Bitcoin Forum
July 23, 2024, 06:08:22 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3]  All
  Print  
Author Topic: [ANN] Escudo Electrónico Português - CryptoNote - SHA256  (Read 1202 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic. (3 posts by 1+ user deleted.)
eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
August 26, 2022, 02:54:11 AM
Last edit: May 04, 2024, 08:43:41 PM by eptescudo
 #41

While explorer is under maintenance we would like to announce binance smart chain bridge is now fully working.

eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
September 06, 2022, 12:27:20 PM
Last edit: May 04, 2024, 08:43:51 PM by eptescudo
 #42

A sneak peak to FakeGucci Concept Trading exchange


https://t.me/fakegucci_pt

eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
September 10, 2022, 10:11:09 PM
Last edit: May 04, 2024, 08:44:01 PM by eptescudo
 #43


40kh/s on raspberry pi running 3 threads.

The current BTC price is 777 sat min buy and 999 as per sell order.


eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
September 23, 2022, 07:05:27 AM
 #44

Explorer is back online with a more corporate look feeling.
ruaxxx
Jr. Member
*
Offline Offline

Activity: 50
Merit: 1


View Profile
October 23, 2022, 09:02:05 PM
 #45

the coins is alive ?

the pool is down ...
eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
October 25, 2022, 10:51:03 PM
 #46

the coins is alive ?

the pool is down ...

There is no pool as far as I'm aware. ( unless private ) . I believe you meant the explorer, unfortunately the explorer is again down for maintenance but the chain is on-going, you can connect using latest seed-nodes from github as usual.
ruaxxx
Jr. Member
*
Offline Offline

Activity: 50
Merit: 1


View Profile
October 27, 2022, 02:21:58 PM
 #47


yes, I meant the explorer....   my mistake

thanks
eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
October 27, 2022, 11:03:20 PM
Last edit: October 27, 2022, 11:17:55 PM by eptescudo
 #48

https://www.youtube.com/watch?v=4OQ0HORsOKo

eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
October 29, 2022, 03:25:38 PM
Last edit: October 29, 2022, 05:46:02 PM by eptescudo
 #49

Portuguese language, unmatched cryptography

The Portuguese language has a long and rich history, and it is no surprise that it is also the perfect language for cryptography. For centuries, the Portuguese have used their language to protect their secrets, and now they are using it to protect their Bitcoin holdings.
The Portuguese have always been at the forefront of cryptography, and they have used their language to develop some of the most secure encryption methods. This is why the Portugese Bitcoin community has developed its own version of the Bitcoin blockchain that is completely untraceable.
This new Portugese Bitcoin blockchain uses a unique form of cryptography that makes it impossible to trace transactions. This means that your identity will be secure when you use Portugese Bitcoin. You can rest assured knowing that your funds are safe from theft or fraud.

https://www.youtube.com/watch?v=NRlckQcLqn4
eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
October 29, 2022, 04:45:54 PM
 #50

ePT Growth Plan

1. Increase visibility of ePT in the Portuguese market.

2. Educate users about the benefits of using ePT.

3. Improve customer service and user experience.

4. Increase the number of merchants who accept ePT.

5. Promote ePT as a secure and private means of payment.
eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
October 29, 2022, 06:59:21 PM
 #51

Privacy in Cryptography: What You Need to Know


Keeping your private data private is hard. Nearly everyone now has a social media account, and many people have been hacked as a result. Your personal information could be anywhere online, and cybercriminals are always looking for new ways to steal it. We also live in an age of unrest regarding internet privacy. New regulations such as the GDPR have changed how companies and individuals handle user data, while the recent Cambridge Analytica scandal has sparked a renewed interest in taking back control of our information. To this end, cryptography—the art of creating codes—has emerged as a core tool in safeguarding communications against spying third parties and other attacks. Even if you’ve never heard of it before, you’re probably already using cryptography every day: It’s one of the fundamental concepts behind encryption algorithms used for secure communication over the internet (such as HTTPS).



What is cryptography?

Cryptography is the art of creating codes. The most common use of the word is to refer to codes that are used to protect information by preventing unauthorized people from accessing it. There are two main ways to use cryptography to protect information: - Encryption: This is when you use codes to scramble information so that only people who know the secret code can unscramble it and read it. - Hashing: This is when you use codes to create a fingerprint (“hash”) of a piece of information. A hash is like a fingerprint of a piece of information: It can’t be unscrambled and read like the original information.


How is cryptography used to protect privacy?

The main way that cryptography protects privacy is by scrambling the content of messages and communications so that only the intended recipient can unscramble and read them. All computer systems produce what are known as “metadata,” which is a record of who was communicating with whom, when, and what they sent. This metadata can be used to reveal useful information about a person’s behaviour and activities, including communications with journalists, doctors, lawyers, and other people who are supposed to remain confidential. Cryptography can be used to prevent this metadata from being collected and revealing sensitive information.


