Quantum Computing and Bitcoin's Security

Time to book your ticket for a first crack at brute force attacking Satoshi's early blocks - IBM gives public access to first quantum computer as cloud service. /r/Bitcoin

Time to book your ticket for a first crack at brute force attacking Satoshi's early blocks - IBM gives public access to first quantum computer as cloud service. /Bitcoin submitted by BitcoinAllBot to BitcoinAll [link] [comments]

This is a public service announcement to anyone who's foolish enough to still be using windows

This is a public service announcement to anyone who's foolish enough to still be using windows 10, windows 8, windows 7, vista, and also windows xp. your operating system is now fully compromised, and no, this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bobs and vagene or the cia backdooring your operating system so that they can spy on you it is far worse then that the international hacker known as 4chan has successfuly reverse engineered your operating system they know the sorce code, they've observed all of windows xp's vulnerabilities which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates, and things are about to get even worse, you thought viruses like wannacry caused a lot of damage? that's childsplay. the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now microsoft's spaghetti code is out in the open everybody can see it and your computer is more screwed then an unchaperoned toddler on epstein's island dring a bill clinton visit your kernel is going down faster then a golden retriever at the atf's headquarters. now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer, my personal recommendation is to load up dban, completely remove any trace of windows, or any other proprietary bullshit operating system that came with your computer, and then install gentoo and use that for the rest of eternity to do your computing. if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu/linux operating system that is more noob friendly and kind of similar to windows in the layout just minus all the horrible bullcrap and spaghetti code that makes up windows. if you can't figure out how to use linux mint then you should just sell your computer, purchase a horse and buggy, and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter. hopefully the many years of you beating off to cam girls will translate into good butter churning skills so you can earn a living as an amish person. if you fail to comply you are going to get updates forcefully pushed to your operating system which has been happening for a while now because let's face it, microsoft has never even heard of the word consent, but instead of these updates coming from microsoft themself, bill gates himself, they are going to be coming from the hacker known as 4chan and you will soon experience strange behavior in your operating system, internet explorer or microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser. every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on all of your home videos will be replaced by forceful tentacle hentai, all of your family photos are going to be replaced with pepes that become more and more racist as time goes on, oh and also your webcam will permanently live stream to liveleak so watch out for chinese truck drivers and off-duty brazzilian police officers. now i don't want to hear any of you wondering all of a sudden oh woe is me why does something like this have to happen to me no you've been warned for years and years about the dangers of proprietary software and yet you did nothing, richard stallman went out of his way to make speeches at college campuses all across the world even doing some in spanish so that he can reach a wider audience and going days without a proper meal this man had to subsist on nutrients from the bottom of his foot and yet you did nothing, edward snowden revealed that bioluminescent goverment agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and had to flee the united states and go live in a russian airport bathroom and yet you continued using windows purchasing a new copy every few years making bill gates a gorillianare in the process so that he could get ot his end goal of injecting windows updates directly into the bloodstream of every person in the world and newborn babies and yet you kept on using windows even though each new version removed more and more of your rights and became more and more bloated but now 4chan, the hacker, has taken it to the extreme. you will no longer be using your operating system it will se you, it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot your operating system. now alternatively i have heard directly from the hacker known as 4chan that for one bitcoin you can purchase a subscription of windows xp yotsuba edition which will have most of the restrictions removed however your wallpaper will still be set to a lewd vaguely underage anime girl and your browser will be permanently set to 4channel.org, uh, also microsoft word is going to be replaced with vim so good luck doing your homework on there hopefully you know how to quit out of it. you have been warned now go install gentoo or suffer the consequences or like i said sell all your electronics and go be amish because the amish don't get computer viruses
submitted by bobbyboob6 to copypasta [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

This is a public service announcement to anyone who is foolish enough to still be using Windows 10, Windows 8, Windows 7, Vista, and also Windows XP. Your operating system is now fully compromised and no, this isn't the same as Indian scammers trying to hold your data hostage for Google play cards or pictures of bobs and vagene or the CIA backdooring your operating system so that they can spy on you, it is far worse than that. The international hacker known as 4chan has successfully reverse engineered your operating system. They know the source code, they've observed all of windows XP's vulnerabilities which means they know the vulnerabilities of all Windows operating systems that have come after it because let's face it, ever since Windows XP all Microsoft has really done is create some new themes for your desktop and add more spyware to Windows, and also forcefully pushed out updates, and things are about to get even worse. You thought viruses like wannacry caused a lot of damage? That's child's play. The viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system, but now Microsoft spaghetti code is out in the open, everybody can see it, and your computer is more screwed than an un-chaperoned toddler on Epstein's island during a Bill Clinton visit. Your kernel is going down faster than a golden retriever at the ATF headquarters. Now before you go into full panic mode and start freaking out, there are some solutions for you to continue using your computer. My personal recommendation is to load up DBAN to completely remove any trace of Windows or any other proprietary bullshit operating system that came with your computer, and then install Gentoo and use that for the rest of eternity to do your computing. If you can't figure out how to use Gentoo then you have the option of using Linux Mint, which is another approved GNU/Linux operating system that is more noob friendly and kind of similar to Windows in the layout just minus all of the horrible bull crap and spaghetti code that makes up Windows. If you can't figure out how to install Linux Mint then you should just sell your computer purchase a horse and buggy and go be Amish in a field somewhere, because it's no longer safe for you to have a computer or really any electronic device for that matter. Hopefully the many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as an honest person. If you fail to comply you are going to get updates forcefully pushed into your operating system which has been happening for a while now because let's face it, Microsoft has never even heard of the word consent. But instead of these updates coming from Microsoft themself, Bill Gates himself they're going to be coming from the hacker known as 4chan, and you'll soon experience strange behavior in your operating system internet explorer or Microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser. Every day the wallpaper on your desktop is going to become an anime girl that gets more lewd and vaguely under age as time goes on, all of your home videos will be replaced by forceful tentacle hentai, all of your family photos are going to be replaced with Pepes that become more and more racist as time goes on. Oh, and also your webcam will permanently live stream to liveleak so watch out for Chinese truck drivers an off duty Brazilian police officers. Now I don't want to hear any of you wondering why is this happening all of a sudden "woe is me why does something like this have to happen to me?" No you've been warned for years and years about the dangers of proprietary software and yet you did nothing. Richard Stallman went out of his way to make speeches at college campuses all across the world, even doing some in Spanish so that he can reach a wider audience, going days without a proper meal. This man had to subsist on nutrients from the bottom of his foot, and yet you still did nothing. Edward Snowden revealed that bioluminescent government agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of Reddit, all under the guise of stopping terrorism, and he had to flee the United States and go live in a Russian airport bathroom, and yet you continued on using Windows, purchasing a new copy every few years making Bill Gates a gorillionaire in the process, so that he could get to his end goal of injecting Windows updates directly into the bloodstream of every person in the world in newborn babies, and yet you kept on using Windows even though each new version removed more and more of your rights and became more and more bloated. But now 4chan the hacker has taken it to the extreme. You will no longer be using your operating system, it will use you. It will require a minimum of 2 terabytes of ram and a quantum CPU just to load up the crypto miner that's going to be required to boot your operating system. Now alternatively, I have heard directly from the hacker known as 4chan on that for one bitcoin you can purchase a subscription of Windows XP Yotsuba Edition, which will have most of the restrictions removed. However your wallpaper will still be set to a lewd vaguely under age anime girl and your browser's homepage will be permanently set to 4channel.org. Also Microsoft Word is going to be replaced with Vim, so good luck doing your homework on there, hopefully you know how to quit out of it. You have been warned. Now go install Gentoo or suffer the consequences. Or like I said, sell all of your electronics and go be Amish, because the Amish don't get computer viruses.
submitted by dogecharger3000xd to copypasta [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

