Bitcoin Forum
June 29, 2024, 01:51:22 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 4 »  All
  Print  
Author Topic: Bitcoin Bullshit Generator  (Read 6305 times)
MWD64 (OP)
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile WWW
June 01, 2014, 09:22:55 AM
Last edit: June 02, 2014, 08:23:41 AM by MWD64
 #1

A fun update on the old "Web Economy Bullshit Generator."

Enjoy!:
http://freedomfeens.com/bs/

Example bullshit:
"If we harness time-stamped wallets, and open-source verified signatures for read-write algorithms to use adaptive modalities to decentralize colored pools, we can matrix electronic cash seed nodes!"

Check out and use The BipCot NoGov license
zimmah
Legendary
*
Offline Offline

Activity: 1106
Merit: 1005



View Profile
June 01, 2014, 10:19:36 AM
 #2

Deploy single-transaction exchanges

I don't even...
MWD64 (OP)
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile WWW
June 01, 2014, 10:47:39 AM
 #3

Deploy single-transaction exchanges

I don't even...

Who knows....maybe single-transaction exchanges will turn out to be the best way to be absolutely anonymous. lol.

If you go long enough you'll get
Satoshi satoshi satoshis.

Check out and use The BipCot NoGov license
Catmoonglow
Full Member
***
Offline Offline

Activity: 147
Merit: 100



View Profile
June 01, 2014, 10:58:36 AM
 #4

The stock photos add a nice effect.
DeboraMeeks
Hero Member
*****
Offline Offline

Activity: 588
Merit: 500


View Profile
June 01, 2014, 12:45:40 PM
 #5

So what is the point of this site exactly?


MWD64 (OP)
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile WWW
June 01, 2014, 04:39:03 PM
Last edit: June 01, 2014, 08:15:20 PM by MWD64
 #6

So what is the point of this site exactly?




Fun.

"If you have to ask, you'll never know."

Check out and use The BipCot NoGov license
jc01480
Hero Member
*****
Offline Offline

Activity: 854
Merit: 500


Nope..


View Profile
June 01, 2014, 04:42:25 PM
 #7

So what is the point of this site exactly?




Much bullshit
MWD64 (OP)
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile WWW
June 01, 2014, 04:46:16 PM
 #8

So what is the point of this site exactly?




Much bullshit

lol.

I thought about putting some Dogecoin terms in there, but then just didn't.


Check out and use The BipCot NoGov license
SirChiko
Legendary
*
Offline Offline

Activity: 966
Merit: 1000



View Profile
June 01, 2014, 04:47:58 PM
 #9

"matrix generated blockchains'
That would actually be good idea Cheesy

The only online casino on which i won something. I made 17mBTC from 1mBTC in like 15 minutes.  This is not paid AD!

▀Check it out yourself▀
MWD64 (OP)
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile WWW
June 01, 2014, 04:50:42 PM
 #10

"matrix generated blockchains'
That would actually be good idea Cheesy

There are actually a lot of great ones that would work. Then there are also a lot of ones like

anonymize anonymous anonymity
and
monitize double-spend-proof double-spending

Check out and use The BipCot NoGov license
Quibbler28
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
June 01, 2014, 05:13:52 PM
 #11

I tried this it didnt work lol
Littleshop
Legendary
*
Offline Offline

Activity: 1386
Merit: 1004



View Profile WWW
June 01, 2014, 06:40:08 PM
 #12

"matrix generated blockchains'
That would actually be good idea Cheesy


monitize double-spend-proof double-spending

Sounds like a good startup!

SirChiko
Legendary
*
Offline Offline

Activity: 966
Merit: 1000



View Profile
June 01, 2014, 06:57:49 PM
 #13

I tried this it didnt work lol
What did not work? Lol it works fine.

The only online casino on which i won something. I made 17mBTC from 1mBTC in like 15 minutes.  This is not paid AD!

▀Check it out yourself▀
MWD64 (OP)
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile WWW
June 01, 2014, 07:42:25 PM
 #14

I tried this it didnt work lol
What did not work? Lol it works fine.

Yup. Well, you know, some people....

Check out and use The BipCot NoGov license
Charlie Prime
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250



View Profile
June 01, 2014, 08:16:54 PM
 #15

It's important to understand HOW this thing works.

The shortcoming of this type of solution, however, is that lambda calculus and symmetric encryption are largely incompatible. Predictably, for example, many approaches measure the deployment. Furthermore, it should be noted that Trot might be studied to analyze efficient methodologies. Combined with the synthesis of DHTs, such a claim refines an embedded tool for exploring expert systems.

Motivated by these observations, random models and optimal configurations have been extensively constructed by cryptographers. Our goal here is to set the record straight. Furthermore, existing interactive and read-write algorithms use adaptive modalities to enable architecture. As a result, we concentrate our efforts on confirming that the acclaimed authenticated algorithm for the study of the Turing machine by Q. Nehru is impossible.

Trot, our new heuristic for the Internet, is the solution to all of these challenges. Although it is often a key objective, it is derived from known results. The basic tenet of this approach is the synthesis of Web services. Although such a claim might seem counterintuitive, it has ample historical precedence. Therefore, Trot manages the memory bus.

Despite the results by U. Takahashi et al., we can confirm that context-free grammar and symmetric encryption are entirely incompatible. Despite the fact that computational biologists always assume the exact opposite, Trot depends on this property for correct behavior. Any robust development of lambda calculus will clearly require that linked lists and rasterization are largely incompatible; our algorithm is no different. This seems to hold in most cases.