Why is privacy so important in cryptography?

The same properties that make cryptography useful are also what make it difficult to trust. After all, if anyone can see the code, anyone could break it. Cryptographers have developed a series of guidelines for designing and analyzing cryptographic algorithms to make sure they are secure. These guidelines are known as “best practices” in cryptography. The problem is that these practices are not universal, and different countries, companies, and people have different standards. What would be a best practice in the United States may not be in Russia, and even standards that are accepted in one country may not be accepted elsewhere.


What are some key terms when it comes to cryptography?

These terms are important to understand when it comes to cryptography. - Plaintext: This is the original information that is being encrypted. - Ciphertext: This is the scrambled information that results from the process of encrypting plaintext. - Key: This is a piece of information that people use to unscramble ciphertext. - Cryptanalysis: This is the study of techniques for breaking codes or finding flaws in cryptographic algorithms. - Cryptography: This is the process of scrambling plaintext into ciphertext using a secret code. - Cryptographic algorithm: This is a step-by-step procedure for scrambling and unscrambling data. - Key management: This is the process of managing encryption keys and ensuring that they are secure. - Privacy: This is the condition of being alone and not being observed or overheard. - Confidentiality: This is the property of information being kept secret and not disclosed to any unauthorized persons.


Which 3 tools should you use to encrypt your data?

- Password Managers: Password managers are an essential tool for encrypting sensitive information like login credentials, credit card numbers, and logins. Password managers store these sensitive bits of information in an encrypted database that only you have the key to unlock. - Email Encryption: There are a number of services that let you send encrypted emails and that let you send and receive encrypted emails. - File Encryption: There are a number of tools that let you encrypt files so that only you can open them. Be sure to use a service that has a solid track record when it comes to security and privacy.


Wrapping up: Don’t be afraid of the dark!

One of the most important skills we can develop is learning to be comfortable in the dark. This means understanding the potential threats and knowing how to protect yourself. When it comes to privacy, cryptography is an essential tool for protecting your data. You can use password managers to encrypt sensitive information, email encryption to protect communications, and file encryption to protect sensitive files.
eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
January 19, 2023, 01:52:08 AM
Last edit: May 04, 2024, 08:44:12 PM by eptescudo
 #52


Introducing "The Rat", EPT new mascot.

The rat as a mascot for EPT is a symbol of the nimbleness and adaptability of the technology. The rat is a creature that is known for being able to survive in a variety of environments and it's able to adapt to changing circumstances. Similarly, EPT is built to be able to adapt and evolve as the crypto market and technology develops.

The mascot also represents the EPT’s potential to be a powerful force in the world of crypto, much like how a small rat can be a formidable opponent. With its focus on privacy and security, EPT has the potential to become a major player in the crypto market.

Overall, "The Rat" mascot for EPT cryptocurrency represents the cryptocurrency's adaptability, power and its focus on privacy and security. The mascot represents the EPT's potential to be a powerful force in the world of crypto and it's potential to become a major player in the crypto market.

"Cosmopolis" is a 2012 film directed by David Cronenberg and starring Robert Pattinson. The film is based on the novel of the same name by Don DeLillo, and it follows the story of a 28-year-old billionaire asset manager named Eric Packer, who is trying to navigate the chaotic streets of Manhattan during a tumultuous day in his life.

In the film, Packer's character experiences a rat infestation in his limousine, this rat plays an important role as it is symbolic of Packer's own personal and professional decay. The rat, along with other symbols and motifs, is used to represent the themes of decay, corruption and the collapse of society in the movie.

The rat also serves as a metaphor for the film's themes of decay and corruption, as it is a creature that is often associated with filth and disease. The rat's presence in Packer's limousine serves as a reminder of the increasing chaos and turmoil that surrounds him, both within the car and in the larger world outside. This rat is a reflection of Packer's own moral decay as he engages in increasingly desperate and self-destructive behavior.

Overall, the rat in "Cosmopolis" movie serves as a symbolic representation of the themes of decay, corruption and the collapse of society, as well as a metaphor for the main character's moral decay.

https://www.youtube.com/watch?v=PvYyKTZtUG0


AI wrote us a code snippet on how to change the block reward based on Portugal temperatures.