This is a public service announcement to anyone who is foolish enough to still be using Windows 10, Windows 8, Windows 7, Vista, and also Windows XP. Your operating system is now fully compromised. And no, this isn’t the same as Indian scammers trying to hold your data hostage for Google Play cards or pictures of bob and vagene, or the CIA backdooring your operating system so they can spy on you. It is far worse than that. The international hacker known as 4chan has successfully reverse-engineered your operating system. They know the source code. They have observed all of Windows XP’s vulnerabilities, which means they know the vulnerabilities of all Windows operating systems that have come after it because, let’s face it, ever since Windows XP, all Microsoft has really done is create some new themes for your desktop and add more spyware to Windows, and also forcefully push out updates. And things are about to get even worse. You though viruses like WannaCry caused a lot of damage? That’s child’s play. The viruses of old were created by much less skilled hackers that didn’t even have the source code of your operating system. But now, Microsoft’s spaghetti code is out in the open. Everybody can see it, and your computer is more screwed than an unchaperoned toddler on Epstein's island during a Bill Clinton visit. Your kernel is going down faster than a golden retriever at the ATF’s headquarters.
Now, before you go into full panic mode and start freaking out, there are some solutions for you to continue using your computer. My personal recommendation is to load up DBAN, completely remove any trace of Windows or any other proprietary bullshit operating system that came with your computer, and then install Gentoo. And use that for the rest of eternity to do your computing. If you can’t figure out how to use Gentoo, then you have the option of using Linux Mint, which is another approved GNU/Linux operating system that is more noob-friendly and kind of similar to Windows and its layout, just minus all the horrible bullcrap and spaghetti code that makes up Windows. If you can’t figure out how to install Linux Mint, then you should just sell your computer, purchase a horse and buggy, and go be Amish in a field somewhere because it’s no longer safe for you to have a computer or really any electronic device for that matter. Hopefully, the many years of you beating off to camgirls will translate into good butter-churning skills so that you can earn a living as an Amish person.
If you fail to comply, you are going to get updates forcefully pushed to your operating system, which has been happening for a while now, because let’s face it, Microsoft has never even heard of the word “consent.” But instead of these updates coming from Microsoft themselves—Bill Gates himself—they are going to be coming from the hacker known as 4chan, and you will soon experience strange behavior in your operating system. Internet Explorer or Microsoft Edge, or whatever the hell they’re calling that crap these days, will be replaced with Pale Moon or a similar furry browser. Every day, the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on. All of your home videos will be replaced by forceful tentacle hentai. All of your family photos are going to be replaced with Pepes that become more and more racist as time goes on. Oh, and also your webcam will permanently livestream to LiveLeak, so watch out for Chinese truck drivers and off-duty Brazilian police officers. Now, I don’t want to hear any of you wondering “Why is this happening all the sudden?”, “Oh, woe is me, why does something like this have to happen to me?” No. You’ve been warned for years and years about the dangers of proprietary software, and yet, you did nothing. Richard Stallman went out of his way to make speeches at college campuses all across the world, even doing some in Spanish so that he can reach a wider audience, and going days without a proper meal. This man had to subsist on nutrients from the bottom of his foot, and yet, you still did nothing. Edward Snowden revealed that bioluminescing government agents were living in your computer, watching you watch camgirls and browse old memes that washed up on the shores of Reddit, all under the guise of stopping terrorism. And he had to flee the United States and go live in a Russian airport bathroom, and yet, you continued on using Windows, purchasing a new copy every few years, making Bill Gates a gorrilianaire in the process, so that he can get to his end goal of injecting Windows updates directly into the bloodstream of every person in the world and newborn babies. And yet, you kept on using Windows, even though each new version removed even more of your rights and became more and more bloated.
But now, 4chan the hacker has taken it to the extreme. You will no longer be using your operating system. It will use you. It will require a minimum of 2 TB of RAM and a quantum CPU just to load up the cryptominer that’s going to be required to boot your operating system. Now alternatively, I have heard directly from the hacker known as 4chan that for 1 bitcoin, you can purchase a subscription of Windows XP Yotsuba Edition, which will have most of the restrictions removed. However, your wallpaper will still be set to a lewd, vaguely underage anime girl, and your browser’s homepage will be permanently set to 4chan.org. Also, Microsoft Word is going to be replaced with vim, so good luck doing your homework on there. Hopefully you know how to quit out of it. You have been warned. Now go install Gentoo or suffer the consequences. Or like I said, sell all of your electronics and go be Amish, because the Amish don’t get computer viruses.
https://www.youtube.com/watch?v=iqRj7cW-vjs
submitted by SMF67 to LinuxCirclejerk [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

This is a public service announcement to anyone who is foolish enough to still be using windows 10, windows 8, windows 7, vista and also windows xp.
Your operating system is now fully compromised and no this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bobs and vageen, the cia backdooring your operating system so that they can spy on you, it is far worse than that.
The international hacker known as 4chan has successfully reverse engineered your operating system.
👏They 👏know👏the 👏source👏code!
They've observed all of windows xp vulnerabilities, which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates and things are about to get even worse, you thought viruses like wannacry caused a lot of damage that's child play, the viruses of old were created by much less skilled hackers that didn't even had the source of your operating system but now microsoft spaghetti code is out in the open every body can see it and your computer is screwed than a unchaperoned toddler on epstein's island during a bill clinton visit your kernel is going down faster than a golden retriever at the etfs headquarters
now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer, my personal recommendation is for you to load up dban, completely remove any trace of windows or any other proprietary bullshit operating system that came with your computer and then install gentoo and use that for rest of eternity to do your computing, if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu/linux operating system that is more noob friendly and kind of similar to windows and the layout just minus all of the horrible bullcrap and spaghetti code that makes all of windows.
if you can't figure out how to install linux mint then you should just sell your computer purchase a horse and buggy and go be amish in a field somewhere because it is no longer safe for you to have a computer or really any electronic device for that matter,
hopefully that many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as a amish person if you fail to comply you are going get updates forcefully pushed to your operating system which has been happening for awhile now because let's face it microsoft has never even heard of the word consent but instead of these updates coming from microsoft themself,bill gates himself, they are going to be coming from the hacker known as 4chan you will soon experience strange behaviour from your operating system internet explorer or microsoft edge or whatever the hell they are calling that crap these days will be replaced with pale moon or a similar furry browser every day the wallpaper on your desktop is going to become a anime girl that is more and more lewd and vaguely underage as time goes on, all of your home videos will be replaced by forceful tentacle hentai, all of your family photos will be replaced with pepes that become more and more racist as time goes on
oh and also your webcam will permanently livestream to live leak so watch out for chinese truck drivers and off duty brazilian police officers
now I don't want to hear any of you wondering
“why is this happening all of a sudden
oh always me why do something like this have to happens to me”
no you have been warned for years and years about the dangers of proprietary software and yet you did nothing, richard stallman went out of his way yo make speeches in college campuses all across the world even doing some in spanish so that he could reach a more wider audience and going days without a proper meal this man had to subsiste on nutrients from the bottom of his foot and yet you still did nothing
edward snowden revealed that bioluminescent government agents were living in your computer watching you watch camgirls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and he had ot flee the united states and live in a russian airport brathroom and yet you continued on using windows purchasing a new copy every few years making bill gate a grilionaire in the process so that he could get to his end goal of injecting windows updates directly into the blood stream of every person in the world and newborn babies and yet you kept on using windows even tough each new version removed more and more of your rights and became more and more bloated
but now 4chan the hacker has taking it to the extreme you will no longer be using your operating system it will use you it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot up your operating system
now alternatively i have heard directly from the hacker known as 4chan that for 1 bitcoin you can purchase a subscription of windows xp yotsuba edition that will have most of the restrictions removed however you wallpaper will still be set to a lewd vaguely underage anime girl and your browser homepage will be permanently set to 4chan.org also microsoft word is going to be replace with vim so good luck doing your homework on there hopefully you know how to quit out of it
you have been warned now go and install gentoo or suffer the consequences or like I said sell all of your electronics and go be amish because the amish don't get computer viruses!!
Sources: https://imgur.com/a/nqiyQ
https://youtu.be/iqRj7cW-vjs
submitted by thesuperiordalek to copypasta [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

This is a public service announcement to anyone who is foolish enough to still be using Windows 10, Windows 8, Windows 7, Vista, and also Windows XP.
Your operating system is now fully compromised. and no, this isn't the same as Indian scammers trying to hold your data hostage for Google play cards or pictures of bobs and vagens or the CIA backdooring your operating system so they can spy on you, it is far worse than that.
The international hacker known as 4Chan has successfully reverse-engineered your operating system, THEY KNOW THE SOURCE CODE, they observed all of Windows XP vulnerabilities which means they know the vulnerabilities of all Windows operating systems that have come after it, because, let's face it, ever since Windows XP all Microsoft has really done is create some new themes for your desktop and add more spyware to Windows and also push out updates. and things are about to get EVEN WORSE, you thought viruses like WannaCry cause a lot of damage? that's child's play, the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now, Microsoft spaghetti code, it's out in the open, everybody can see it and your computer is more screwd than an unchaperoned toddler on Epstein's island during a Bill Clinton visit.
YOUR KERNEL is going down faster than a golden retriever at the ATF's headquarters.
Now, before you go in full panic mode and start freaking out, there are some solutions for you to continue using your computer.
My personal recommendation is to load up DBAN, completely remove any trace of Windows or any other proprietary bullshit operating system that came with your computer and then, install Gentoo, and use that for the rest of eternity to do your computing, if you can't figure out how to use Gentoo, then you have the option of using Linux Mint, which is another approved GNU/Linux operating system that is more noob friendly and kind of similar to Windows and the layout just minus all of the horrible bullcrap and spaghetti code that makes up Windows.
If you can't figure out how to install Linux Mint then you should just sell your computer, purchase a horse and buggy and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter, hopefully, the many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as an Amish person.
If you fail to comply, you are going to get updates forcefully pushed to your operating system which has been happening for a while now, because, let's face it, Microsoft has never even heard of the word consent, but instead of these updates coming from Microsoft themself, Bill Gates himself, they are going to be coming from the hacker known as 4chan, and you will soon experience strange behavior in your operating system.
Internet Explorer or Microsoft Edge or whatever the hell they're calling that crap these days will be replaced with Pale Moon or a similar furry browser.
Every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on, all of your home videos will be replaced with forceful tentacle hentai, all of your family photos are going to be replaced with pepes that become more and more racist as time goes on.
Oh and also, your webcam will permanently live stream to live league so watch out for Chinese truck drivers and off-duty Brazilian police officers.
Now, I don't want to hear any of your wondering "why is this happening all of the sudden oh woe ways me, why does something like this have to happen to me", no, you've been warned for years and years about the dangers of proprietary software, and yet, you did nothing.
Richard Stallman went out of his way to make speeches at college campuses, all across the world, even doing some in Spanish, so he can reach a wider audience, and going days without a proper meal, this man had to subsist on nutrients from the bottom of his foot and yet, you still did nothing.
Edward Snowden revealed that bioluminescent government agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of Reddit, ALL under the guise of stopping terrorism, and he had to flee the united states and go live in a Russian airport bathroom, and yet, you continued on using Windows.
Purchasing a new copy every few years making Bill Gates a grillionaire in the process so he could get to his end goal of injecting Windows updates directly into the bloodstream of every person in the world, in newborn babies, and yet, you kept on using Windows, even though each new version removed more and more of your rights and became more and more bloated, but now, 4chan the hacker has taken it to the extreme, you will no longer be using your operating system.
It will use you, it will require a minimum of 2 terabytes of ram and a quantum CPU just to load up the crypto miner that's going to be required to boot your operating system.
Now alternatively, I have heard directly from the hacker known as 4chan that for one bitcoin, you can purchase a subscription of Windows XP Yotsuba edition which will have most of the restrictions removed, however, your wallpaper will still be set to a lewd vaguely underage anime girl and your browser's homepage will be permanently set to 4channel.org, also Microsoft Word is going to be replaced with Vim, so, good luck doing your homework on there, hopefully, you know how to quit out of it, you have been warned, now go, install Gentoo or suffer the consequences or like I said, sell all of your electronics and go be Amish because the Amish don't get computer viruses.
submitted by E404NNF to copypasta [link] [comments]

