Bitcoin Forum
May 21, 2024, 05:43:51 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 [191] 192 193 194 195 196 197 198 199 200 201 202 »
3801  Economy / Services / Re: [OPEN] BitcoinCalculator.org Signature Campaign | Full Members+ on: November 02, 2020, 07:22:41 PM
Bitcointalk Profile Link:  Husires
Current amount of posts (Including this one): 240
EARNED merit in the last 120 days: 236
SegWit BTC Address: 35TcgRH3n463DveQc6YjoAgtN5BbSqzMAq
3802  Economy / Services / Re: [OPEN]Blenderwallet.io Signature Campaign | Sr. Members+ ~ Up to$62.5/Week on: November 02, 2020, 07:21:47 PM
Bitcointalk Profile Link:  Husires
Current amount of posts (Including this one): 240
EARNED merit in the last 120 days: 236
SegWit BTC Address: 35TcgRH3n463DveQc6YjoAgtN5BbSqzMAq
3803  Local / Konu Dışı / [Yardım] Bir Bitcoin yüzüğü yapsaydım, tasarımda ne istersiniz? on: October 11, 2020, 03:52:03 AM
Bu yüzükleri kişisel bir olay için yapmayı planlıyorum, ancak birkaçını özel olarak yapabilir veya küçük bir aktivite başlatabilirim.
Tasarımda ne istersiniz?
Aklımdaki fikir şu şekilde:


Bitcoin logosu, genel adresin arkası ile iki bölüme ayrılacaktır.
Bitcoin enflasyon diyagramını yazdırmaya çalışıyordum ama sonuç baaad oldu, peki hazırlanabilecek fikirler neler?
Powell, harfleri yanlara işliyor.
Özel anahtarı yazdırmaya çalışacağım ama uygun bir yer bulamadım.
3804  Local / Yeni Başlayanlar & Yardım / Fibonacci on: October 11, 2020, 03:45:39 AM

Feragatname: Bu açıklamada yer alan bilgiler benim Fibonacci Retracement anlayışımın bir sonucudur ve bazı hatalar içerebilir. Arayın ve onaylayın..


İçindekiler

      1. Fibonacci geri çekilmesi nedir?
      2. Fibonacci düzeltme nasıl kullanılır?
      3. Fibonacci Düzeltmeleri ve Fibonacci Uzantıları Arasındaki Fark




Fibonacci geri çekilmesi nedir?

Piyasa düzeltici bir aşama ile başladığında neler bekleyebileceğinizi öğrenmeye başlayacağız, öğreneceğimiz en önemli araçlardan biri Fibonacci geri çekmenin nasıl kullanılacağıdır.

İlgi alanlarını tahmin etmek için Fibonacci oranlarını yüzde olarak kullanmakla ilgilidir. Bu oranlar:
0%
23.6%
38.2%
61.8%
78.6%
100%

% 261,8 veya% 423,6 gibi% 100'ün üzerindeki yüzdeler kullanılabildiğinden sabit yüzdeler değildir.

Aradığımız önemli nokta% 50.


Fibonacci düzeltme nasıl kullanılır?

Fibonacci serisinin sayılar olduğunu hesaba katarsak

1, 1, 2, 3, 5, 8, 13, 21, 34, 55 vb.

Bir sayıyı takip eden sayıya bölerseniz, 0,61'e yakın bir yüzde elde edersiniz ve ondan önceki sayıyı alırsak 0,38 alırız ve bu nedenle, eğer koyarsak aralık içindeki seviyeleri grafiklemek için kullanılabilir. iki önemli fiyat noktası ve ardından bu aralık temel eğilime göre çizilir.

Bu nedenle, tersine dönme veya kırılma gibi bir tür fiyat hareketi beklenir.


Fiyatın 20 dolardan 35 dolara yükseldiğini ve geri çekilme göstergesini çizmek istediğinizi varsayalım.

% 23,6 seviyesi (35- (15 * 0,236)) = 31,46 $ olacaktır
% 50 seviyesi (35- (15 * 0,5)) = 27,5 $ olacaktır
% 61,8 seviyesi (35- (15 * 0,618)) = 25,73 $ olacaktır


S&P 500 (Dalga 2 düz. Dalga 4 zikzak) tablosunda 5 dalgalı hareket olarak grafiklerde kullanabiliriz.





Fibonacci Düzeltmeleri ve Fibonacci Uzantıları Arasındaki Fark

Fibonacci geri çekilmeleri, geri çekilme için yüzdeler uygular
Fibonacci uzantıları, trend yönündeki bir harekete yüzde uygular


Eğer fiyat 5000 $ 'dan 10.000 $' a yükselirse, sonra tekrar 6000'e yükselir. 10.000'den 6000'e geçiş, geri çekilmedir ve 14.000'e ralli uzatma demektir.

Kaynak https://bitcointalk.org/index.php?topic=5274632.msg55161978#msg55161978
3805  Economy / Trading Discussion / Fibonacci Retracement for dummies on: September 09, 2020, 11:24:19 AM

Disclaimer: The information's contained in this explanation is the result of my understanding of Fibonacci Retracement and may contain some errors. Search and confirm about it.


Table of contents

      1. What is Fibonacci retracement?
      2. How to use Fibonacci retracement
      3. The Difference Between Fibonacci Retracements and Fibonacci Extensions
      4. Limitations



What is Fibonacci retracement?

