins...... on: November 16, 2013, 09:55:32 PM
whats the difference between a premine and an high early inflation rate that tapers off over time (aka what bitcoin has now)?

answer: not much
440  Bitcoin / Project Development / Re: Mastercoin, how do you reverse? on: November 16, 2013, 09:48:32 PM

the hacker then spends the coins and these coins are spent again and again
Hacker can't spend coins on reserve.  They just sit there in the penalty box waiting for the reserve time to expire.

don't listen to TKeenan he's a huge misinformation troll just trying to talk up his favorite coin.  You clearly found a new exploit.  Looks like master coin is gonna tank everybody sell that shit is not secure at all!!!!

I was just joking, tkeenan is correct
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 [22] 23 24 25 26 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!