Technical: Taproot: Why Activate?

This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given public key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

submitted by almkglor to Bitcoin [link] [comments]

Will Quantum Computers BREAK Bitcoin Someday? (Explainer For Beginners)

Will Quantum Computers BREAK Bitcoin Someday? (Explainer For Beginners) submitted by stellarowl12 to Bitcoin [link] [comments]

ATTENTION WINDOWS USERS, ITS TIME TO STOP!!

this is a public service announcement to anyone who is foolish enough to still be using windows 10 windows 8 windows 7 vista and also windows xp your operating system is now fully compromised and no this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bob's and vagine or the cia backdooring your operating system so that they can spy on you it is far worse than that the international hacker known as 4chan has successfully reverse engineered your operating system they know the source code they've observed all of windows xp's vulnerabilities which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates and things are about to get even worse you thought viruses like wannacry caused a lot of damage that's child's play the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now microsoft's spaghetti code it's out in the open everybody can see it and your computer is more screwed than an unchaperoned toddler on epstein's island during a bill clinton visit your colonel is going down faster than a golden retriever at the atf's headquarters now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer my personal recommendation is to load up d-band completely remove any trace of windows or any other proprietary operating system that came with your computer and then installed gentoo and use that for the rest of eternity to do your computing if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu slash linux operating system that is more noob friendly and kind of similar to windows in the layout just minus all of the horrible bullcrap and spaghetti code that makes up windows if you can't figure out how to install linux mint then you should just sell your computer purchase a horse and buggy and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter hopefully the many years of you beating off to cam girls will translate into good butter churning skills so that you can earn a living as an amish person if you fail to comply you are going to get updates forcefully pushed to your operating system which has been happening for a while now because let's face it microsoft has never even heard of the word consent but instead of these updates coming from microsoft themself bill gates himself they are going to be coming from the hacker known as 4chan and you will soon experience strange behavior in your operating system internet explorer or microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on all of your home videos will be replaced by forceful tentacle hentai all of your family photos are going to be replaced with pepes that become more and more racist as time goes on oh and also your webcam will permanently live stream to live league so watch out for chinese truck drivers and off-duty brazilian police officers now i don't want to hear any of you wondering why is this happening all of a sudden oh woe ways me why does something like this have to happen to me no you've been warned for years and years about the dangers of proprietary software and yet you did nothing richard stallman went out of his way to make speeches at college campuses all across the world even doing some in spanish so that he can reach a wider audience in going days without a proper meal this man had to subsist on nutrients from the bottom of his foot and yet you still did nothing edward snowden revealed that bioluminescent government agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and he had to flee the united states and go live in a russian airport bathroom and yet you continued on using windows purchasing a new copy every few years making bill gates a grillionaire in the process so that he could get to his end goal of injecting windows updates directly into the bloodstream of every person in the world in newborn babies and yet you kept on using windows even though each new version removed more and more of your rights and became more and more bloated but now 4chan the hacker has taken it to the extreme you will no longer be using your operating system it will use you it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot your operating system now alternatively i have heard directly from the hacker known as 4chan that for one bitcoin you can purchase a subscription of windows xp yotsuba edition which will have most of the restrictions removed however your wallpaper will still be set to a lewd vaguely underage anime girl and your browser's homepage will be permanently set to 4channel.org uh also microsoft word is going to repl be replaced with vem so good luck doing your homework on there hopefully you know how to quit out of it you have been warned now go install gen 2 or suffer the consequences or like i said sell all of your electronics and go be amish because the amish don't get computer viruses
submitted by mirak97 to copypasta [link] [comments]

This is a public service announcement to anyone who's foolish enough to still be using windows

This is a public service announcement to anyone who's foolish enough to still be using windows 10, windows 8, windows 7, vista, and also windows xp. your operating system is now fully compromised, and no, this isn't the same as indian scammers trying to hold your data hostage for google play cards or pictures of bobs and vagene or the cia backdooring your operating system so that they can spy on you it is far worse then that the international hacker known as 4chan has successfuly reverse engineered your operating system they know the sorce code, they've observed all of windows xp's vulnerabilities which means they know the vulnerabilities of all windows operating systems that have come after it because let's face it ever since windows xp all microsoft has really done is create some new themes for your desktop and add more spyware to windows and also forcefully push out updates, and things are about to get even worse, you thought viruses like wannacry caused a lot of damage? that's childsplay. the viruses of old were created by much less skilled hackers that didn't even have the source code of your operating system but now microsoft's spaghetti code is out in the open everybody can see it and your computer is more screwed then an unchaperoned toddler on epstein's island dring a bill clinton visit your kernel is going down faster then a golden retriever at the atf's headquarters. now before you go into full panic mode and start freaking out there are some solutions for you to continue using your computer, my personal recommendation is to load up dban, completely remove any trace of windows, or any other proprietary bullshit operating system that came with your computer, and then install gentoo and use that for the rest of eternity to do your computing. if you can't figure out how to use gentoo then you have the option of using linux mint which is another approved gnu/linux operating system that is more noob friendly and kind of similar to windows in the layout just minus all the horrible bullcrap and spaghetti code that makes up windows. if you can't figure out how to use linux mint then you should just sell your computer, purchase a horse and buggy, and go be amish in a field somewhere because it's no longer safe for you to have a computer or really any electronic device for that matter. hopefully the many years of you beating off to cam girls will translate into good butter churning skills so you can earn a living as an amish person. if you fail to comply you are going to get updates forcefully pushed to your operating system which has been happening for a while now because let's face it, microsoft has never even heard of the word consent, but instead of these updates coming from microsoft themself, bill gates himself, they are going to be coming from the hacker known as 4chan and you will soon experience strange behavior in your operating system, internet explorer or microsoft edge or whatever the hell they're calling that crap these days will be replaced with pale moon or a similar furry browser. every day the wallpaper on your desktop is going to become an anime girl that is more and more lewd and vaguely underage as time goes on all of your home videos will be replaced by forceful tentacle hentai, all of your family photos are going to be replaced with pepes that become more and more racist as time goes on, oh and also your webcam will permanently live stream to liveleak so watch out for chinese truck drivers and off-duty brazzilian police officers. now i don't want to hear any of you wondering all of a sudden oh woe is me why does something like this have to happen to me no you've been warned for years and years about the dangers of proprietary software and yet you did nothing, richard stallman went out of his way to make speeches at college campuses all across the world even doing some in spanish so that he can reach a wider audience and going days without a proper meal this man had to subsist on nutrients from the bottom of his foot and yet you did nothing, edward snowden revealed that bioluminescent goverment agents were living in your computer watching you watch cam girls and browse old memes that washed up on the shores of reddit all under the guise of stopping terrorism and had to flee the united states and go live in a russian airport bathroom and yet you continued using windows purchasing a new copy every few years making bill gates a gorillianare in the process so that he could get ot his end goal of injecting windows updates directly into the bloodstream of every person in the world and newborn babies and yet you kept on using windows even though each new version removed more and more of your rights and became more and more bloated but now 4chan, the hacker, has taken it to the extreme. you will no longer be using your operating system it will se you, it will require a minimum of 2 terabytes of ram and a quantum cpu just to load up the crypto miner that's going to be required to boot your operating system. now alternatively i have heard directly from the hacker known as 4chan that for one bitcoin you can purchase a subscription of windows xp yotsuba edition which will have most of the restrictions removed however your wallpaper will still be set to a lewd vaguely underage anime girl and your browser will be permanently set to 4channel.org, uh, also microsoft word is going to be replaced with vim so good luck doing your homework on there hopefully you know how to quit out of it. you have been warned now go install gentoo or suffer the consequences or like i said sell all your electronics and go be amish because the amish don't get computer viruses
submitted by josephkeen0 to teenagers [link] [comments]

Flatten the Curve. #49. Let's Dig into Jade Helm. AI. The Surveillance State. Internet of Things. FISA. Pentagon Preparing for Mass Civil Breakdown. What is Mob Excess Deterrent Using Silent Audio? Stay Aware and Get Ahead of the Curve.