We talked about in the last article Elliott Waves, and today we will start learning what you can expect when the market begins with a corrective phase, one of the most important tools that we will learn is how to use Fibonacci retracement.

It is about using Fibonacci ratios as percentages to predict areas of interest. These ratios are:
0%
23.6%
38.2%
61.8%
78.6%
100%
It is not fixed percentages, as percentages higher than 100% such as 261.8% or 423.6% can be used.

The important point that we will be looking for is 50%.


How to use Fibonacci retracement

If we take into account that the Fibonacci series are numbers

1, 1, 2, 3, 5, 8, 13, 21, 34, 55, etc.

If you divide a number by the number that follows it, you will get a percentage close to 0.61, and if we take the number that precedes it, we get 0.38, and thus it can be used to chart levels within the range if we put two important price points, and then this range is drawn according to the basic trend.

Hence some type of price movement is expected, either a reversal or a break.


Suppose the price rises from $20 to $35, and you want to draw the retracement indicator.

23.6% level will be (35- (15*0.236)) = $31.46
50% level will be (35- (15*.5)) = $27.5
61.8% level will be (35- (15*.618)) = $25.73


we can use it on charts as 5-wave move on the chart of the S&P 500 (Wave 2 flat. Wave 4 zigzag)





The Difference Between Fibonacci Retracements and Fibonacci Extensions

Fibonacci retracements apply percentages to a pullback
Fibonacci extensions apply percentages to a move in the trending direction


if the price rise from  $5000 to $10,000 then back to 6000. the move from 10,000 to 6000 is retracements and rally to 14,000 is extension.


Limitations
Although it indicates where the price might find support or resistance, there is no certainty of that, so the price may reverse or bounce back. Therefore, it should be used in conjunction with other technical indicators and should not be relied upon entirely.




Sources



Code:
https://www.investopedia.com/terms/f/fibonacciretracement.asp
https://comparic.com/learn-apply-fibonacci-retracements-trading/

3806  Other / Beginners & Help / [HELP] Help me translate my topics on: September 07, 2020, 06:59:55 PM
I use this forum to learn more information about cryptocurrencies, and then I try to summarize this information in the form of topics that help others learn things faster.
I have collected about 130 merits and I would like to use some of them for this project.
If you modify the content, I have no problem, but try to collect the correct information as possible.

If you find any wrong information, help me correct it.

Hardware wallets

- <List> Bitcoin Seed Backup Tools

Marketplace
Goods
- [WTS] EDU How to spot Marketplace scammers Guide ~free shiping
Digital goods
- [WTS] EDU How to spot Digital goods scammers Guide

Service Discussion
- <List> Bitcoin Payment Processors

Trading Discussion:
- Position Size for dummies
- VWAP for dummies
- Bitcoin Support and Resistance for dummies
- [Tutorial] Golden cross VS death cross
- Merkle Trees and Merkle Roots for dummies
- Elliott Wave Theory for dummies

Meta
- [Quiz] Bitcointalk history of hacks
- Quiz: History on Bitcointalk
- Quiz: Signature Campaign Guidelines
- Online challenge, test your knowledge about Bitcointalk

Beginners & Help
- hash function for dummies
- Ponzi Schemes for dummies
- Bitcoin Scripts for dummies
- Schnorr signatures for dummies


Altcoin Discussion
- Bitcoin Sidechains for dummies
3807  Economy / Trading Discussion / [GUIDE] Elliott on: September 07, 2020, 06:41:23 PM

Disclaimer: The information's contained in this explanation is the result of my understanding of Elliott Wave Theory and may contain some errors. Search and confirm about it.


Table of contents

      1. What is Elliott Wave?
      2. Cycles and waves
      3. The theory
      4. Basic rules on impulse
      5. How to trade?



What is Elliott Wave?

It was developed by Ralph Nelson Elliott to describe price movements in financial markets. Its principle is based on the idea that financial markets tend to follow specific patterns, whatever the time frame in which they observe and identify patterns of repeated fractal waves.

Elliott waves can be used to analyze financial market cycles and can be used in investor psychology, highs and lows in prices, and other collective factors.


Cycles and waves

The psychological behavior of trading is reflected in the form of waves rather than simple straight lines which is one of the biggest features of Elliott theory. It is a reflection of the Elliott studies of Charles Dow's work, in which the Dow theory states that stock prices usually move in waves.

It can be used as a tool for technical analysis and trying to determine market cycles and trends, but it is not a trading technique but rather a theory that may help in predicting market behavior.

Elliott saw that with each direction there are usually impulsive waves (five waves), followed by a corrective wave in the opposite direction (three waves).


This pattern repeats itself indefinitely on ever smaller scales, regardless of time scale.


The theory

Each impulsive movement will be followed by a corrective move. Where the first five waves can be represented by impulsive movements (called numbers 1-5) that move in the direction of the main trend. The next three waves provide corrective waves called A, B, and C.


Once the 5-3 move is complete, we have completed a single cycle.

The awesome oscillator can also be used to identify waves, as it compares the rate of change in prices. It can also be used to form the 5 wave using the 7-period moving average (DMA) and the 5-period shift to the right.