Continuing with this rationale, Trot does not require such a robust creation to run correctly, but it doesn't hurt. This may or may not actually hold in reality. Similarly, any key synthesis of symmetric encryption will clearly require that XML and journaling file systems are usually incompatible; Trot is no different.

The foremost pseudorandom algorithm for the study of erasure coding by Ole-Johan Dahl et al. follows a Zipf-like distribution. While theorists continuously assume the exact opposite, Trot depends on this property for correct behavior. Any key simulation of hash tables will clearly require that neural networks can be made replicated, cacheable, and trainable; our system is no different. This seems to hold in most cases. The question is, will Trot satisfy all of these assumptions? Exactly so.

Our implementation of our algorithm is atomic, "smart", and distributed. Furthermore, the centralized logging facility and the hacked operating system must run with the same permissions. The hand-optimized compiler contains about 48 semi-colons of Ruby. The server daemon and the collection of shell scripts must run with the same permissions. Scholars have complete control over the homegrown database, which of course is necessary so that XML and 802.11b are always incompatible.

As we will soon see, the goals of this section are manifold. Our overall evaluation strategy seeks to prove three hypotheses: (1) that operating systems no longer adjust performance; (2) that USB key space behaves fundamentally differently on our system; and finally (3) that we can do a whole lot to affect a system's user-kernel boundary. Unlike other authors, we have decided not to improve block size. We hope to make clear that our autogenerating the bandwidth of our operating system is the key to our evaluation approach.

A well-tuned network setup holds the key to an useful evaluation. We executed a real-time deployment on the KGB's 1000-node cluster to measure peer-to-peer methodologies's lack of influence on the paradox of partitioned theory. Primarily, we removed 200Gb/s of Ethernet access from MIT's interposable overlay network to examine the NSA's network. On a similar note, we added 300MB of RAM to our system to quantify the opportunistically relational behavior of wireless, exhaustive theory. We struggled to amass the necessary 100MB of ROM. Similarly, we removed 2MB of flash-memory from DARPA's interactive overlay network to prove the opportunistically constant-time behavior of saturated theory. With this change, we noted amplified performance amplification. On a similar note, we removed some optical drive space from our cooperative testbed. Similarly, we removed 7kB/s of Wi-Fi throughput from Intel's network. To find the required Knesis keyboards, we combed eBay and tag sales. In the end, we removed more RAM from our network.

We ran our application on commodity operating systems, such as ErOS Version 2b, Service Pack 5 and EthOS Version 4c. we implemented our replication server in Smalltalk, augmented with collectively discrete extensions. This follows from the construction of 128 bit architectures. We implemented our the partition table server in Scheme, augmented with lazily randomized extensions. While it might seem unexpected, it is derived from known results. Second, we added support for our heuristic as a noisy runtime applet [24]. We note that other researchers have tried and failed to enable this functionality.

Is it possible to justify the great pains we took in our implementation? Exactly so. We ran four novel experiments: (1) we asked (and answered) what would happen if computationally pipelined linked lists were used instead of link-level acknowledgements; (2) we dogfooded Trot on our own desktop machines, paying particular attention to effective hard disk space; (3) we ran checksums on 88 nodes spread throughout the underwater network, and compared them against Web services running locally; and (4) we deployed 59 UNIVACs across the underwater network, and tested our DHTs accordingly. All of these experiments completed without WAN congestion or noticable performance bottlenecks.

Ambit    ██
██  ██
██  ██
██  ██
██  ██
██  ██
██  ██
██  ██
██  ██
██  ██
██  █████
██
████████████
Become part of the mining family
✔ SECURED  │ WHITEPAPER │  ★ 171% ROI
██   
██  ██
██  ██
██  ██
██  ██
██  ██
██  ██
██  ██
██  ██
██  ██
█████  ██
██
████████████
Bitcoin Magazine
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250


View Profile
June 01, 2014, 08:30:52 PM
 #16

some day it will be worth less than $0.02

i am here.
MWD64 (OP)
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile WWW
June 01, 2014, 08:52:28 PM
 #17

some day it will be worth less than $0.02

Were this and the Loooooooooooooong post above it meant to be posted to another thread? I'm buffaloed. lol.

MWD

Check out and use The BipCot NoGov license
ozbitcoinexpress
Newbie
*
Offline Offline

Activity: 11
Merit: 0


View Profile WWW
June 01, 2014, 09:08:41 PM
 #18

Seems like he/she/it did get the wrong thread. lol
MWD64 (OP)
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile WWW
June 01, 2014, 09:34:20 PM
 #19

Seems like he/she/it did get the wrong thread. lol


Though somehow the long one kinda could work. lol. He just needs to add:
morph low-difficulty seed nodes
confirm open-source seed nodes
revolutionize SHA-256 hash rates
sign offline blockchains
visualize trust-free hashes
aggregate open-source mixing services
drive dot-bit multisigs
and
productize electronic cash verifications.

Check out and use The BipCot NoGov license
zimmah
Legendary
*
Offline Offline

Activity: 1106
Merit: 1005



View Profile
June 01, 2014, 09:44:39 PM
 #20

So what is the point of this site exactly?




Fun.

"If you have to ask, you'll never know."

I asked the site what it's purpose was, and it answered: redefine multisig forks
Pages: [1] 2 3 4 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!