Flatten the Curve. Part 48. Source Here
It's getting crazier day by day now, so are you following the Boy Scout motto?
On this topic, Baden-Powell says: Remember your motto, "Be Prepared." Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”
Why should you be prepared? Because TPTB have been preparing, that’s why.
June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown. Social science is being militarised to develop 'operational tools' to target peaceful activists and protest movements Source Here
Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn't it? Inconceivable. Sure some preppers believed it, but they're always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein's Island.
But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?
February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here
All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don't tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They're setting the groundwork for what's coming down the pipe. This isn't about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.
Do you think the surveillance system is for your protection, or the protection of the state? Don't you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don't leave home without it.
But let's not forget about the wonderful world of the Internet of Things.
March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them. Earlier this month, Petraeus mused about the emergence of an "Internet of Things" -- that is, wired devices -- at a summit for In-Q-Tel, the CIA's venture capital firm. "'Transformational' is an overused word, but I do believe it properly applies to these technologies," Petraeus enthused, "particularly to their effect on clandestine tradecraft." All those new online devices are a treasure trove of data if you're a "person of interest" to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the "smart home," you'd be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room's ambiance. "Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters -- all connected to the next-generation internet using abundant, low-cost, and high-power computing," Petraeus said, "the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing." Petraeus allowed that these household spy devices "change our notions of secrecy" and prompt a rethink of "our notions of identity and secrecy." All of which is true -- if convenient for a CIA director. The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation. That's not the only data exploit intriguing Petraeus. He's interested in creating new online identities for his undercover spies -- and sweeping away the "digital footprints" of agents who suddenly need to vanish. "Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come," Petraeus observed. "Moreover, we have to figure out how to create the digital footprint for new identities for some officers." Source Here
December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid. It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here
The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn't it. But we can't have people figure out what's really happening, can we? It's a good thing that quantum computing isn't too close, isn’t it?
April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here
December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here
December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere
August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here
Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?
October 2, 2013: Vice News • The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here
An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple's are all the same. But at least we have fundamental rights, right?
Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.
'Quasi-anti-terrorism law' for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the 'acquisition' of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.
Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.
The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here
Oh. FISA is basically a rubber stamp. And even if it the stage play wasn't pretending to follow the script, would it matter? Who could actually stop it at this point? The cat's out of the bag and Pandoras Box is open.
Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the "Police America Act" – "authorized a massive surveillance dragnet", calling the blank-check oversight provisions "meaningless," and calling them a "phony court review of secret procedures."
So the surveillance state doesn't have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let's keep on keeping on.
The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here)
The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case. What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here
"Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence," she says. "So it wouldn't be tied to any one person's lifespan, or subject necessarily to laws regarding inheriting property." Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares. Source Here
The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail. There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.
There's a reason people call lawyers snakes, it's because most of them speak with forked tounges. So the corporation isn't being held liable, but the shareholders can't be held liable either. That's too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I've been talking about the surveillance state?
July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions. A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.” With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here
Uhm, I guess it's really is all connected, isn’t it?
June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations. More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here
Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it's a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn't I?
August 19, 2019: Big Think • Though the term "Orwellian" easily applies to such a technology, Michel's illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet. Here's the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities. Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That's why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That's why we need controls. Source Here
Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here
Now, I'm not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn't a lawyer) and she turned people to stone when she looked at them.
MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.
Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it'll just freeze you in your tracks.
July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the "microwave audio effect" to implant sounds and perhaps even specific messages inside people's heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that's detected by the ears, and basically makes you think you're going balls-to-the-wall batshit insane. Source Here
Uhm. And drive you insane.
July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here
Annnnnnnndddddd it'll kill you.
Guys, they're prepared. They've been prepared. They're ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They've directly told us to have three months of supplies in our homes. 2020 isn't going to be an anomaly? It's the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They've known it for a while. Let me show you one last thing before I wrap it up.
From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.
Remember, words matter. Look at Gorgon Stare and Medusa. They don't randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.
July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it's available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military's public affairs hub, brings up more broken links. Oh, and unless there's been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here
Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don't think they would warn everyone ahead of time, do you? So I dug a little bit more.
Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations. The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies. An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
PACOM? Why isn't that command group responsible for the South China Sea?
Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.
Now doesn't it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.
October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind. Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens. Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here
Military Exercises. Private Defense Firms. No oversight. And it's all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here
Nah. I'm just fear mongering and Doomscrolling again.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]