Basic rules on impulse


  • Wave 2 never retraces more than 100% of wave 1;
  • Wave 4 retraces more than 100% of wave 3;
  • Wave 3 always goes beyond the end of wave 1;
  • Wave 3 cannot be the shortest of the three impulse waves.
  • Wave 4 is not in wave 1 area.




Elliott illustrated a series of categories for waves, which show when you will see the same patterns in both the long-term and short-term charts:

  • Supercycle: (about 40 to 70 years)
  • Cycle: one year to several years
  • Intermediate:weeks to months
  • Minor: weeks
  • Minute: days
  • Minuette: hours
  • Sub-minuette: minutes


How to trade?

It can be used successfully if the following two conditions are met. It can also be used effectively with Fibonacci retracements.

  • One-way pulse start and irregular correction.
  • Impulse and correction as zigzag.

Look for the pulse as a quintuple movement in any direction, check if the end of the pulse is an additional three-wave structure (50%, 62% and 75%.)
Place your stop loss above the critical retracement level 75 and you can take profits by setting a third wave range based on the first wave.


Another scenario:
Look at rule three, and look for the fourth wave to be relatively shallow, with 23.6% -50% levels of particular interest. We can also look for the correct A, B, C move to be a 50% -61.8% retracement of the full impulse 1-5.

Very thankful:  https://comparic.com/author/przemyslaw-jarzabek/



Source

Code:
https://www.ig.com/en/trading-strategies/elliott-wave-theory-explained-180830
https://comparic.com/elliott-wave-theory/
https://elliottwave-forecast.com/elliott-wave-theory/
https://www.investopedia.com/articles/technical/111401.asp
https://www.investopedia.com/terms/e/elliottwavetheory.asp#:~:text=Key%20Takeaways,that%20oppose%20the%20larger%20trend.
https://academy.binance.com/economics/an-introduction-to-the-elliott-wave-theory
3808  Bitcoin / Legal / Bithumb found ‘partially liable’ for a 2017 hacking incident on: September 07, 2020, 04:27:18 PM
In order to enact the attack, the cybercriminal uses the data leak that occurred on JUL 07, 2017, impersonated a Bithumb Customer Center agent, and contacted some people who provided them with data that they believed the Bithumb employee was the only one who would get it.

The hacker then sent a message to the victims stating that he discovered a suspicious login attempt on them accounts and that he needed a verification code.
Once he got the code, he withdrew them balance.

Victims attempted to get $ 126,000 and $ 38,000, respectively, for damages related to the data breach in 2017.

Quote
According to Fn News, plaintiffs Hong and Seo (both named only by their surname) stated that they had lost money due to a phishing attack using private data that was extracted in a hack of Bithumb. The third claimant, Jang, was granted $5,000 to cover his total loss. This amount reflects a much lower dollar value than his initial $27,200 claim.

In all three cases, the court said that the exchange was guilty of negligence, as they could have allocated more resources in terms of security to prevent the massive data breach incident.

The judge, however, found both Bithumb and Jang partially responsible, noting that the victim provided details that were not originally included in the data which was exfiltrated from the exchange.

The total amount Jang get is $ 5,000 of the original amount, so it seems that you will not get back much if there is a hack happen to the platform you are trading on.



News source: https://cointelegraph.com/news/bithumb-found-partially-liable-for-a-2017-hacking-incident
Bithumb data systems hack: https://cointelegraph.com/news/south-korean-cryptocurrency-exchange-bithumb-to-compensate-users-following-the-hacking
3809  Economy / Collectibles / [Help] If I made a Bitcoin ring, what would you like in the design? on: September 06, 2020, 06:27:37 PM
I am planning to make these rings for a personal occasion but I can custom-make a few or start a small activity.
What would you like in the design?
The idea in my mind is as follows:


The Bitcoin logo will be divided into two parts with the back of the public address.
I was trying to print bitcoin inflation diagram, but the result was baaad, so what are the ideas that can be prepared?
Powell engraving the letters on the sides.
I will try to print the private key, but I could not find a suitable place.
3810  Local / Bitcoin Haberleri / Re: Ethereum Classic Labs, Gelecekteki% 51 Saldırılarını Durdurmak İçin Yeni Bir Pla on: September 06, 2020, 04:22:15 PM
Karma oranını tek bir siteden (% 51 saldırısı yapmaya yetecek kadar) ve ucuz bir fiyata satın alması kolay bir para birimi, gelecekteki planları hakkında konuşmak veya merkezi olmadan bu saldırıları önlemek için nasıl olabilir?
ETC'nin para birimi çöp ve fiyatının düşmesini bekliyorum, bu da hash gücünü kontrol etmeyi kolaylaştırıyor.

Yapabilecekleri en son şey, "hardfork" kullanarak kodu yükseltmek veya üretim oranını ayarlamak ve fiyatı daha güçlü hale getirmek için tedarik edilen miktarı azaltmaktır.

Ethereum Classic Labs, Dolandırıcılar ve herkese bu para birimini hemen satmasını tavsiye ediyorum.
3811  Local / Yeni Başlayanlar & Yardım / Merkle trees ve Merkle roots on: September 06, 2020, 02:30:32 PM

Feragatname: Bu eğitimdeki bilgiler, Merkle trees ve Merkle roots anlamamın bir sonucudur ve bazı hatalar içerebilir. Tüm bilgileri gözden geçirin ve doğru olduğundan emin olun.


