x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x
:::-:::+:::-:::______ ____ _________ ____ ___ __________ _________ ____ ________ :::-:::+:::-:::
:::-:::+:::-:::| \ | | | ______| | \ | \ | ______| | ______| | | | _____| :::-:::+:::-:::
:::-:::+:::-:::| |\ \ | | | |_____ | \ | \ | |_____ | |______ | | | |_____ :::-:::+:::-:::
:::-:::+:::-:::| | \ \ | | | _____| | |\ \ | |\ \ | _____| |______ | | | |______ | :::-:::+:::-:::
:::-:::+:::-:::| | \ \| | | |______ | | \ \| | \ \ | |______ ______| | | | ______| | :::-:::+:::-:::
:::-:::+:::-:::|___| \_____| |_________| |___| \____| \__\ |_________| |_________| |___| |________| :::-:::+:::-:::
x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x=+=x
_-+-__=88*<qm!mp>*88=__-+-__-+-__=88*<qm!mp>*88=__-+-__-+-__=88*<qm!mp>*88=__-+-_
A long time ago in a galaxy far far away… ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°) ( ͡° ͜ʖ ͡°)
( ͡° ͜ʖ ͡°) It is a period of civil war. Rebel spaceships, striking from a hidden base, have won their first
victory against the evil Galactic Empire. During the battle, Rebel spies managed to steal secret plans
to the Empire's ultimate weapon, NSA Datamining, with enough power to destroy all privacy. Pursued
by the Empire's sinister agents, Nyan Cat races home aboard her Lulz Ship, custodian of the plans
that can save the people and restore freedom to the galaxy…………………………………..........……… NEMESIS
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Claim Specific Coins ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]
( ͡° ͜ʖ ͡°) A new currency is generated for each submitted claim. A portion (x) of the generated currency is
transacted to a wallet backing a general use, non claim specific currency. The portion (1-x) of the
generated claim specific currency is transacted to the wallet that submitted the claim. Wallets are
pseudonymous.
()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[[ Mining Networks ]]]]x]]]()]]]x]]]]()]]]x]]]()]]]x]]]()]]]x]]]()
( ͡° ͜ʖ ͡°) Several categories of miners are used. The invention utilizes a resource of inventors, a resource
of processing miners, and a resource of storage miners. Storage miners may be paid from (x) paid out
as inflation over time, according to the portion of the storage network each miner comprises for the
claim. Processing miners are paid with inflation of the general use currency.
<
http://www.youtube.com/watch?v=fosG7tmWTZ8>
_-+-__=88* ||qmVmp|| *88=__-+-__-+-__=88* ||qmVmp|| *88=__-+-__-+-__=88* ||qmVmp|| *88=__-+-_
"Meanwhile, the DEA teamed up with the CCA // they tryin to lock us all up // they tryin to make us new
============ slaves // thats that privately owned prison // get your piece today"===============
x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[()[[[x[[[[()]]]]x]]]()]]]x]]]]()]]]x]]]()]]]x]]]()]]]x]]]()]]]x]]]()]]]x
// Getting Familiar with the Concept //Nemesis is an encryption based proposal for a cipher space hosting corporation backed by the inherent value of useful information (inventions, software, movies, music)
- a new claim specific currency is generated for each data submission, a portion of this currency is transacted to the submitter's wallet, the rest is transacted to public wallet, where it is paid out over time to the proof of storage miners, storing the submitted information
- each data submission is timestamped to prevent forgery (information can be copied but the date cannot be reproduced)
- each submission (claim) can be linked to (cite) a number of previous submissions
- Nemesis has a user interface with two types of advertising space: the first is advertising in a common area, the second is advertising in an information specific area
- advertisers compete for advertising space with bids of the respective currency to the respective wallet with 0 hour contracts, the highest bidder wins
- claim specific currency can be transacted for general use currency at the market price (these are effectively two types of stock: A and B)
- claims (data submissions, new software) can be voted on to elect new source code
heres a few ways of thinking of the Nemesis concept:
1) a combination of bitcoin and pirate bay/megaupload
2) a polymorphic program enacted by voting parties
<
http://www.youtube.com/watch?v=A9vGMMPM5Lg>
Nemesis' Game Theory-The best strategy is to change the rules to your advantage
RulesThe object of the game is to have more value than your competitor at the end of the game
2 parties (partyA, partyB) are in direct competition
Each party has a message (MA, MB) with respective values (VA, VB)
PartyA has a number of constituents NA
PartyB has a number of constituents NB
Once a constituent has been exposed to a message there is no way of proving the removal of the message from the constituent
Competing parties are allowed to pay a competitor's constituents to disclose a message
Constituents can disclose a message to a competitor
If a message is disclosed, the chance a given constituent disclosed the message is 1/N where N is the number of constituents exposed to that message by the party
Constituents make decisions based on the options with the highest expected value governed by the equation:
Expected Value = Summation from i=0 to n of (Pr(i) * reward(i))
Strategy: the more constituents a party has, the more likely the party's message will be disclosed
Optimal Strategies / Balanced RangeA balanced range is a set of occurrences with neutral expected value.