Scaling Reddit Community Points with Arbitrum Rollup: a piece of cake

Scaling Reddit Community Points with Arbitrum Rollup: a piece of cake
https://preview.redd.it/b80c05tnb9e51.jpg?width=2550&format=pjpg&auto=webp&s=850282c1a3962466ed44f73886dae1c8872d0f31
Submitted for consideration to The Great Reddit Scaling Bake-Off
Baked by the pastry chefs at Offchain Labs
Please send questions or comments to [[email protected] ](mailto:[email protected])
1. Overview
We're excited to submit Arbitrum Rollup for consideration to The Great Reddit Scaling Bake-Off. Arbitrum Rollup is the only Ethereum scaling solution that supports arbitrary smart contracts without compromising on Ethereum's security or adding points of centralization. For Reddit, this means that Arbitrum can not only scale the minting and transfer of Community Points, but it can foster a creative ecosystem built around Reddit Community Points enabling points to be used in a wide variety of third party applications. That's right -- you can have your cake and eat it too!
Arbitrum Rollup isn't just Ethereum-style. Its Layer 2 transactions are byte-for-byte identical to Ethereum, which means Ethereum users can continue to use their existing addresses and wallets, and Ethereum developers can continue to use their favorite toolchains and development environments out-of-the-box with Arbitrum. Coupling Arbitrum’s tooling-compatibility with its trustless asset interoperability, Reddit not only can scale but can onboard the entire Ethereum community at no cost by giving them the same experience they already know and love (well, certainly know).
To benchmark how Arbitrum can scale Reddit Community Points, we launched the Reddit contracts on an Arbitrum Rollup chain. Since Arbitrum provides full Solidity support, we didn't have to rewrite the Reddit contracts or try to mimic their functionality using an unfamiliar paradigm. Nope, none of that. We launched the Reddit contracts unmodified on Arbitrum Rollup complete with support for minting and distributing points. Like every Arbitrum Rollup chain, the chain included a bridge interface in which users can transfer Community Points or any other asset between the L1 and L2 chains. Arbitrum Rollup chains also support dynamic contract loading, which would allow third-party developers to launch custom ecosystem apps that integrate with Community Points on the very same chain that runs the Reddit contracts.
1.1 Why Ethereum
Perhaps the most exciting benefit of distributing Community Points using a blockchain is the ability to seamlessly port points to other applications and use them in a wide variety of contexts. Applications may include simple transfers such as a restaurant that allows Redditors to spend points on drinks. Or it may include complex smart contracts -- such as placing Community Points as a wager for a multiparty game or as collateral in a financial contract.
The common denominator between all of the fun uses of Reddit points is that it needs a thriving ecosystem of both users and developers, and the Ethereum blockchain is perhaps the only smart contract platform with significant adoption today. While many Layer 1 blockchains boast lower cost or higher throughput than the Ethereum blockchain, more often than not, these attributes mask the reality of little usage, weaker security, or both.
Perhaps another platform with significant usage will rise in the future. But today, Ethereum captures the mindshare of the blockchain community, and for Community Points to provide the most utility, the Ethereum blockchain is the natural choice.
1.2 Why Arbitrum
While Ethereum's ecosystem is unmatched, the reality is that fees are high and capacity is too low to support the scale of Reddit Community Points. Enter Arbitrum. Arbitrum Rollup provides all of the ecosystem benefits of Ethereum, but with orders of magnitude more capacity and at a fraction of the cost of native Ethereum smart contracts. And most of all, we don't change the experience from users. They continue to use the same wallets, addresses, languages, and tools.
Arbitrum Rollup is not the only solution that can scale payments, but it is the only developed solution that can scale both payments and arbitrary smart contracts trustlessly, which means that third party users can build highly scalable add-on apps that can be used without withdrawing money from the Rollup chain. If you believe that Reddit users will want to use their Community Points in smart contracts--and we believe they will--then it makes the most sense to choose a single scaling solution that can support the entire ecosystem, eliminating friction for users.
We view being able to run smart contracts in the same scaling solution as fundamentally critical since if there's significant demand in running smart contracts from Reddit's ecosystem, this would be a load on Ethereum and would itself require a scaling solution. Moreover, having different scaling solutions for the minting/distribution/spending of points and for third party apps would be burdensome for users as they'd have to constantly shuffle their Points back and forth.
2. Arbitrum at a glance
Arbitrum Rollup has a unique value proposition as it offers a combination of features that no other scaling solution achieves. Here we highlight its core attributes.
Decentralized. Arbitrum Rollup is as decentralized as Ethereum. Unlike some other Layer 2 scaling projects, Arbitrum Rollup doesn't have any centralized components or centralized operators who can censor users or delay transactions. Even in non-custodial systems, centralized components provide a risk as the operators are generally incentivized to increase their profit by extracting rent from users often in ways that severely degrade user experience. Even if centralized operators are altruistic, centralized components are subject to hacking, coercion, and potential liability.
Massive Scaling. Arbitrum achieves order of magnitude scaling over Ethereum's L1 smart contracts. Our software currently supports 453 transactions-per-second for basic transactions (at 1616 Ethereum gas per tx). We have a lot of room left to optimize (e.g. aggregating signatures), and over the next several months capacity will increase significantly. As described in detail below, Arbitrum can easily support and surpass Reddit's anticipated initial load, and its capacity will continue to improve as Reddit's capacity needs grow.
Low cost. The cost of running Arbitrum Rollup is quite low compared to L1 Ethereum and other scaling solutions such as those based on zero-knowledge proofs. Layer 2 fees are low, fixed, and predictable and should not be overly burdensome for Reddit to cover. Nobody needs to use special equipment or high-end machines. Arbitrum requires validators, which is a permissionless role that can be run on any reasonable on-line machine. Although anybody can act as a validator, in order to protect against a “tragedy of the commons” and make sure reputable validators are participating, we support a notion of “invited validators” that are compensated for their costs. In general, users pay (low) fees to cover the invited validators’ costs, but we imagine that Reddit may cover this cost for its users. See more on the costs and validator options below.
Ethereum Developer Experience. Not only does Arbitrum support EVM smart contracts, but the developer experience is identical to that of L1 Ethereum contracts and fully compatible with Ethereum tooling. Developers can port existing Solidity apps or write new ones using their favorite and familiar toolchains (e.g. Truffle, Buidler). There are no new languages or coding paradigms to learn.
Ethereum wallet compatibility. Just as in Ethereum, Arbitrum users need only hold keys, but do not have to store any coin history or additional data to protect or access their funds. Since Arbitrum transactions are semantically identical to Ethereum L1 transactions, existing Ethereum users can use their existing Ethereum keys with their existing wallet software such as Metamask.
Token interoperability. Users can easily transfer their ETH, ERC-20 and ERC-721 tokens between Ethereum and the Arbitrum Rollup chain. As we explain in detail below, it is possible to mint tokens in L2 that can subsequently be withdrawn and recognized by the L1 token contract.
Fast finality. Transactions complete with the same finality time as Ethereum L1 (and it's possible to get faster finality guarantees by trading away trust assumptions; see the Arbitrum Rollup whitepaper for details).
Non-custodial. Arbitrum Rollup is a non-custodial scaling solution, so users control their funds/points and neither Reddit nor anyone else can ever access or revoke points held by users.
Censorship Resistant. Since it's completely decentralized, and the Arbitrum protocol guarantees progress trustlessly, Arbitrum Rollup is just as censorship-proof as Ethereum.
Block explorer. The Arbitrum Rollup block explorer allows users to view and analyze transactions on the Rollup chain.
Limitations
Although this is a bake-off, we're not going to sugar coat anything. Arbitrum Rollup, like any Optimistic Rollup protocol, does have one limitation, and that's the delay on withdrawals.
As for the concrete length of the delay, we've done a good deal of internal modeling and have blogged about this as well. Our current modeling suggests a 3-hour delay is sufficient (but as discussed in the linked post there is a tradeoff space between the length of the challenge period and the size of the validators’ deposit).
Note that this doesn't mean that the chain is delayed for three hours. Arbitrum Rollup supports pipelining of execution, which means that validators can keep building new states even while previous ones are “in the pipeline” for confirmation. As the challenge delays expire for each update, a new state will be confirmed (read more about this here).
So activity and progress on the chain are not delayed by the challenge period. The only thing that's delayed is the consummation of withdrawals. Recall though that any single honest validator knows immediately (at the speed of L1 finality) which state updates are correct and can guarantee that they will eventually be confirmed, so once a valid withdrawal has been requested on-chain, every honest party knows that the withdrawal will definitely happen. There's a natural place here for a liquidity market in which a validator (or someone who trusts a validator) can provide withdrawal loans for a small interest fee. This is a no-risk business for them as they know which withdrawals will be confirmed (and can force their confirmation trustlessly no matter what anyone else does) but are just waiting for on-chain finality.
3. The recipe: How Arbitrum Rollup works
For a description of the technical components of Arbitrum Rollup and how they interact to create a highly scalable protocol with a developer experience that is identical to Ethereum, please refer to the following documents:
Arbitrum Rollup Whitepaper
Arbitrum academic paper (describes a previous version of Arbitrum)
4. Developer docs and APIs
For full details about how to set up and interact with an Arbitrum Rollup chain or validator, please refer to our developer docs, which can be found at https://developer.offchainlabs.com/.
Note that the Arbitrum version described on that site is older and will soon be replaced by the version we are entering in Reddit Bake-Off, which is still undergoing internal testing before public release.
5. Who are the validators?
As with any Layer 2 protocol, advancing the protocol correctly requires at least one validator (sometimes called block producers) that is honest and available. A natural question is: who are the validators?
Recall that the validator set for an Arbitrum chain is open and permissionless; anyone can start or stop validating at will. (A useful analogy is to full nodes on an L1 chain.) But we understand that even though anyone can participate, Reddit may want to guarantee that highly reputable nodes are validating their chain. Reddit may choose to validate the chain themselves and/or hire third-party validators.To this end, we have begun building a marketplace for validator-for-hire services so that dapp developers can outsource validation services to reputable nodes with high up-time. We've announced a partnership in which Chainlink nodes will provide Arbitrum validation services, and we expect to announce more partnerships shortly with other blockchain infrastructure providers.
Although there is no requirement that validators are paid, Arbitrum’s economic model tracks validators’ costs (e.g. amount of computation and storage) and can charge small fees on user transactions, using a gas-type system, to cover those costs. Alternatively, a single party such as Reddit can agree to cover the costs of invited validators.
6. Reddit Contract Support
Since Arbitrum contracts and transactions are byte-for-byte compatible with Ethereum, supporting the Reddit contracts is as simple as launching them on an Arbitrum chain.
Minting. Arbitrum Rollup supports hybrid L1/L2 tokens which can be minted in L2 and then withdrawn onto the L1. An L1 contract at address A can make a special call to the EthBridge which deploys a "buddy contract" to the same address A on an Arbitrum chain. Since it's deployed at the same address, users can know that the L2 contract is the authorized "buddy" of the L1 contract on the Arbitrum chain.
For minting, the L1 contract is a standard ERC-20 contract which mints and burns tokens when requested by the L2 contract. It is paired with an ERC-20 contract in L2 which mints tokens based on whatever programmer provided minting facility is desired and burns tokens when they are withdrawn from the rollup chain. Given this base infrastructure, Arbitrum can support any smart contract based method for minting tokens in L2, and indeed we directly support Reddit's signature/claim based minting in L2.
Batch minting. What's better than a mint cookie? A whole batch! In addition to supporting Reddit’s current minting/claiming scheme, we built a second minting design, which we believe outperforms the signature/claim system in many scenarios.
In the current system, Reddit periodically issues signed statements to users, who then take those statements to the blockchain to claim their tokens. An alternative approach would have Reddit directly submit the list of users/amounts to the blockchain and distribute the tokens to the users without the signature/claim process.
To optimize the cost efficiency of this approach, we designed an application-specific compression scheme to minimize the size of the batch distribution list. We analyzed the data from Reddit's previous distributions and found that the data is highly compressible since token amounts are small and repeated, and addresses appear multiple times. Our function groups transactions by size, and replaces previously-seen addresses with a shorter index value. We wrote client code to compress the data, wrote a Solidity decompressing function, and integrated that function into Reddit’s contract running on Arbitrum.
When we ran the compression function on the previous Reddit distribution data, we found that we could compress batched minting data down to to 11.8 bytes per minting event (averaged over a 6-month trace of Reddit’s historical token grants)compared with roughly 174 bytes of on-chain data needed for the signature claim approach to minting (roughly 43 for an RLP-encoded null transaction + 65 for Reddit's signature + 65 for the user's signature + roughly 8 for the number of Points) .