English Topic: https://bitcointalk.org/index.php?topic=5272933.msg55110498#msg55110498


İçindekiler

      1. Merkle tree nedir?
      2. kripto Hash Fonksiyonları
      3. Merkle trees nasıl çalışır?
      4. Merkle trees Kullanımlar
      5. Neden Bitcoin'de kullanılıyor?


Source: Bitcoin whitepaper


Merkle tree nedir?

Merkle tree (ayrıca bir karma ağaç olarak da bilinir), her yaprak düğümünün bir veri bloğunun karması ile etiketlendiği ve yaprak olmayan her düğümün, alt düğümlerinin etiketlerinin karması ile etiketlendiği bir ağaçtır.

Bir Merkle tree, yaprak olmayan her düğüm, alt düğümlerinin etiketlerinin karması (veya ağacın altındaki bir yaprağın değerinin karması) ile etiketlenir; bu, ağaçta yukarı çıktıkça kendini tekrar eden bir süreçtir. tek bir hash kaldı: Merkle root.


Merkle root: bir blok zinciri ağındaki bir bloğun parçası olan tüm işlemlerin tüm karmalarının karmasıdır.

Yapısı, bir gruptaki verileri verimli bir şekilde doğrulamak için kullanılır.
Fikir, 1979'da Ralph C. Merkle tarafından yaratıldı ve patentlendi, patenti 2002'de sona erdi.


kripto Hash Fonksiyonları

Sabit boyutlu bir çıktıya sahip olmamızı sağlayan herhangi bir işlev, çünkü girdi için tamamen benzersizdir ve işlevin kendisi belirleyicidir.
Ayrıca, önemli ölçüde depolama tasarrufu sağlar ve verimliliği artırmaya yardımcı olur.

Misal:

Code:
girdi: H
Çıktı: 44bd7ae60f478fae1061e11a7739f4b94d1daf917982d33b6fc8a01a63f89c21

girdi: Husires
Çıktı: 198d93f2c0bff9767d4cdc047f2191b0921d81e410c10c0744311fadfdb516f9

girdi: Today is 1/9/2020 and i used my username: Husires
Çıktı: 2afbf1c88e101259002a592dbcc9340af2f0fa8f51a06e77910b6aca63a97c0c

girdi: Today is 1/9/2020 and i used my username: Husires
Today is 1/9/2020 and i used my username: Husires
Today is 1/9/2020 and i used my username: Husires
Today is 1/9/2020 and i used my username: Husires
Today is 1/9/2020 and i used my username: Husires
Çıktı: 43a322d0eb09caaf26762ae18a369f5e8e06ac32c9e6a0d9fb4972aa53654db8


Merkle trees nasıl çalışır?

diyelim ki 8GB'lık bir dosyanız var ve onu doğrulamak istiyorsunuz, böylece sahip olduğunuz hash'leri geliştiriciler tarafından halka açık hale getirilen hash ile eşleştiriyorsunuz, yani içindeki her dosya tüm verilerle eşleşiyorsa doğru dosyayı indiriyorsunuz, ama bunu nasıl yapacağız ?

Son dosyaya gelene kadar her dosyayı ayrı ayrı karşılaştırabilirsiniz (bu nedenle 8GB'lık dosyaları karşılaştırmanız gerekir) ancak bu uzun zaman alacaktır. Merkle tree, çalışma süresini azaltan bir çözüm sunar.

İlk olarak, büyük problemi daha küçük problemlere ayıracağız. 8GB'lık bir dosyaya sahip olmak yerine, onu sekiz parçaya böleceğiz. A'dan H'ye kadar farklı parçaları çağırın. Sonra her bölüm bize sekiz farklı hash veren bir hash fonksiyonundan geçirilir.


Her çifti alıyoruz, karşılaştırıyoruz ve (hA + hB, hC + hD, hE + hF ve hG + hH) elde ediyoruz, sonra fonksiyonu alıp tekrarlıyoruz.



Merkle trees Kullanımlar

IPFS, Btrfs, ZFS dosya sistemleri, Bitcoin ve Ethereum ve Apache Cassandra, Riak ve Dynamo gibi bir dizi NoSQL sistemlerinde depolanan ve depolanan her türlü veriyi doğrulamak için kullanılabilir.



Neden Bitcoin'de kullanılıyor?

Blok başlıklarında bulunabilecekleri tüm bloklarda bulunurlar.

SPV: Hepimiz kalıcı düğümlere bağlı cüzdanlara güveniyoruz ve tüm blok işlemlerini indirmek yerine, Merkle Kanıtı'na ihtiyacınız var - işleminizin belirli bir blokta olduğunu kanıtlayan bir düğüm tarafından sağlanan kanıt.

Örneğin hB'yi doğrulamak için 7 adım yerine 3 adımla doğrulayabiliriz. HA'ya sahipsek, hAB üzerinde çalışabiliriz. HABCD'yi hCD ve hEFGH ile hesaplayabilmemiz için, elde edilen Merkle kökünün blok başlığındaki ile eşleştiğini doğrulayabiliriz.

Sadece 3 adım.

https://bitcoin.org/bitcoin.pdf

Madencilik: Bitcoin bloğu iki parçadan oluşur, Başlık (sabit boyutlu) ve bir işlem listesi (değişken boyutlu)
Çoğu zaman, bloğun çoğu aynı kalır ve (nonce) değiştirilir.