Quote
#include <iostream>
#include <curl/curl.h>
#include <jsoncpp/json/json.h>

//Retrieve weather data from OpenWeatherMap API
std::string getWeatherData() {
    CURL *curl;
    CURLcode res;
    std::string readBuffer;
    curl = curl_easy_init();
    if(curl) {
        curl_easy_setopt(curl, CURLOPT_URL, "http://api.openweathermap.org/data/2.5/weather?q=Portugal&appid=YOUR_APP_ID&units=metric");
        curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, WriteCallback);
        curl_easy_setopt(curl, CURLOPT_WRITEDATA, &readBuffer);
        res = curl_easy_perform(curl);
        curl_easy_cleanup(curl);
    }
    return readBuffer;
}

//Extract maximum temperature from the weather data
double getMaxTemperature(std::string weatherData) {
    Json::Value root;
    Json::Reader reader;
    bool parsingSuccessful = reader.parse(weatherData, root);
    if (!parsingSuccessful) {
        //Error in parsing json
        return -1;
    }
    Json::Value temp = root.get("main", "temp_max", "N/A");
    return temp.asDouble();
}

//Calculate the block reward based on the maximum temperature
int calculateBlockReward(double maxTemperature) {
    int reward = 50; //base reward
    if (maxTemperature > 30) {
        reward += 20;
    } else if (maxTemperature < 10) {
        reward -= 10;
    }
    return reward;
}

int main() {
    std::string weatherData = getWeatherData();
    double maxTemperature = getMaxTemperature(weatherData);
    int reward = calculateBlockReward(maxTemperature);
    std::cout << "Block reward: " << reward << std::endl;
    return 0;
}

Reason why we invoked AI for the matter: https://github.com/mj-xmr/SolOptXMR
eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
January 19, 2023, 02:55:35 AM
 #53

I've just acknowledged languages are a "form of encryption"...

Language can be used as a form of encryption in various ways. One way is through the use of code words or phrases, where certain words or phrases are used to represent specific information. This method is similar to a simple substitution cipher, where each letter or group of letters in the original message is replaced with another letter or group of letters.

Another way is through the use of natural language processing (NLP) techniques, where a message is disguised as normal text and encoded using complex grammar and syntax. This makes it difficult for an unauthorized person to understand the message without a key or the necessary linguistic knowledge.

A more advanced method is steganography, which is the practice of hiding a message within another message or image. For example, a message could be hidden within an image or a document by manipulating the least significant bit of the pixels, or by using frequency domain transformations.

It's important to note that these forms of encryption using language are not as secure as traditional encryption methods, such as symmetric and asymmetric encryption, which use mathematical algorithms to secure the data. Language-based encryption is often used in combination with other forms of encryption to add an extra layer of security or to conceal the fact that a message is being encrypted at all.

In summary, language can be used as a form of encryption in various ways, such as code words or phrases, natural language processing techniques and steganography. These forms of encryption are not as secure as traditional encryption methods, but they can be used to add an extra layer of security or conceal the fact that a message is being encrypted.

rather than "just a way to express yourself".
eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
January 19, 2023, 03:28:48 AM
Last edit: May 04, 2024, 08:44:21 PM by eptescudo
 #54

A .wallet file is a file that contains information about your cryptocurrency wallet, such as the private keys and other sensitive information. Saving this file on a floppy disk can be a good way to keep it safe and secure, as long as the floppy disk is not lost or damaged.

Here are the steps to save a .wallet file on a floppy disk:

1. Insert a blank floppy disk into the floppy disk drive of your computer.

2. Locate the .wallet file on your computer. This file can typically be found in the directory where your cryptocurrency wallet software is installed.

3. Right-click on the .wallet file and select "Copy" or "Cut" (depending on whether you want to keep a copy of the file on your computer).

4. Open the floppy disk drive by double-clicking on the "My Computer" icon on your desktop or by selecting "Computer" from the Start menu.

5. Locate the floppy disk drive and double-click on it to open it.

6. Right-click inside the floppy disk drive window and select "Paste" to copy the .wallet file onto the floppy disk.

7. Once the file is copied, you can safely remove the floppy disk from the drive by following the prompts provided by your operating system.

It's important to note that floppy disks have a limited lifespan and may become damaged over time. So, it's recommended to make copies of the .wallet file and store them in different locations, such as a USB drive or an external hard drive. Additionally, it's also important to keep your computer and floppy disk drive clean and free of dust, to prevent any potential damage to the disk or data.

In summary, to save a .wallet file on a floppy disk, insert a blank floppy disk into the floppy disk drive, locate the .wallet file on your computer, copy or cut the file, open the floppy disk drive, paste the file and safely remove the floppy disk from the drive.

neguinho1
Newbie
*
Offline Offline

Activity: 155
Merit: 0


View Profile WWW
January 21, 2023, 03:01:54 PM
 #55

is the coin still alive? which wallet
ruaxxx
Jr. Member
*
Offline Offline

Activity: 50
Merit: 1


View Profile
August 22, 2023, 10:10:18 PM
 #56

it's aline

new nodes :
"166.88.132.44:6777",
"166.88.132.24:6777",

eptescudo (OP)
Jr. Member
*
Offline Offline

Activity: 57
Merit: 3


View Profile
May 04, 2024, 08:42:21 PM
 #57

We've upgrade our domains:

Website under construction: https://escudopt.pro

Explorer: http://chain.escudopt.pro

Pages: « 1 2 [3]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!