Decision making against a balanced range is indifferent.
As a result, a balanced range is game theoretically unexploitable.
Whatever action is taken against a balanced range has neutral expectation.
An unbalanced range is exploitable.
An exploitable strategy is not optimal.
The current American economic climate is unbalanced.
The expected value of an invention that takes place within an organization is higher than that of a similar invention invented outside of an organization as a result of legislation forcing independents to play a cooperative game. (while organizations are able to play a non cooperative game through lobbying to change the rules of the game)
This means the current economic climate is exploitable by providing a non cooperative game for the people playing the game (citizens).
EV for a person who could innovate = (chance you innovate) * (monetary value of innovation) * (1 - chance your innovation is stolen)
How the Middle Class, Corporate Elite Exploit the Producing ClassThe intellectual producing class increases the wealth of humanity by removing obstacles that once existed as an inefficiency in the economy. Scientists, innovators, and content creators, produce new wealth for society by using their brains to produce new information that has value to people. Unfortunately, monetary compensation does not mirror wealth creation.
Monetary compensation for this type of wealth creation is regulated by the USPTO and the Federal Reserve. Legislation for the USPTO and the Fed are created by a coalition of voters and corporate lobbyists. These groups attempt to divert monetary compensation from producers to themselves for their own self interest. There is a symbiotic relationship between corporations and the middle class: the middle class votes along with corporate lobbyists in exchange for higher paying jobs and more jobs, which corporations can afford by rerouting monetary compensation from wealth producers to themselves. Both the middle class and corporate America are dependent on this system. They have a parasitic relationship with the producing class.
The needs of this coalition grow over time, becoming more dependent on money diverted from producers. Intellectual Property laws are on a one way path, squeezing money from individual producers while inflating monetary compensation for production inside large organizations.
...
<
http://www.youtube.com/watch?v=aTL4qIIxg8A>
I know you're out there. I can feel you now. I know that you're afraid. You're afraid of us. You're afraid of change. I don't know the future. I didn't come here to tell you how this is going to end. I came here to tell you how it's going to begin. I'm going to hang up this phone, and then I'm going to show these people what you don't want them to see. I'm going to show them a world without you. A world without rules and controls, without borders or boundaries; a world where anything is possible. Where we go from there is a choice I leave to you.
Helpful Skills• C++
• Ruby
• Python
• Java
• Algorithms
• Encryption
• Mathematics
• Game Theory
• Experience establishing anonymizing networks and software
• Asic Miners
• Storage Miners
• Creativity and Logic
Publicly verifiable proof of storageInputs X and Y are hashed together to produce a digest
Input X can be a message M or an encryption and key of message M
Input Y is the randomly generated challenge
The proof is when the hash of X and Y produce a digest with an output of zeroes I.E. 00000000000
A storer must find an input Y that satisfies a digest requirement of a string of zeroes I.E. 0000000000 by randomly generating numbers to use as input Y.
The proof of storage is a proof of work on information. The information must be stored to perform work with it. The storage of the information can be easily proved by checking that the requirement of a string of zeroes was satisfied.
TL;DR: A cryptographic ledger with stock in the ledger that trades similarly to bitcoins. Each person who submits information to the ledger is compensated with a cryptographic currency specific to the submission. These information specific currencies get value from advertising rights sold exclusively in the currency.