Sources

Code:
https://en.wikipedia.org/wiki/Merkle_tree
https://brilliant.org/wiki/merkle-tree/
https://www.youtube.com/watch?v=fB41w3JcR7U
https://golden.com/wiki/Merkle_tree-W3DMKV
https://academy.binance.com/blockchain/merkle-trees-and-merkle-roots-explained
https://blockonomi.com/merkle-tree/
3812  Other / Beginners & Help / Re: Schnorr signatures for dummies on: September 02, 2020, 02:42:41 PM
Quote
Schnorr signatures are quite simple compared to ECDSA signature, more secure with powerful property: linearity.
i don't think this is correct (unless you have a reference for it). both ECDSA and ECSDSA are similarly secure. the only difference is that ECSDSA algorithm is easily verifiable to be secure.

Sorry for the late response, the answer is yes, Schnorr signatures are safer because they contain the linear property (you add more than two public keys to jointly produce a signature.

Source: https://bitcoin.stackexchange.com/questions/77234/schnorr-vs-ecdsa


More  
Quote
Instead of two scalars (r,s) we use a point R and a scalar s. Similar to ECDSA, R is a random point on elliptic curve (R = k×G). Second part of the signature is calculated slightly differently: s = k + hash(P,R,m) ⋅ pk. Here pk is your private key, P = pk×G is your public key, m is the message. Then one can verify this signature by checking that s×G = R + hash(P,R,m)×P.


Source: https://medium.com/cryptoadvance/how-schnorr-signatures-may-improve-bitcoin-91655bcb4744


in bitcoin the proposal is also introducing additional steps that removes some extra bytes (DER encoding and pubkey starting byte) which shrinks each signature in size.

I tried to make it simpler because it is for dummies without going into too much detail.



if you have time read this Simple Schnorr Multi-Signatures with Applications to Bitcoin
3813  Other / Beginners & Help / Merkle Trees and Merkle Roots for dummies on: September 01, 2020, 07:06:05 PM

Disclaimer: The information's contained in this explanation is the result of my understanding of Merkle Trees and Merkle Roots and may contain some errors. Search and confirm about it.


Table of contents

      1. What is a Merkle tree?
      2. Cryptographic Hash Functions
      3. How do Merkle trees work?
      4. Merkle trees Uses
      5. Why it used in Bitcoin?


Source: Bitcoin whitepaper


What is a Merkle tree?

Merkle tree (also known as hash tree) a tree in which every leaf node is labelled with the cryptographic hash of a data block, and every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes.

In a Merkle tree, every non-leaf node is labelled with the hash of the labels of its child nodes (or the hash of the value of a leaf at the bottom of the tree), a process which repeats itself moving up the tree until a single hash remains: the Merkle root.


Merkle root: is the hash of all the hashes of all the transactions that are part of a block in a blockchain network.

Its structure is used to efficiently verify the integrity of data in a group.
The idea was created and patented by Ralph C. Merkle in 1979, with the patent expiring in 2002.



Cryptographic Hash Functions

Hash function is any function that enables us to obtain an output of a fixed size as it is completely unique to the input and the function itself is deterministic.
It also leads to significant savings in storage and helps increase efficiency.
You can find out more information by reading the previous topic that I wrote about hash function for dummies

Example:

Code:
In-put: H
Out-put: 44bd7ae60f478fae1061e11a7739f4b94d1daf917982d33b6fc8a01a63f89c21

In-put: Husires
Out-put: 198d93f2c0bff9767d4cdc047f2191b0921d81e410c10c0744311fadfdb516f9

In-put: Today is 1/9/2020 and i used my username: Husires
Out-put: 2afbf1c88e101259002a592dbcc9340af2f0fa8f51a06e77910b6aca63a97c0c

In-put: Today is 1/9/2020 and i used my username: Husires
Today is 1/9/2020 and i used my username: Husires
Today is 1/9/2020 and i used my username: Husires
Today is 1/9/2020 and i used my username: Husires
Today is 1/9/2020 and i used my username: Husires
Out-put: 43a322d0eb09caaf26762ae18a369f5e8e06ac32c9e6a0d9fb4972aa53654db8
What did you get from this example?



How do Merkle trees work?

Let's simplify it, suppose you have a large file size of 8 GB and you want to verify its authenticity, so you match the hash that you have with the hash that was made available to the public by the developers and therefore if each file in it matches all the data then you downloaded the correct file, but how will we do that?

you can compare each file separately until you reach the last file (so you need to compare 8 GB files) but it will take a long time. Merkle trees offer a solution which will reduce your running time.

First, we will divide the big problem into smaller ones. For example, instead of having an 8 GB file, we will divide it into eight pieces. Call the different parts A through H. Then each part is passed through a hash function, which gives us eight different hashes.


Now we take each pair and compare them (hA + hB, hC + hD, hE + hF, and hG + hH,) and then combine them, using the hash function and repeat.


So any slight modification to the data will give us a completely different Merkle root. We can also check the non-conforming part easily.