The relative benefit of the two approaches with respect to on-chain call data cost depends on the percentage of users that will actually claim their tokens on chain. With the above figures, batch minting will be cheaper if roughly 5% of users redeem their claims. We stress that our compression scheme is not Arbitrum-specific and would be beneficial in any general-purpose smart contract platform.
8. Benchmarks and costs
In this section, we give the full costs of operating the Reddit contracts on an Arbitrum Rollup chain including the L1 gas costs for the Rollup chain, the costs of computation and storage for the L2 validators as well as the capital lockup requirements for staking.
Arbitrum Rollup is still on testnet, so we did not run mainnet benchmarks. Instead, we measured the L1 gas cost and L2 workload for Reddit operations on Arbitrum and calculated the total cost assuming current Ethereum gas prices. As noted below in detail, our measurements do not assume that Arbitrum is consuming the entire capacity of Ethereum. We will present the details of our model now, but for full transparency you can also play around with it yourself and adjust the parameters, by copying the spreadsheet found here.
Our cost model is based on measurements of Reddit’s contracts, running unmodified (except for the addition of a batch minting function) on Arbitrum Rollup on top of Ethereum.
On the distribution of transactions and frequency of assertions. Reddit's instructions specify the following minimum parameters that submissions should support:
Over a 5 day period, your scaling PoC should be able to handle:
  • 100,000 point claims (minting & distributing points)
  • 25,000 subscriptions
  • 75,000 one-off points burning
  • 100,000 transfers
We provide the full costs of operating an Arbitrum Rollup chain with this usage under the assumption that tokens are minted or granted to users in batches, but other transactions are uniformly distributed over the 5 day period. Unlike some other submissions, we do not make unrealistic assumptions that all operations can be submitted in enormous batches. We assume that batch minting is done in batches that use only a few percent on an L1 block’s gas, and that other operations come in evenly over time and are submitted in batches, with one batch every five minutes to keep latency reasonable. (Users are probably already waiting for L1 finality, which takes at least that long to achieve.)
We note that assuming that there are only 300,000 transactions that arrive uniformly over the 5 day period will make our benchmark numbers lower, but we believe that this will reflect the true cost of running the system. To see why, say that batches are submitted every five minutes (20 L1 blocks) and there's a fixed overhead of c bytes of calldata per batch, the cost of which will get amortized over all transactions executed in that batch. Assume that each individual transaction adds a marginal cost of t. Lastly assume the capacity of the scaling system is high enough that it can support all of Reddit's 300,000 transactions within a single 20-block batch (i.e. that there is more than c + 300,000*t byes of calldata available in 20 blocks).
Consider what happens if c, the per-batch overhead, is large (which it is in some systems, but not in Arbitrum). In the scenario that transactions actually arrive at the system's capacity and each batch is full, then c gets amortized over 300,000 transactions. But if we assume that the system is not running at capacity--and only receives 300,000 transactions arriving uniformly over 5 days-- then each 20-block assertion will contain about 200 transactions, and thus each transaction will pay a nontrivial cost due to c.
We are aware that other proposals presented scaling numbers assuming that 300,000 transactions arrived at maximum capacity and was executed in a single mega-transaction, but according to our estimates, for at least one such report, this led to a reported gas price that was 2-3 orders of magnitude lower than it would have been assuming uniform arrival. We make more realistic batching assumptions, and we believe Arbitrum compares well when batch sizes are realistic.
Our model. Our cost model includes several sources of cost:
  • L1 gas costs: This is the cost of posting transactions as calldata on the L1 chain, as well as the overhead associated with each batch of transactions, and the L1 cost of settling transactions in the Arbitrum protocol.
  • Validator’s staking costs: In normal operation, one validator will need to be staked. The stake is assumed to be 0.2% of the total value of the chain (which is assumed to be $1 per user who is eligible to claim points). The cost of staking is the interest that could be earned on the money if it were not staked.
  • Validator computation and storage: Every validator must do computation to track the chain’s processing of transactions, and must maintain storage to keep track of the contracts’ EVM storage. The cost of computation and storage are estimated based on measurements, with the dollar cost of resources based on Amazon Web Services pricing.
It’s clear from our modeling that the predominant cost is for L1 calldata. This will probably be true for any plausible rollup-based system.
Our model also shows that Arbitrum can scale to workloads much larger than Reddit’s nominal workload, without exhausting L1 or L2 resources. The scaling bottleneck will ultimately be calldata on the L1 chain. We believe that cost could be reduced substantially if necessary by clever encoding of data. (In our design any compression / decompression of L2 transaction calldata would be done by client software and L2 programs, never by an L1 contract.)
9. Status of Arbitrum Rollup
Arbitrum Rollup is live on Ethereum testnet. All of the code written to date including everything included in the Reddit demo is open source and permissively licensed under the Apache V2 license. The first testnet version of Arbitrum Rollup was released on testnet in February. Our current internal version, which we used to benchmark the Reddit contracts, will be released soon and will be a major upgrade.
Both the Arbitrum design as well as the implementation are heavily audited by independent third parties. The Arbitrum academic paper was published at USENIX Security, a top-tier peer-reviewed academic venue. For the Arbitrum software, we have engaged Trail of Bits for a security audit, which is currently ongoing, and we are committed to have a clean report before launching on Ethereum mainnet.
10. Reddit Universe Arbitrum Rollup Chain
The benchmarks described in this document were all measured using the latest internal build of our software. When we release the new software upgrade publicly we will launch a Reddit Universe Arbitrum Rollup chain as a public demo, which will contain the Reddit contracts as well as a Uniswap instance and a Connext Hub, demonstrating how Community Points can be integrated into third party apps. We will also allow members of the public to dynamically launch ecosystem contracts. We at Offchain Labs will cover the validating costs for the Reddit Universe public demo.
If the folks at Reddit would like to evaluate our software prior to our public demo, please email us at [email protected] and we'd be more than happy to provide early access.
11. Even more scaling: Arbitrum Sidechains
Rollups are an excellent approach to scaling, and we are excited about Arbitrum Rollup which far surpasses Reddit's scaling needs. But looking forward to Reddit's eventual goal of supporting hundreds of millions of users, there will likely come a time when Reddit needs more scaling than any Rollup protocol can provide.
While Rollups greatly reduce costs, they don't break the linear barrier. That is, all transactions have an on-chain footprint (because all calldata must be posted on-chain), albeit a far smaller one than on native Ethereum, and the L1 limitations end up being the bottleneck for capacity and cost. Since Ethereum has limited capacity, this linear use of on-chain resources means that costs will eventually increase superlinearly with traffic.
The good news is that we at Offchain Labs have a solution in our roadmap that can satisfy this extreme-scaling setting as well: Arbitrum AnyTrust Sidechains. Arbitrum Sidechains are similar to Arbitrum Rollup, but deviate in that they name a permissioned set of validators. When a chain’s validators agree off-chain, they can greatly reduce the on-chain footprint of the protocol and require almost no data to be put on-chain. When validators can't reach unanimous agreement off-chain, the protocol reverts to Arbitrum Rollup. Technically, Arbitrum Sidechains can be viewed as a hybrid between state channels and Rollup, switching back and forth as necessary, and combining the performance and cost that state channels can achieve in the optimistic case, with the robustness of Rollup in other cases. The core technical challenge is how to switch seamlessly between modes and how to guarantee that security is maintained throughout.
Arbitrum Sidechains break through this linear barrier, while still maintaining a high level of security and decentralization. Arbitrum Sidechains provide the AnyTrust guarantee, which says that as long as any one validator is honest and available (even if you don't know which one will be), the L2 chain is guaranteed to execute correctly according to its code and guaranteed to make progress. Unlike in a state channel, offchain progress does not require unanimous consent, and liveness is preserved as long as there is a single honest validator.
Note that the trust model for Arbitrum Sidechains is much stronger than for typical BFT-style chains which introduce a consensus "voting" protocols among a small permissioned group of validators. BFT-based protocols require a supermajority (more than 2/3) of validators to agree. In Arbitrum Sidechains, by contrast, all you need is a single honest validator to achieve guaranteed correctness and progress. Notice that in Arbitrum adding validators strictly increases security since the AnyTrust guarantee provides correctness as long as any one validator is honest and available. By contrast, in BFT-style protocols, adding nodes can be dangerous as a coalition of dishonest nodes can break the protocol.
Like Arbitrum Rollup, the developer and user experiences for Arbitrum Sidechains will be identical to that of Ethereum. Reddit would be able to choose a large and diverse set of validators, and all that they would need to guarantee to break through the scaling barrier is that a single one of them will remain honest.
We hope to have Arbitrum Sidechains in production in early 2021, and thus when Reddit reaches the scale that surpasses the capacity of Rollups, Arbitrum Sidechains will be waiting and ready to help.
While the idea to switch between channels and Rollup to get the best of both worlds is conceptually simple, getting the details right and making sure that the switch does not introduce any attack vectors is highly non-trivial and has been the subject of years of our research (indeed, we were working on this design for years before the term Rollup was even coined).
12. How Arbitrum compares
We include a comparison to several other categories as well as specific projects when appropriate. and explain why we believe that Arbitrum is best suited for Reddit's purposes. We focus our attention on other Ethereum projects.
Payment only Rollups. Compared to Arbitrum Rollup, ZK-Rollups and other Rollups that only support token transfers have several disadvantages:
  • As outlined throughout the proposal, we believe that the entire draw of Ethereum is in its rich smart contracts support which is simply not achievable with today's zero-knowledge proof technology. Indeed, scaling with a ZK-Rollup will add friction to the deployment of smart contracts that interact with Community Points as users will have to withdraw their coins from the ZK-Rollup and transfer them to a smart contract system (like Arbitrum). The community will be best served if Reddit builds on a platform that has built-in, frictionless smart-contract support.
  • All other Rollup protocols of which we are aware employ a centralized operator. While it's true that users retain custody of their coins, the centralized operator can often profit from censoring, reordering, or delaying transactions. A common misconception is that since they're non-custodial protocols, a centralized sequencer does not pose a risk but this is incorrect as the sequencer can wreak havoc or shake down users for side payments without directly stealing funds.
  • Sidechain type protocols can eliminate some of these issues, but they are not trustless. Instead, they require trust in some quorum of a committee, often requiring two-third of the committee to be honest, compared to rollup protocols like Arbitrum that require only a single honest party. In addition, not all sidechain type protocols have committees that are diverse, or even non-centralized, in practice.
  • Plasma-style protocols have a centralized operator and do not support general smart contracts.
13. Concluding Remarks
While it's ultimately up to the judges’ palate, we believe that Arbitrum Rollup is the bakeoff choice that Reddit kneads. We far surpass Reddit's specified workload requirement at present, have much room to optimize Arbitrum Rollup in the near term, and have a clear path to get Reddit to hundreds of millions of users. Furthermore, we are the only project that gives developers and users the identical interface as the Ethereum blockchain and is fully interoperable and tooling-compatible, and we do this all without any new trust assumptions or centralized components.
But no matter how the cookie crumbles, we're glad to have participated in this bake-off and we thank you for your consideration.
About Offchain Labs
Offchain Labs, Inc. is a venture-funded New York company that spun out of Princeton University research, and is building the Arbitrum platform to usher in the next generation of scalable, interoperable, and compatible smart contracts. Offchain Labs is backed by Pantera Capital, Compound VC, Coinbase Ventures, and others.
Leadership Team
Ed Felten
Ed Felten is Co-founder and Chief Scientist at Offchain Labs. He is on leave from Princeton University, where he is the Robert E. Kahn Professor of Computer Science and Public Affairs. From 2015 to 2017 he served at the White House as Deputy United States Chief Technology Officer and senior advisor to the President. He is an ACM Fellow and member of the National Academy of Engineering. Outside of work, he is an avid runner, cook, and L.A. Dodgers fan.
Steven Goldfeder
Steven Goldfeder is Co-founder and Chief Executive Officer at Offchain Labs. He holds a PhD from Princeton University, where he worked at the intersection of cryptography and cryptocurrencies including threshold cryptography, zero-knowledge proof systems, and post-quantum signatures. He is a co-author of Bitcoin and Cryptocurrency Technologies, the leading textbook on cryptocurrencies, and he has previously worked at Google and Microsoft Research, where he co-invented the Picnic signature algorithm. When not working, you can find Steven spending time with his family, taking a nature walk, or twisting balloons.
Harry Kalodner
Harry Kalodner is Co-founder and Chief Technology Officer at Offchain Labs where he leads the engineering team. Before the company he attended Princeton as a Ph.D candidate where his research explored economics, anonymity, and incentive compatibility of cryptocurrencies, and he also has worked at Apple. When not up at 3:00am writing code, Harry occasionally sleeps.
submitted by hkalodner to ethereum [link] [comments]