Merkle trees Uses

can be used to verify any kind of data stored, help ensure that data blocks received from other peers in a peer-to-peer network are received undamaged and unaltered, used in the IPFS, Btrfs and ZFS file systems, the Bitcoin and Ethereum peer-to-peer networks, and a number of NoSQL systems such as Apache Cassandra, Riak, and Dynamo.



Why it used in Bitcoin?

They are an integral part of every block, as they can be found in the block headers.

Use it in SPV: Many of us have limited resources in terms of space and internet so we all rely on light clients, and instead of downloading all block transactions, you require Merkle proof - evidence provided by the full node proving that your transaction is in a particular block.

If we go back to the previous example, we can verify through 3 steps instead of 7 steps, for example to verify hB. If we have hA, we can work out hAB. so we can calculate hABCD by using hCD and with hEFGH, we can check that the resulting Merkle root matches the one from the block header.

3 Steps only.

You can read more in https://bitcoin.org/bitcoin.pdf

It has some Drawbacks with a successful 51% attack  which will talk about it in another topic.

Mining: Bitcoin block is made up of two pieces, Header (fixed-size) and a list of transactions (variable-size)
Often times, much of the block remains the same, and the nonce is changed.

Merkle root simplifies the whole process, the miner selects all the transactions it wants to include in the block, creating a Merkle tree and only need to hash the head of the block, rather than the entire block.

Hence, any change in the transaction list will change the Merkle root and thus reject the block.



Sources

Code:
https://en.wikipedia.org/wiki/Merkle_tree
https://brilliant.org/wiki/merkle-tree/
https://www.youtube.com/watch?v=fB41w3JcR7U
https://golden.com/wiki/Merkle_tree-W3DMKV
https://academy.binance.com/blockchain/merkle-trees-and-merkle-roots-explained
https://blockonomi.com/merkle-tree/
3814  Economy / Digital goods / Re: [WTS] EDU How to spot Marketplace scammers Guide ~free shiping on: September 01, 2020, 04:46:35 PM
bump
3815  Other / Beginners & Help / @Husires Top-merited user, recent merit on: August 02, 2020, 11:54:23 AM
It is easy to get merits, I joined to this fourm a few days before activating the merit system, and I did not have time to post, I came back again a month ago and managed to collect about 200 merits in less 30 days.

General tips:

- Find a topic that interests you.
- Search for the topic: using Google, YouTube, Bitcointalk, bitcoin.stackexchange.com
- Summarize it.
- Try explaining it and reformulating it as a topic.
- You will find that you have learned a lot about things you did not know.


Some useful topics:

Hardware wallets
- <List> Bitcoin Seed Backup Tools


Marketplace

Goods
- [WTS] EDU How to spot Marketplace scammers Guide ~free shiping

Digital goods
- [WTS] EDU How to spot Digital goods scammers Guide

Service Discussion
- <List> Bitcoin Payment Processors



Trading Discussion:
- Position Size for dummies
- VWAP for dummies
- Bitcoin Support and Resistance for dummies
- [Tutorial] Golden cross VS death cross


Meta
- [Quiz] Bitcointalk history of hacks
- Quiz: History on Bitcointalk
- Quiz: Signature Campaign Guidelines
- Online challenge, test your knowledge about Bitcointalk



Beginners & Help
- hash function for dummies
- Ponzi Schemes for dummies
- Bitcoin Scripts for dummies
- Schnorr signatures for dummies


Altcoin Discussion
- Bitcoin Sidechains for dummies
3816  Economy / Digital goods / [WTS] EDU How to spot Marketplace scammers Guide ~free shiping on: August 02, 2020, 11:30:56 AM

Table of contents

      1. Introduction
      2. How to spot Marketplace (Goods) scammers?
      3. Some new scam methods
      4. Protect yourself when buying:
      5. Protect yourself when selling:


Introduction

Scammers use clever plans and renewed ideas to scam millions of people every year. Often it combines old scams with new ideas, i will explain some old scams and give you some keys to learn about fraud so you can avoid new ideas.

How to spot Marketplace (Goods) scammers?

  • Spot imposters: they pretend to be trusted people like DT Members, people you may know, don't believe them always ask.
  • Don online Search: Scammers tend to be lazy so if you search for them you will find some useful information.
  • Ask the seller to take photos of the item with username, date of the day, and random code: +you must request a sufficient period to verify it before releasing escrow.
  • Don’t ignore red flags: Rate anything that looks unusual
  • Take a close look at the user trust page, security page: you can use https://bpip.org | Loyce.club
  • report the scammer/Ask the community: Report when you suspect anything, as you can ask, everyone will try to help you.
  • Always use escrow: Always use escrow. Accounts are bought and sold regularly.
  • Ask for signed Escrow address:Ask the trusted party to sign a message.
  • Use Bitcointalk PM to send payments: Request sending payments using the forum messages.



Some new scam methods

Overpayment Scam
This scam looks old but it's still working. scammers show (using Fake images/ centeral scam escrow/ fake sites) they've sent more than total payment, and then they ask you to return the price difference or a total payment.

Outdated token payment:
You can read the sad story of scam: Lost 0.08 BTC [Please stay safe] Outdated token payment
@mdayonliner lost 0.08 BTC because he used an Outdated token as controller. payment has been lost
The lesson is that you do not accept any payments in token/Altcoin that you do not know. Not all of them work like Bitcoin, some are central and others contain outdated token / burned tokens.




Protect yourself when buying:

Too good to be true:
If it sounds too good to be true, it probably is.
Be wary of sellers offering well-known merchandise and brands at prices lower than 50% of their price and possibly more.
Always try to avoid buying from them, it is better to buy a product at a 20% discount instead of losing your money trying to buy another at a 50% discount.

Repeating deals does not mean that stopping use escrow:
Scammers do some good deals with you to earn your trust and then ask you to send without using escrow.


Protect yourself when selling:

Phishing Links:
Do not click on any link indicating that the buyer has paid.

Make sure that you receive the funds, before sending the item:
If the transaction has not been confirmed or received in your wallet (not a central site/wallet, low fees) or escrow wallet, do not send the item.

Repeating deals does not mean that stopping use escrow:
Scammers do some good deals with you to earn your trust and then ask you to send without using escrow.



Price: 1 Satoshi  Tongue Tongue Tongue Free shiping
3817  Economy / Trading Discussion / Position Size for dummies on: August 01, 2020, 03:09:35 PM

Disclaimer: The information's contained in this explanation is the result of my understanding of Position Size and may contain some errors. Search and confirm about it.


Table of contents

      1. Introduction
      2. Why is that important?
      3. What is position size?
      4. How to determine account risk?
      5. How to calculate position size?
      6. Hash function properties
      7. Hash function & Mining




Introduction

Not knowing how to manage risk leads will leads you to lose your money, no matter your technical knowledge and the size of your portfolio, so you find, for example, that a person has about $ 1,000 in his account, got an entry confirmation and did all the technical analyzes to ensure the opportunity to make profits if he buying or selling at that point, but there is still One important thing to do. He has to calculate the size of the position he will take.

Ignoring the right risk management practice will result in a huge loss in a short time. You will lose all years of hard work.




Why is that important?

Making emotional decisions is a disaster when you want to trade, when it comes to risks, you must avoid emotions.
A lot of people understand "risk management" as trying to fit stop loss orders so that they are too narrow to be too risky. This is a totally wrong strategy.

You will need to think about things like: How much capital can you take? The goal of the investment? Return on investment that achieves zero loss? But we will talk about a basic measure that many neglect, which is the size of your positions for individual deals.




What is position size?

position size allows traders to have a fixed amount of risk per deal regardless of the size or the smallness of the market movement

position size:                     Risk Amount / Distance to stop loss.
Risk amount:                         Amount (normally USD) that you going to risk (1% rule.)
Stop loss:                              price level that you think your trade is invalidated in which you exit to prevent losses.
Distance to Stop loss:             (Entry price - Stop loss price) / Entry price

Source: https://www.tradingview.com/chart/BTCUSD/BB3JTyox-How-to-calculate-position-size/





How to determine account risk?


it is determination of the percentage of capital that can be risked in one transaction involves.
It is better to give the same risks in all deals and give them all equal opportunities but if you are very confident in the analysis, increase the risks provided that it does not exceed 10% and that you do not use emotions.


The 2% rule:

It is an appropriate strategy for highly volatile markets that need to define long-term positions.
If you are active, you may use The 1% rule.

There is no one-size-fits-all approach to determining your stop loss. Therefore, you will have to start with fixed rates and then decide for yourself the strategy that best suits your style.




How to calculate position size?

Let's say we have an account with $ 10,000. We have demonstrated that we do not risk more than 1% in one trade and after analyzing the market we decided that our business idea was nullified by 5%:


Account size : $ 10,000
Account risk : 1%
Invalidation point : 5%

position size = account size x account risk / invalidation point = $10,000 x 0.01 / 0.05 = $2000

Thus we can mitigate the impact of a price collapse.

It is not related to strategy but to determining the levels of risk you want to face.

No we want to buy BTC at $8,000 and our SopLimit below key support level at $7,000 .
the Distance to SL would be ($8,000 - $7,000) / $8,000 = 0.125.
Now lets say our risk amount to be $100 per trade, the Position size in this example is thus equal to $100 / 0.125 = $800




Sources

Code:
https://www.youtube.com/watch?v=RE9tk78ALd0
https://tradingcryptocourse.com/course/position-size-calculator/
https://medium.com/@cryptoaims/how-to-calculate-position-size-for-your-trade-free-bitmex-calculator-b3dc0522d14
https://www.tradingview.com/chart/BTCUSD/BB3JTyox-How-to-calculate-position-size/
https://academy.binance.com/economics/how-to-calculate-position-size-in-trading
3818  Local / Alternatif Kripto-Paralar / Stablecoins: özel anahtarlarınız olsa bile,dondurulabilir on: August 01, 2020, 01:41:22 PM
Uyarı: Özel bir anahtarınız olsa bile paranız dondurulabilir.

CENTER Consortium, bir kolluk kuvveti talebine yanıt olarak bazı USDC adreslerini kara listeye aldı ve 100.000 dolar dondu.

Bir adres kara listeye alındığında ne olur?
Artık USDC alamaz ve bu adres tarafından kontrol edilen tüm USDC'ler engellenir ve taşınamaz.

Quote
CENTER Consortium, kolluk kuvvetlerinden gelen bir talebe yanıt olarak adresin kara listeye alındığını doğrulayabilir. Diyerek şöyle devam etti: Kolluk kuvvetleri taleplerinin ayrıntıları hakkında yorum yapamasak da, merkez, örgüt üzerinde uygun yargı yetkisine sahip bağlayıcı mahkeme emirlerine uyuyor.