[ Bitcoin ] Technical: Taproot: Why Activate?

Topic originally posted in Bitcoin by almkglor [link]
This is a follow-up on https://old.reddit.com/Bitcoin/comments/hqzp14/technical_the_path_to_taproot_activation/
Taproot! Everybody wants it!! But... you might ask yourself: sure, everybody else wants it, but why would I, sovereign Bitcoin HODLer, want it? Surely I can be better than everybody else because I swapped XXX fiat for Bitcoin unlike all those nocoiners?
And it is important for you to know the reasons why you, o sovereign Bitcoiner, would want Taproot activated. After all, your nodes (or the nodes your wallets use, which if you are SPV, you hopefully can pester to your wallet vendoimplementor about) need to be upgraded in order for Taproot activation to actually succeed instead of becoming a hot sticky mess.
First, let's consider some principles of Bitcoin.
I'm sure most of us here would agree that the above are very important principles of Bitcoin and that these are principles we would not be willing to remove. If anything, we would want those principles strengthened (especially the last one, financial privacy, which current Bitcoin is only sporadically strong with: you can get privacy, it just requires effort to do so).
So, how does Taproot affect those principles?

Taproot and Your /Coins

Most HODLers probably HODL their coins in singlesig addresses. Sadly, switching to Taproot would do very little for you (it gives a mild discount at spend time, at the cost of a mild increase in fee at receive time (paid by whoever sends to you, so if it's a self-send from a P2PKH or bech32 address, you pay for this); mostly a wash).
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash, so the Taproot output spends 12 bytes more; spending from a P2WPKH requires revealing a 32-byte public key later, which is not needed with Taproot, and Taproot signatures are about 9 bytes smaller than P2WPKH signatures, but the 32 bytes plus 9 bytes is divided by 4 because of the witness discount, so it saves about 11 bytes; mostly a wash, it increases blockweight by about 1 virtual byte, 4 weight for each Taproot-output-input, compared to P2WPKH-output-input).
However, as your HODLings grow in value, you might start wondering if multisignature k-of-n setups might be better for the security of your savings. And it is in multisignature that Taproot starts to give benefits!
Taproot switches to using Schnorr signing scheme. Schnorr makes key aggregation -- constructing a single public key from multiple public keys -- almost as trivial as adding numbers together. "Almost" because it involves some fairly advanced math instead of simple boring number adding, but hey when was the last time you added up your grocery list prices by hand huh?
With current P2SH and P2WSH multisignature schemes, if you have a 2-of-3 setup, then to spend, you need to provide two different signatures from two different public keys. With Taproot, you can create, using special moon math, a single public key that represents your 2-of-3 setup. Then you just put two of your devices together, have them communicate to each other (this can be done airgapped, in theory, by sending QR codes: the software to do this is not even being built yet, but that's because Taproot hasn't activated yet!), and they will make a single signature to authorize any spend from your 2-of-3 address. That's 73 witness bytes -- 18.25 virtual bytes -- of signatures you save!
And if you decide that your current setup with 1-of-1 P2PKH / P2WPKH addresses is just fine as-is: well, that's the whole point of a softfork: backwards-compatibility; you can receive from Taproot users just fine, and once your wallet is updated for Taproot-sending support, you can send to Taproot users just fine as well!
(P2WPKH and P2WSH -- SegWit v0 -- addresses start with bc1q; Taproot -- SegWit v1 --- addresses start with bc1p, in case you wanted to know the difference; in bech32 q is 0, p is 1)
Now how about HODLers who keep all, or some, of their coins on custodial services? Well, any custodial service worth its salt would be doing at least 2-of-3, or probably something even bigger, like 11-of-15. So your custodial service, if it switched to using Taproot internally, could save a lot more (imagine an 11-of-15 getting reduced from 11 signatures to just 1!), which --- we can only hope! --- should translate to lower fees and better customer service from your custodial service!
So I think we can say, very accurately, that the Bitcoin principle --- that YOU are in control of your money --- can only be helped by Taproot (if you are doing multisignature), and, because P2PKH and P2WPKH remain validly-usable addresses in a Taproot future, will not be harmed by Taproot. Its benefit to this principle might be small (it mostly only benefits multisignature users) but since it has no drawbacks with this (i.e. singlesig users can continue to use P2WPKH and P2PKH still) this is still a nice, tidy win!
(even singlesig users get a minor benefit, in that multisig users will now reduce their blockchain space footprint, so that fees can be kept low for everybody; so for example even if you have your single set of private keys engraved on titanium plates sealed in an airtight box stored in a safe buried in a desert protected by angry nomads riding giant sandworms because you're the frickin' Kwisatz Haderach, you still gain some benefit from Taproot)
And here's the important part: if P2PKH/P2WPKH is working perfectly fine with you and you decide to never use Taproot yourself, Taproot will not affect you detrimentally. First do no harm!

Taproot and Your Contracts

No one is an island, no one lives alone. Give and you shall receive. You know: by trading with other people, you can gain expertise in some obscure little necessity of the world (and greatly increase your productivity in that little field), and then trade the products of your expertise for necessities other people have created, all of you thereby gaining gains from trade.
So, contracts, which are basically enforceable agreements that facilitate trading with people who you do not personally know and therefore might not trust.
Let's start with a simple example. You want to buy some gewgaws from somebody. But you don't know them personally. The seller wants the money, you want their gewgaws, but because of the lack of trust (you don't know them!! what if they're scammers??) neither of you can benefit from gains from trade.
However, suppose both of you know of some entity that both of you trust. That entity can act as a trusted escrow. The entity provides you security: this enables the trade, allowing both of you to get gains from trade.
In Bitcoin-land, this can be implemented as a 2-of-3 multisignature. The three signatories in the multisgnature would be you, the gewgaw seller, and the escrow. You put the payment for the gewgaws into this 2-of-3 multisignature address.
Now, suppose it turns out neither of you are scammers (whaaaat!). You receive the gewgaws just fine and you're willing to pay up for them. Then you and the gewgaw seller just sign a transaction --- you and the gewgaw seller are 2, sufficient to trigger the 2-of-3 --- that spends from the 2-of-3 address to a singlesig the gewgaw seller wants (or whatever address the gewgaw seller wants).
But suppose some problem arises. The seller gave you gawgews instead of gewgaws. Or you decided to keep the gewgaws but not sign the transaction to release the funds to the seller. In either case, the escrow is notified, and if it can sign with you to refund the funds back to you (if the seller was a scammer) or it can sign with the seller to forward the funds to the seller (if you were a scammer).
Taproot helps with this: like mentioned above, it allows multisignature setups to produce only one signature, reducing blockchain space usage, and thus making contracts --- which require multiple people, by definition, you don't make contracts with yourself --- is made cheaper (which we hope enables more of these setups to happen for more gains from trade for everyone, also, moon and lambos).
(technology-wise, it's easier to make an n-of-n than a k-of-n, making a k-of-n would require a complex setup involving a long ritual with many communication rounds between the n participants, but an n-of-n can be done trivially with some moon math. You can, however, make what is effectively a 2-of-3 by using a three-branch SCRIPT: either 2-of-2 of you and seller, OR 2-of-2 of you and escrow, OR 2-of-2 of escrow and seller. Fortunately, Taproot adds a facility to embed a SCRIPT inside a public key, so you can have a 2-of-2 Taprooted address (between you and seller) with a SCRIPT branch that can instead be spent with 2-of-2 (you + escrow) OR 2-of-2 (seller + escrow), which implements the three-branched SCRIPT above. If neither of you are scammers (hopefully the common case) then you both sign using your keys and never have to contact the escrow, since you are just using the escrow public key without coordinating with them (because n-of-n is trivial but k-of-n requires setup with communication rounds), so in the "best case" where both of you are honest traders, you also get a privacy boost, in that the escrow never learns you have been trading on gewgaws, I mean ewww, gawgews are much better than gewgaws and therefore I now judge you for being a gewgaw enthusiast, you filthy gewgawer).

Taproot and Your Contracts, Part 2: Cryptographic Boogaloo

Now suppose you want to buy some data instead of things. For example, maybe you have some closed-source software in trial mode installed, and want to pay the developer for the full version. You want to pay for an activation code.
This can be done, today, by using an HTLC. The developer tells you the hash of the activation code. You pay to an HTLC, paying out to the developer if it reveals the preimage (the activation code), or refunding the money back to you after a pre-agreed timeout. If the developer claims the funds, it has to reveal the preimage, which is the activation code, and you can now activate your software. If the developer does not claim the funds by the timeout, you get refunded.
And you can do that, with HTLCs, today.
Of course, HTLCs do have problems:
Fortunately, with Schnorr (which is enabled by Taproot), we can now use the Scriptless Script constuction by Andrew Poelstra. This Scriptless Script allows a new construction, the PTLC or Pointlocked Timelocked Contract. Instead of hashes and preimages, just replace "hash" with "point" and "preimage" with "scalar".
Or as you might know them: "point" is really "public key" and "scalar" is really a "private key". What a PTLC does is that, given a particular public key, the pointlocked branch can be spent only if the spender reveals the private key of the given private key to you.
Another nice thing with PTLCs is that they are deniable. What appears onchain is just a single 2-of-2 signature between you and the developemanufacturer. It's like a magic trick. This signature has no special watermarks, it's a perfectly normal signature (the pledge). However, from this signature, plus some datta given to you by the developemanufacturer (known as the adaptor signature) you can derive the private key of a particular public key you both agree on (the turn). Anyone scraping the blockchain will just see signatures that look just like every other signature, and as long as nobody manages to hack you and get a copy of the adaptor signature or the private key, they cannot get the private key behind the public key (point) that the pointlocked branch needs (the prestige).
(Just to be clear, the public key you are getting the private key from, is distinct from the public key that the developemanufacturer will use for its funds. The activation key is different from the developer's onchain Bitcoin key, and it is the activation key whose private key you will be learning, not the developer's/manufacturer's onchain Bitcoin key).
So:
Taproot lets PTLCs exist onchain because they enable Schnorr, which is a requirement of PTLCs / Scriptless Script.
(technology-wise, take note that Scriptless Script works only for the "pointlocked" branch of the contract; you need normal Script, or a pre-signed nLockTimed transaction, for the "timelocked" branch. Since Taproot can embed a script, you can have the Taproot pubkey be a 2-of-2 to implement the Scriptless Script "pointlocked" branch, then have a hidden script that lets you recover the funds with an OP_CHECKLOCKTIMEVERIFY after the timeout if the seller does not claim the funds.)

Quantum Quibbles!

Now if you were really paying attention, you might have noticed this parenthetical:
(technical details: a Taproot output is 1 version byte + 32 byte public key, while a P2WPKH (bech32 singlesig) output is 1 version byte + 20 byte public key hash...)
So wait, Taproot uses raw 32-byte public keys, and not public key hashes? Isn't that more quantum-vulnerable??
Well, in theory yes. In practice, they probably are not.
It's not that hashes can be broken by quantum computes --- they're still not. Instead, you have to look at how you spend from a P2WPKH/P2PKH pay-to-public-key-hash.
When you spend from a P2PKH / P2WPKH, you have to reveal the public key. Then Bitcoin hashes it and checks if this matches with the public-key-hash, and only then actually validates the signature for that public key.
So an unconfirmed transaction, floating in the mempools of nodes globally, will show, in plain sight for everyone to see, your public key.
(public keys should be public, that's why they're called public keys, LOL)
And if quantum computers are fast enough to be of concern, then they are probably fast enough that, in the several minutes to several hours from broadcast to confirmation, they have already cracked the public key that is openly broadcast with your transaction. The owner of the quantum computer can now replace your unconfirmed transaction with one that pays the funds to itself. Even if you did not opt-in RBF, miners are still incentivized to support RBF on RBF-disabled transactions.
So the extra hash is not as significant a protection against quantum computers as you might think. Instead, the extra hash-and-compare needed is just extra validation effort.
Further, if you have ever, in the past, spent from the address, then there exists already a transaction indelibly stored on the blockchain, openly displaying the public key from which quantum computers can derive the private key. So those are still vulnerable to quantum computers.
For the most part, the cryptographers behind Taproot (and Bitcoin Core) are of the opinion that quantum computers capable of cracking Bitcoin pubkeys are unlikely to appear within a decade or two.
So:
For now, the homomorphic and linear properties of elliptic curve cryptography provide a lot of benefits --- particularly the linearity property is what enables Scriptless Script and simple multisignature (i.e. multisignatures that are just 1 signature onchain). So it might be a good idea to take advantage of them now while we are still fairly safe against quantum computers. It seems likely that quantum-safe signature schemes are nonlinear (thus losing these advantages).

Summary

I Wanna Be The Taprooter!

So, do you want to help activate Taproot? Here's what you, mister sovereign Bitcoin HODLer, can do!

But I Hate Taproot!!

That's fine!

Discussions About Taproot Activation

almkglor your post has been copied because one or more comments in this topic have been removed. This copy will preserve unmoderated topic. If you would like to opt-out, please send a message using [this link].
[deleted comment]
[deleted comment]
[deleted comment]
submitted by anticensor_bot to u/anticensor_bot [link] [comments]

Quantum Computing  The Biggest Threat to Bitcoin?? (Must Watch) Bitcoin Price Falls on Panic over Quantum Computers, Bakkt Failure, & Miner Exodus Quantum Computing, Bitcoin & Applications of Quantum Technology. Quantum Computing - Is Bitcoin In Danger? Bitcoin and Quantum Computing  Are Quantum Computers a Threat to Bitcoin ?

Is Bitcoin Quantum Computer Proof? With the potential processing powers of quantum computers, hackers can exploit Bitcoin's security trnsaction aspect by influencing the system's mining process or ... IBM, a New York-based IT firm with business offices in over 170 countries, recently announced that it has created a quantum computer, called Q System One, that can “operate outside the research lab for the first time.” According to IBM’s research division, the tech firm’s newly introduced quantum computer will help greatly in the “commercialization of quantum computing.” Can new quantum computers mine bitcoin much faster than traditional ones?. The answer is yes, but a clear distinction must be made between theory and practice.. In fact, as Vitalik Buterin said a few months ago: “My one-sentence impression of recent quantum supremacy stuff so far is that it is to real quantum computing what hydrogen bombs are to nuclear fusion. IBM recently unveiled its Q System One at Consumer Electronics Show (CES) 2019, with the company describing such as a quantum computer developed for “commercial use.” Despite numerous media ... If a quantum computer did manage to mine all 2016 blocks, the network would simply adjust the difficulty, bottlenecking Sycamore’s further attempts. Still, in reality, the likelihood of bitcoin network being able to produce a difficulty setting of this level is improbable. Quantum Computers Could ‘Break’ Bitcoin Nevertheless, the author is right in a sense. Any attempt from a quantum ...

[index] [44414] [24115] [42701] [8803] [1814] [16957] [45266] [9258] [51128] [29169]

Quantum Computing The Biggest Threat to Bitcoin?? (Must Watch)

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography there is a 20-30 year lifecycle for ... Is quantum computing a threat to Bitcoin? How can Bitcoin become more secure against a quantum computing attack? Will this upgrade require moving coins to ne... Bitcoin Broke the descending triangle and dropped below $8,000, the main reason why this happened is when came out regarding google quantum computer. In this video I will explain what is quantum ... This video is unavailable. Watch Queue Queue Why Did Bitcoin Drop $1700? Price Drop Speculation, Fed Pump, Bakkt Launch & BTC Whales - Duration: 46:58. The Modern Investor 32,154 views

#