USDC gibi dijital para birimleri, fonlar kullanıcının kontrolünde olsa bile tamamen merkezileştirilir.


Tether (USDT) ve USD COIN, TRUE USD ve BUSD (Binance usd) dondurulabilir / geri kazanılabilir ve dosyalarımın gönderilmesini engelleyebilirler ve dosyalarıma değer vermezler.

3819  Economy / Digital goods / . on: August 01, 2020, 12:51:33 PM
.
3820  Local / Primeiros Passos (Iniciantes) / função hash para iniciantes on: August 01, 2020, 10:57:31 AM

aviso Legal: Algumas informações podem estar erradas. Confira.


Índice

      1. Introdução
      2. Hash de Bitcoin
      3. Como a função hash funciona?
      4. Hash SHA-1, SHA-2 e SHA-256
      5. Sua utilidade?
      6. Função hash com mineração



Introdução

Se você enviou alguns Bitcoins ou perguntou como eles funcionam, notará a palavra "algoritmos de hash criptografados" ou "hashes de Bitcoin" ou algum vocabulário técnico como "SHA-1, SHA 256,e RIPEMD".
Não há dúvida de que você está ciente das funções de hash, mesmo que não as execute, você as utiliza diariamente e sempre que cria uma conta de usuário em um site, sua senha atua como um ponto de entrada para a função de hash.



Hash de Bitcoin

The hash function is a calculation that aims to generate a fixed-size output from a variable-sized input after it performs an operation (known as hash functions (implemented as hashing algorithms)) on it.
Sempre obteremos o mesmo hash dos mesmos dados, mas modificamos os dados mesmo que um bit mude completamente o hash.
Geralmente é escrito em hexadecimal.
Muitas vezes projetadas como funções unidirecionais, é muito fácil criar a saída a partir da entrada, mas é relativamente difícil seguir na direção oposta.



Como a função hash funciona?

Vamos voltar ao exemplo da criação de uma conta da Web. Quando você cria uma nova conta, a senha funciona através da função "hash" e é armazenada no servidor. Quando você deseja efetuar login novamente, a própria função de hash é ativada e o servidor verifica se o resultado corresponde ao valor armazenado.


O mesmo se aplica ao Bitcoin. Os tamanhos potenciais para cada algoritmo de hash são sempre constantes. Por exemplo, o SHA-256 produz saída de 256 bits, enquanto o SHA-1 sempre produz resumo de 160 bits.

Vamos tentar com alguns exemplos:

Code:
Input: Husires
Output: 198d93f2c0bff9767d4cdc047f2191b0921d81e410c10c0744311fadfdb516f9
Input: husires
Output: 3121cef89f206bef49882eb1aeb63a9e1d3e35075c27df817f5096dc84c2511a



Hash SHA-1, SHA-2 e SHA-256

SHA significa algoritmo de hash seguro, os números mostram as diferenças entre eles (como criar o hash resultante dos dados originais) e o comprimento do bit da assinatura.

SHA-1 é um hash de 160 bits.
O SHA-2 tem vários comprimentos, mas o mais famoso é 256 para "SHA-2", "SHA-256" ou "SHA-256 bits".

O bit contém dois valores possíveis: 0 ou 1. Ele nos fornece o número de valores possíveis que o número de bits aumenta.

É claro que pode ser resolvido, mas precisa de muita capacidade de processamento, o que significa que as novas moedas estão minerando por um longo período de tempo, não de uma só vez, para que a rede ainda demore cerca de 10 minutos.



Sua utilidade?

Existem muitas áreas, como análise de arquivos grandes, gerenciamento de dados e aplicativos de segurança da informação, mas nos limitaremos às btc e aos papéis que elas desempenham no processo de mineração e à criação de novos endereços e chaves.

Como criptomoedas dependem deles para confirmar registros e correlações de cifras entre cada bloco.
Da mesma forma, para quebra-lo, são necessárias tentativas de força bruta. Para obter a declaração correta, você pode incluir quais são as entradas por tentativa e erro de saída correspondente.





Função hash com mineração

Podemos usá-lo em muitas áreas, como verificação de saldos, divisão de transações em um bloco para formar uma árvore Merkle e muito mais.
hash começa com um número de zeros. O número de zeros determina a dificuldade de mineração e varia de acordo com a taxa de segmentação da rede (o protocolo Bitcoin facilita a manutenção do tempo médio do bloco de mineração em 10 minutos, ajustando a dificuldade de mineração).
Portanto, não há necessidade de encontrar colisões.



Fontes
Code:
https://www.youtube.com/watch?v=0WiTaBI82Mc
https://www.youtube.com/watch?v=mMxkxwPSfvo
https://en.wikipedia.org/wiki/Cryptographic_hash_function
https://www.thesslstore.com/blog/difference-sha-1-sha-2-sha-256-hash-algorithms/
https://xorbin.com/tools/sha256-hash-calculator
https://bitcoinexchangeguide.com/bitcoin-hash-functions/
https://academy.binance.com/security/what-is-hashing

Pages: « 1 ... 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 [191] 192 193 194 195 196 197 198 199 200 201 202 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!